GreyNoise’s Glenn Thorpe counts the cost of missed opportunities On 59 occasions throughout 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) silently tweaked vulnerability notices to reflect their use by ransomware crooks. Experts say that’s a problem.… This article…
Tag: The Register – Security
X marks the raid: French cops swoop on Musk’s Paris ops
Algorithmic bias probe continues, CEO and former boss summoned to defend the platform’s corner French police raided Elon Musk’s X offices in Paris this morning as part of a criminal investigation into alleged algorithmic manipulation by foreign powers.… This article…
French cops raid X’s Paris office in algorithmic bias probe
CEO Elon Musk summoned to defend the platform’s corner French police raided Elon Musk’s X offices in Paris this morning as part of a criminal investigation into alleged algorithmic manipulation by foreign powers.… This article has been indexed from The…
Microsoft finally sends TLS 1.0 and 1.1 to the cloud retirement home
Azure Storage now requires version 1.2 or newer for encrypted connections Today is the day Azure Storage stops supporting versions 1.0 and 1.1 of Transport Layer Security (TLS). TLS 1.2 is the new minimum.… This article has been indexed from…
Polish cops bail 20-year-old bedroom botnet operator
DDoSer of ‘strategically important’ websites admitted to most charges Polish authorities have cuffed a 20-year-old man on suspicion of carrying out DDoS attacks.… This article has been indexed from The Register – Security Read the original article: Polish cops bail…
DIY AI bot farm OpenClaw is a security ‘dumpster fire’
Your own personal Jarvis. A bot to hear your prayers. A bot that cares. Just not about keeping you safe OpenClaw, the AI-powered personal assistant users interact with via messaging apps and sometimes entrust with their credentials to various online…
British military to get legal OK to swat drones near bases
Armed Forces Bill would let troops take action against unmanned threats around defense sites Britain’s defense personnel will be given the authority to neutralize drones threatening military bases under measures being introduced in the Armed Forces Bill, currently making its…
Notepad++ hijacking blamed on Chinese Lotus Blossom crew behind Chrysalis backdoor
The group targets telecoms, critical infrastructure – all the usual high-value orgs Security researchers have attributed the Notepad++ update hijacking to a Chinese government-linked espionage crew called Lotus Blossom (aka Lotus Panda, Billbug), which abused weaknesses in the update infrastructure…
StopICE hacked to send alarming text messages, admins accuse border patrol agent of sabotage
The ICE-tracking service says it doesn’t store usernames or addresses ICE-reporting service StopICE has blamed a US Customs and Border Protection (CBP) agent for attacking its app and website and sending users text messages warning them that their information had…
Russia-linked APT28 attackers already abusing new Microsoft Office zero-day
Ukraine’s CERT says the bug went from disclosure to active exploitation in days Russia-linked attackers are already exploiting Microsoft’s latest Office zero-day, with Ukraine’s national cyber defense team warning that the same bug is being used to target government agencies…
McDonald’s is not lovin’ your bigmac, happymeal, and mcnuggets passwords
Your favorite menu item might be easy to remember but it will not secure your account Change Your Password Day took place over the weekend, and in case you doubt the need to improve this most basic element of cybersecurity…
OpenClaw patches one-click RCE as security Whac-A-Mole continues
Researchers disclose rapid exploit chain that let attackers run code via a single malicious web page Security issues continue to pervade the OpenClaw ecosystem, formerly known as ClawdBot then Moltbot, as multiple projects patch bot takeover and remote code execution…
Notepad++ update service hijacked in targeted state-linked attack
Breach lingered for months before stronger signature checks shut the door A state-sponsored cyber criminal compromised Notepad++’s update service in 2025, according to the project’s author.… This article has been indexed from The Register – Security Read the original article:…
Infrastructure cyberattacks are suddenly in fashion. We can buck the trend
Don’t be scared of the digital dark – learn how to keep the lights on Opinion Barely a month into 2026, electrical power infrastructure on two continents has tested positive for cyberattacks. One fell flat as attempts to infiltrate and…
Why native cloud security falls short
Your cloud security must stand alone Partner Content As cloud adoption accelerates, many organizations are increasingly relying on the native security features offered by cloud service providers (CSPs). The ability to manage web application firewalls (WAF), data encryption, and key…
Open-source AI is a global security nightmare waiting to happen, say researchers
Also, South Korea gets a pentesting F, US Treasury says bye bye to BAH, North Korean hackers evolve, and more Infosec in Brief As if AI weren’t enough of a security concern, now researchers have discovered that open-source AI deployments…
AI security startup CEO posts a job. Deepfake candidate applies, inner turmoil ensues.
‘I did not think it was going to happen to me, but here we are’ Nearly every company, from tech giants like Amazon to small startups, has first-hand experience with fake IT workers applying for jobs – and sometimes even…
January blues return as Ivanti coughs up exploited EPMM zero-days
Consider yourselves compromised, experts warn Ivanti has patched two critical zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) product that are already being exploited, continuing a grim run of January security incidents for enterprise IT vendors.… This article has been…
Thousands more Oregon residents learn their health data was stolen in TriZetto breach
Parent company Cognizant hit with multiple lawsuits Thousands more Oregonians will soon receive data breach letters in the continued fallout from the TriZetto data breach, in which someone hacked the insurance verification provider and gained access to its healthcare provider…
Java developers want container security, just not the job that comes with it
BellSoft survey finds 48% prefer pre‑hardened images over managing vulnerabilities themselves Java developers still struggle to secure containers, with nearly half (48 percent) saying they’d rather delegate security to providers of hardened containers than worry about making their own container…