UEFI flaws allow bootkits to pwn potentially hundreds of devices using images Exploits bypass most secure boot solutions from the biggest chip vendors Research01 Dec 2023 | 23
Weak session keys let snoops take a byte out of your Bluetooth traffic BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets Research30 Nov 2023 | 12
How to give Windows Hello the finger and login as someone on their stolen laptop Not that we're encouraging anyone to defeat this fingerprint authentication Research22 Nov 2023 | 90
BlackCat plays with malvertising traps to lure corporate victims Updated Ads for Slack and Cisco AnyConnect actually downloaded Nitrogen malware Research16 Nov 2023 | 1
Google Workspace weaknesses allow plaintext password theft Exploits come with caveats, but Google says no fixes as user security should do the heavy lifting here Research15 Nov 2023 | 2
Ransomware more efficient than ever, and baddies are still after your logs Trying times for incident responders who battle fastest-ever ransomware blitz as attackers keep scrubbing evidence clean Research15 Nov 2023 | 3
AMD SEV OMG: Trusted execution in VMs undone by bad hypervisors' cache meddling Let's do the CacheWarp again Research14 Nov 2023 | 7
Passive SSH server private key compromise is real ... for some vulnerable gear OpenSSL, LibreSSL, OpenSSH users, don't worry – you can sit this one out Research14 Nov 2023 | 12
Downfall fallout: Intel knew AVX chips were insecure and did nothing, lawsuit claims Billions of data-leaking processors sold despite warnings and patch just made them slower, punters complain Research09 Nov 2023 | 27
Fresh find shines new light on North Korea’s latest macOS malware Months of work reveals how this tricky malware family targets... the financial services sector Research07 Nov 2023 | 4
Cybercrooks amp up attacks via macro-enabled XLL files Neither Excel nor PowerPoint safe as baddies continue to find ways around protections Research01 Nov 2023 | 6
Cryptojackers steal AWS credentials from GitHub in 5 minutes Researchers just scratching surface of their understanding of campaign dating back to 2020 Research30 Oct 2023 | 3
F5 hurriedly squashes BIG-IP remote code execution bug Fixes came earlier than scheduled as vulnerability became known to outsiders Research27 Oct 2023 | 3
Microsoft unveils shady shenanigans of Octo Tempest and their cyber-trickery toolkit Gang thought to be behind attack on MGM Resorts has a skillset larger than most cybercrime groups in existence Research27 Oct 2023 | 1
Side channel attacks take bite out of Apple silicon with iLeakage exploit Nearly six years on from Spectre and Meltdown, novel method steals passwords, emails, texts Research26 Oct 2023 | 10
ServiceNow quietly addresses unauthenticated data exposure flaw from 2015 Researcher who publicized issue brands company’s communication 'appalling' Research26 Oct 2023 | 3
British boffins say aircraft could fly on trash, cutting pollution debt by 80% Domestic jets can use 'municipal solid waste' to fly the friendly skies Research17 Oct 2023 | 115
BLOODALCHEMY provides backdoor to southeast Asian nations' secrets Sophisticated malware devs believed to be behind latest addition to toolset of China-aligned attackers Research16 Oct 2023 | 1
Calls for Visual Studio security tweak fall on deaf ears despite one-click RCE exploit Two years on and Microsoft refuses to address the issue Research13 Oct 2023 | 11
Squid games: 35 security holes still unpatched in proxy after 2 years, now public We'd like to say don't panic … but maybe? Research13 Oct 2023 | 10
Google Drive misplaces months' worth of customer files Updated The horror of logging in only to find everything since May has vanished
Microsoft opens sources ThreadX under MIT license The 'Azure RTOS' used in millions of Raspberry Pis is now FOSS
No new top boss at NSA until it answers questions about buying up location, browsing data Senator Ron Wyden puts his foot down – for as long as he can
Scores of US credit unions offline after ransomware infects backend cloud outfit Supply chain attacks: The gift that keeps on giving
DevTernity conference collapses amid claims women speakers were faked Anna? Oh, she was just a demo persona, says organizer
UK government rings the death knell for SIM farms Acts under the guise of protecting the public from fraud, yet history suggests Home Office has other motives
Adobe's buy of Figma is 'likely' bad for developers, rules UK regulator Competition Markets Authority claims merger will reduce innovation for designers and other creative types
IT sent the intern to sort out the nasty VP who was too important to bother with backups Who, Me? Kid escaped from the executive suite without screwing things up
Data-destroying defect found after OpenZFS 2.2.0 release Updated Earlier and later versions may be affected – worth your while reading the advisories
Ransomware-hit British Library: Too open for business, or not open enough? Opinion Unique institutions need unique security. Instead, they're fobbed off with the same old, same old
Everest cybercriminals offer corporate insiders cold, hard cash for remote access The ransomware gang changes identities more than Jason Bourne Research12 Oct 2023 | 9
Mirai reloads exploit arsenal as botnet embarks on another expansion drive With 13 new payloads it's the biggest update to the botnet in months Research10 Oct 2023 |
Researcher bags two-for-one deal on Linux bugs while probing GNOME component One-click exploit could potentially affect most major distros Research10 Oct 2023 | 12
Ransomware attacks register record speeds thanks to success of infosec industry Dwell times drop to hours rather than days for the first time Research10 Oct 2023 | 3
ROBOT crypto attack on RSA is back as Marvin arrives More precise timing tests find many implementations vulnerable Research26 Sep 2023 | 9
Marvell disputes claim Cavium backdoored chips for Uncle Sam Allegations date back a decade to leaked Snowden docs Research19 Sep 2023 | 8
Cryptojackers spread their nets to capture more than just EC2 AMBERSQUID operation takes AWS's paths less travelled in search of compute Research18 Sep 2023 | 3
Probe reveals previously secret Israeli spyware that infects targets via ads Oh s#!t, Sherlock Research16 Sep 2023 | 73
Used cars? Try used car accounts: 15,000 up for grabs online at just $2 a pop Cut and shut is so last century, now it's copy and clone Research13 Sep 2023 | 9
How to snoop on passwords with this one weird trick (involving public Wi-Fi signals) Fun technique – but how practical is it? Research13 Sep 2023 | 20
China caught – again – with its malware in another nation's power grid 'Obtaining a disruptive capability could be one possible motivation behind this surge in attacks' Research12 Sep 2023 | 20
Microsoft: China stole secret key that unlocked US govt email from crash debug dump Mistakes were made, lessons learned, stuff now fixed, says Windows maker Research06 Sep 2023 | 54
Meatbag mishaps more menacing than malware? CISOs think so Company boards, on the other hand, aren't letting cybersecurity disturb their sleep as much Research06 Sep 2023 | 6
Kremlin-backed Sandworm strikes Android devices with data-stealing Infamous Chisel Five Eyes nations warn of hit against Ukrainian military systems Research31 Aug 2023 | 4
Apple's defense against apps vandalizing other apps still broken, developer claims Updated Cupertino appears to be blasé about long-standing macOS bug, so coder has blabbed Research22 Aug 2023 | 17
Microsoft: Codesys PLC bugs could be exploited to 'shut down power plants' What are these gadgets running, Windows? Ka-boom-tsch Research11 Aug 2023 | 10
There's a good chance your VPN is vulnerable to privacy-menacing TunnelCrack attack Especially on Apple gear, uni team says Research10 Aug 2023 | 25
Stalkerware slinger LetMeSpy shuts down for good after database robbery If you can't trust a spyware developer with your info, who can you trust? Research07 Aug 2023 | 4
Old-school hacktivism is back because it never went away Mysterious Team Bangladesh has carried out 846 attacks since June 2022, mostly DDoS Research03 Aug 2023 | 7
Bad news: Another data-leaking CPU flaw. Good news: It's utterly impractical Collide+Power vulnerability leaks secrets bit by bit - but could take months or years to learn a useful secret Research01 Aug 2023 | 4
TETRA radio comms used by emergency heroes easily cracked, say experts Updated If it looks like a backdoor, walks like a backdoor, maybe it's ... export control Research24 Jul 2023 | 60
Microsoft puts out Outlook fire, says everything's fine with Teams malware flaw Redmond's not fixing the latter because it 'relies on social engineering' Research06 Jul 2023 | 28
RAM-ramming Rowhammer is back – to uniquely fingerprint devices Just use it sparingly, as it may crash equipment or burn out memory Black Hat and DEF CON05 Jul 2023 | 30
It's 2023 and memory overwrite bugs are not just a thing, they're still number one Cough, cough, use Rust. Plus: Eight more exploited bugs added to CISA's must-patch list Research29 Jun 2023 | 71
Warning: JavaScript registry npm vulnerable to 'manifest confusion' abuse Failure to match metadata with packaged files is perfect for supply chain attacks Research27 Jun 2023 | 12
Microsoft: Russia sent its B team to wipe Ukrainian hard drives WhisperGate-spreading Cadet Blizzard painted as haphazard but dangerous crew Research16 Jun 2023 | 10
These Microsoft Office security signatures are 'practically worthless' Updated Turns out it's easy to forge documents relying on OOXML Research13 Jun 2023 | 14
Qbot malware adapts to live another day … and another … Operators stay ahead of defenders with new access methods and C2 infrastructure Research05 Jun 2023 | 3
Dark Pink cyber-spies add info stealers to their arsenal, notch up more victims Not to be confused with K-Pop sensation BLACKPINK, gang pops military, govt and education orgs Research01 Jun 2023 | 3
Alien versus Predator? No, this Android spyware works together Phone-hugging code can record calls, read messages, track geolocation, access camera, other snooping Research27 May 2023 | 8
Spotted: Suspected Russian malware designed to disrupt Euro, Asia energy grids Updated For simulation or for real, we don't like the vibes from this CosmicEnergy Research25 May 2023 | 8
Upstart encryption app walks back privacy claims, pulls from stores after probe Try not leaving a database full of user info, chats, keys exposed, eh? Research17 May 2023 | 40
Let white-hat hackers stick a probe in those voting machines, say senators HAVA go at breaking electronic ballot box security Research11 May 2023 | 47
DEF CON to set thousands of hackers loose on LLMs Can't wait to see how these AI models hold up against a weekend of red-teaming by infosec's village people Research06 May 2023 | 27
How fiends abuse an out-of-date Microsoft Windows driver to infect victims It's like those TV movies where a spy cuts a wire and the whole building's security goes out Research24 Apr 2023 | 16
Firmware is on shaky ground – let's see what it's made of Opinion Old architectures just don't stack up Research17 Apr 2023 | 69
Another zero-click Apple spyware maker just popped up on the radar again Pegasus, pssh, you so 2000-and-late Research12 Apr 2023 | 8
Welcome to open source, Elon. Your Twitter code just got a CVE for shadow ban bug Plus: Substack shanked by bitter Twitter? Research07 Apr 2023 | 14
CAN do attitude: How thieves steal cars using network bus It starts with a headlamp and fake smart speaker, and ends in an injection attack and a vanished motor Research06 Apr 2023 | 198
April brings tulips, taxes ... and phisherfolk scammers Tactical#Octopus: Don't let users click on that zip file Research03 Apr 2023 | 6
Leaked IT contractor files detail Kremlin's stockpile of cyber-weapons Snowden-esque 'Vulkan' dossier links Moscow firm to FSB, GRU, SRV Defense Tech Week31 Mar 2023 | 28
Warning: Your wireless networks may leak data thanks to Wi-Fi spec ambiguity How someone can nab buffered info, by hook or by kr00k Spotlight on RSA30 Mar 2023 | 15
Gone in 120 seconds: Tesla Model 3 child's play for hackers In brief Plus OIG finds Uncle Sam fibbed over Login.gov Research27 Mar 2023 | 37
Cisco kindly reveals proof of concept attacks for flaws in rival Netgear's kit Maybe this is deserved given the problem's in a hidden telnet service Research22 Mar 2023 | 24
Refreshed from its holiday, Emotet has gone phishing Notorious botnet starts spamming again after a three-month pause Research09 Mar 2023 | 2
Frankenstein malware stitched together from code of others disguised as PyPI package Crime-as-a-service vendors mix and match components as needed by client Research03 Mar 2023 | 3
Fast-evolving Prilex POS malware can block contactless payments ... forcing users to insert their cards into less-secure PIN systems Research03 Feb 2023 | 16
Malvertising attacks are distributing .NET malware loaders The campaign illustrates another option for miscreants who had relied on Microsoft macros Research02 Feb 2023 | 7
Microsoft closes another door to attackers by blocking Excel XLL files from the internet More of them used by baddies since Redmond blocked VBA macros Research25 Jan 2023 | 6
Microsoft took its macros and went home, so miscreants turned to Windows LNK files Adapt or die Research23 Jan 2023 | 6
How to track equipped cars via exploitable e-ink platemaker Miscreants could have tracked, modified, deleted digital plates Research10 Jan 2023 | 90
Dridex malware pops back up and turns its attention to macOS Malware testers spot attempt to attack Macs. But (try not to weep for the bad guys) there are still compatibility issues with MS exe files Research06 Jan 2023 | 6
Legit Android apps poisoned by sticky 'Zombinder' malware Sure, go ahead and load APKs instead of using an app store. You won't enjoy the results Research09 Dec 2022 | 25
Meta links US military to fake social media influence campaigns Didn't say they were good, though – covert ops apparently got 'little to no engagement' from targets Research24 Nov 2022 | 20
Still using a discontinued Boa web server? Microsoft warns of supply chain attacks Flaws in the open-source tool exploited – and India's power grid was a target Research23 Nov 2022 | 10
WASP malware stings Python developers Info-stealing trojan hides in malicious PyPI packages on GitHub Research16 Nov 2022 | 9
Robin Banks crooks back at the table with fresh phish from Russia Phishing-as-a-service group's toolset now includes ways to get around MFA Research08 Nov 2022 | 1
All the US midterm-related lies to expect when you're electing Don't like the results? The election must have been rigged Research07 Nov 2022 | 149
Oh, look: More malware in the Google Play store in brief Also, US media hit with JavaScript supply chain attack, while half of govt employees use out-of-date mobile OSes Research07 Nov 2022 | 25
Double-check demand payment emails from law firms: Convincing fakes surface Crimson Kingsnake impersonates legit attorneys, fakes email threads from your colleagues in far-reaching BEC campaign Research04 Nov 2022 | 15
Ordinary web access request or command to malware? Cranefly group unleashes nasty little technique using Microsoft Internet Information Services (IIS) logs Research31 Oct 2022 | 4
This Windows worm evolved into slinging ransomware. Here's how to detect it Raspberry Robin hits 1,000 orgs in just one month Research28 Oct 2022 | 12
Purpleurchin cryptocurrency miners spotted scouring free GitHub, Heroku accounts This is why we can't have nice things Research27 Oct 2022 | 14
DHL named most-spoofed brand in phishing With Microsoft and LinkedIn close on shipping giant's heels Research24 Oct 2022 | 4
Good news, URSNIF no longer a banking trojan. Bad news, it's now a backdoor And one designed to slip ransomware and data-stealing code onto infected machines Research21 Oct 2022 | 1
Tear in Microsoft Azure Service Fabric can give attackers full admin privileges Orca Security disclosed the bug, and older versions remain vulnerable Research19 Oct 2022 |
Phishing works so well crims won't bother with deepfakes, says Sophos chap People reveal passwords if you ask nicely, so AI panic is overblown Research17 Oct 2022 | 15
Criminal multitool LilithBot arrives on malware-as-a-service scene Bespoke botnet up for grabs from outfit praised for, er, customer service Research10 Oct 2022 | 1
Loads of PostgreSQL systems are sitting on the internet without SSL encryption They probably shouldn't be connected in the first place, says database expert Research07 Oct 2022 | 20
Steganography alert: Backdoor spyware stashed in Microsoft logo Now that's sticker shock Research02 Oct 2022 | 27
Microsoft warns of North Korean crew posing as LinkedIn recruiters State-sponsored ZINC allegedly passes on malware-laden open source apps Research30 Sep 2022 | 10
How CIA betrayed informants with shoddy front websites built for covert comms Top tip, don't give your secret login box the HTML form type 'password' Research29 Sep 2022 | 37
Pentagon is far too tight with its security bug bounties But overpriced, useless fighter jets? That's something we can get behind Research29 Sep 2022 | 16
Matrix chat encryption sunk by five now-patched holes You take the green pill, you'll spend six hours in a 'don't roll your own crypto' debate Research28 Sep 2022 | 8
The web's cruising at 13 million new and nefarious domain names a month Or so Akamai is dying to tell us Research28 Sep 2022 | 10
Want to sneak a RAT into Windows? Buy Quantum Builder on the dark web Beware what could be hiding in those LNK shortcuts Research28 Sep 2022 | 4
China's infosec researchers obeyed Beijing and stopped reporting vulns ... or did they? Report finds increase in anonymous vuln reports Research27 Sep 2022 | 4
Can reflections in eyeglasses actually leak info from Zoom calls? Here's a study into it About time someone shone some light onto this Security17 Sep 2022 | 68
Mandiant links APT42 to Iranian 'terrorist org' 'It's hard to imagine a more dangerous scenario,' Mandiant Intel VP told The Reg Research07 Sep 2022 | 27
Oh no, that James Webb Space Telescope snap might actually contain malware Is nothing sacred? Research01 Sep 2022 | 25