Movatterモバイル変換


[0]ホーム

URL:


Sign in / up
The Register

Research

Posting AI-generated caricatures on social media is risky, infosec killjoys warn

The more you share online, the more you open yourself to social engineering
Research11 Feb 2026 |11

Payroll pirates are conning help desks to steal workers' identities and redirect paychecks

Exclusive Attackers using social engineering to exploit business processes, rather than tunnelling in via tech
Cyber-crime11 Feb 2026 |19

For the price of Netflix, crooks can now rent AI to run cybercrime

Group-IB says crims forking out for Dark LLMs, deepfakes, and more at subscription prices
Research20 Jan 2026 |4

Fast Pair, loose security: Bluetooth accessories open to silent hijack

Sloppy implementation of Google spec leaves 'hundreds of millions' of devices vulnerable
Research17 Jan 2026 |35

A simple CodeBuild flaw put every AWS environment at risk – and pwned 'the central nervous system of the cloud'

And it's 'not unique to AWS,' researcher tellsThe Reg
Research15 Jan 2026 |12

'Imagination the limit': DeadLock ransomware gang using smart contracts to hide their work

New crooks on the block get crafty with blockchain to evade defenses
Research14 Jan 2026 |2

Popular Python libraries used in Hugging Face models subject to poisoned metadata attack

The open-source libraries were created by Salesforce, Nvidia, and Apple with a Swiss group
Patches13 Jan 2026 |1

Mandiant open sources tool to prevent leaky Salesforce misconfigs

AuraInspector automates the most common abuses and generates fixes for customers
SaaS13 Jan 2026 |

OpenAI putting bandaids on bandaids as prompt injection problems keep festering

Happy Groundhog Day!
Research08 Jan 2026 |21

Fake Windows BSODs check in at Europe's hotels to con staff into running malware

Phishers posing as Booking.com use panic-inducing blue screens to bypass security controls
Research06 Jan 2026 |15

Your car’s web browser may be on the road to cyber ruin

Study finds built-in browsers across gadgets often ship years out of date
Research18 Dec 2025 |75

China's Ink Dragon hides out in European government networks

Misconfigured servers are in, 0-days out
Research16 Dec 2025 |13

Browser 'privacy' extensions have eye on your AI, log all your chats

More than 8 million people have installed extensions that eavesdrop on chatbot interactions
AI + ML16 Dec 2025 |28

Honeypots can help defenders, or damn them if implemented badly

Infosec In Brief PLUS: Crims could burn your AI budgets thanks to weak defaults; CISA's top 25 vulns for 2025; And more
Security14 Dec 2025 |3

10K Docker images spray live cloud creds across the internet

Flare warns devs are unwittingly publishing production-level secrets
Research11 Dec 2025 |12

As humanoid robots enter the mainstream, security pros flag the risk of botnets on legs

Interview Have we learned nothing from sci-fi films and TV shows?
Research09 Dec 2025 |45

Apache warns of 10.0-rated flaw in Tika metadata ingestion tool

Infosec in Brief PLUS: New kind of DDOS from the Americas; Predator still hunting spyware targets; NIST issues IoT advice; And more!
Security08 Dec 2025 |7

Novel clickjacking attack relies on CSS and SVG

Who needs JavaScript?
Research05 Dec 2025 |12

'Exploitation is imminent' as 39 percent of cloud environs have max-severity React hole

Finish reading this, then patch
Security03 Dec 2025 |33

Swiss government says give M365, and all SaaS, a miss as it lacks end-to-end encryption

Infosec In Brief PLUS: Exercise app tells spies to stop mapping; GitLab scan reveals 17,000 secrets; Leak exposes Iran’s Charming Kitten; And more!
Security01 Dec 2025 |28

Popular

Anthropic tries to hide Claude's AI actions. Devs hate it

The software doesn't show what files it's working on

Infosec exec sold eight zero-day exploit kits to Russia, says DoJ

Infosec in Brief PLUS: Fake ransomware group exposed; EC blesses Google's big Wiz deal; Alleged sewage hacker cuffed; And more

Final step to put new website into production deleted it instead

Who, Me? 02:00 AM is not the time to ignore procedures and rely on a shortcut to do a tricky job

Why AI writing is so generic, boring, and dangerous: Semantic ablation

opinion The subtractive bias we're ignoring

Cisco set to release home-brew hypervisor as a VMware alternative

Only for its own comms apps – whose users can probably do without a full private cloud

Penguin-powered platform board keels over at Alpine station

Bork!Bork!Bork! It must be that fresh mountain air

GPT-5 bests human judges in legal smack down

ai-pocalypse But that doesn't mean AI is ready to dispense justice

You probably can't trust your password manager if it's compromised

Researchers demo weaknesses affecting some of the most popular options

If Microsoft made a car... what would it be?

What is the automotive equivalent of Word, and where does Copilot fit?

Dutch cops arrest man after sending him confidential files by mistake

Bungled link handed over sensitive docs, and when recipient didn't cooperate, police opted for cuffs
MORE
STORIES

Zendesk users targeted as Scattered Lapsus$ Hunters spin up fake support sites

ReliaQuest finds fresh crop of phishing domains and toxic tickets
Research27 Nov 2025 |1

HashJack attack shows AI browsers can be fooled with a simple ‘#’

Hashtag-do-whatever-I-tell-you
AI + ML25 Nov 2025 |27

Fresh ClickFix attacks use Windows Update trick-pics to steal credentials

Poisoned PNGs contain malicious code
Security24 Nov 2025 |4

LLM-generated malware is improving, but don't expect autonomous attacks tomorrow

Researchers tried to get ChatGPT to do evil, but it didn't do a good job
Research20 Nov 2025 |2

Researchers claim 'largest leak ever' after uncovering WhatsApp enumeration flaw

Two-day exploit opened up 3.5 billion users to myriad potential harms
Research19 Nov 2025 |67

Tens of thousands more ASUS routers pwned by suspected, evolving China operation

Researchers say attacks are laying the groundwork for stealthy espionage activity
Cyber-crime19 Nov 2025 |37

Overconfidence is the new zero-day as teams stumble through cyber simulations

Readiness metrics have flatlined since 2023, with most sectors slipping backward as teams fumble crisis drills
Security17 Nov 2025 |7

UK asks cyberspies to probe whether Chinese buses can be switched off remotely

Norwegian testers claim maker has remote access, while UK importer says supplier complies with the law
Security11 Nov 2025 |74

LLM side-channel attack could allow snoops to guess what you're talking about

Updated Encryption protects content, not context
Research11 Nov 2025 |7

Previously unknown Landfall spyware used in 0-day attacks on Samsung phones

'Precision espionage campaign' began months before the flaw was fixed
Research07 Nov 2025 |8

MIT Sloan quietly shelves AI ransomware study after researcher calls BS

Even AI has doubts about the claim that '80% of ransomware attacks are AI-driven'
Research03 Nov 2025 |18

Proton trains new service to expose corporate infosec cover-ups

Service will tell on compromised organizations, even if they didn't plan on doing so themselves
Security30 Oct 2025 |

Invisible npm malware pulls a disappearing act – then nicks your tokens

PhantomRaven slipped over a hundred credential-stealing packages into npm
Security30 Oct 2025 |18

Researchers exploit OpenAI's Atlas by disguising prompts as URLs

NeuralTrust shows how agentic browser can interpret bogus links as trusted user commands
Research27 Oct 2025 |3

How malware vaccines could stop ransomware's rampage

Feature Security pros explore whether infection-spoofing code can immunize Windows systems against attack
Security21 Oct 2025 |24

Devs are writing VS Code extensions that blab secrets by the bucketload

Vibe coding may have played a role in what took researchers months to fix
Research15 Oct 2025 |10

Pro-Russia hacktivist group dies of cringe after falling into researchers' trap

Forescout's phony water plant fooled TwoNet into claiming a fake cyber victory – then it quietly shut up shop
Security10 Oct 2025 |10

Tile trackers are a stalker's dream, say Georgia Tech researchers

Plaintext transmissions, fixed MAC addresses, rotating 'unique' IDs, and more, make abuse easy
Research30 Sep 2025 |15

Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign

Not to be confused with all the other reports of Chinese intruders on US networks that came to light this week
Research27 Sep 2025 |14

Microsoft spots fresh XCSSET malware strain hiding in Apple dev projects

Upgraded nasty slips into Xcode builds, steals crypto, and disables macOS defenses
Security26 Sep 2025 |2

Google warns China-linked spies lurking in 'numerous' enterprises

Mandiant CTO anticipates 'hearing about this campaign for the next one to two years'
Research24 Sep 2025 |8

Nearly half of businesses suffered deepfaked phone calls against staff

AI attacks on the rise
Research23 Sep 2025 |5

Kaspersky: RevengeHotels checks back in with AI-coded malware

Old hotel scam gets an AI facelift, leaving travellers’ card details even more at risk
Research23 Sep 2025 |2

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack

Google and ETH Zurich found problems with AMD/SK Hynix combo, will probe other hardware
Research17 Sep 2025 |16

FileFix attacks use fake Facebook security alerts to trick victims into running infostealers

Tech evolved from PoC to global campaign in under two months
Security16 Sep 2025 |6

HybridPetya: More proof that Secure Boot bypasses are not just an urban legend

Although it hasn't been seen in the wild yet
Research12 Sep 2025 |23

AI-powered penetration tool, an attacker's dream, downloaded 10K times in 2 months

Shady, China-based company, all the apps needed for a fully automated attack - sounds totally legit
Research11 Sep 2025 |

Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets

AMD Zen hardware and Intel Coffee Lake affected
Research11 Sep 2025 |4

Apple slips up on ChillyHell macOS malware, lets it past security . . . for 4 years

'We do believe that this was likely the creation of a cybercrime group,' threat hunter tellsThe Reg
Research10 Sep 2025 |18

Internet mapping and research outfit Censys reveals state-based abuse, harassment

‘Universities are being used to proxy offensive government operations, turning research access decisions political’
Research03 Sep 2025 |19

LegalPwn: Tricking LLMs by burying badness in lawyerly fine print

Trust and believe – AI models trained to see 'legal' doc as super legit
AI + ML01 Sep 2025 |35

Researcher who found McDonald's free-food hack turns her attention to Chinese restaurant robots

Updated The controls were left wide open on Pudu's robots
Research29 Aug 2025 |34

ChatGPT hates LA Chargers fans

Harvard researchers find model guardrails tailor query responses to user's inferred politics and other affiliations
AI + ML27 Aug 2025 |15

Nx NPM packages poisoned in AI-assisted supply chain attack

Stolen dev credentials posted to GitHub as attackers abuse CLI tools for recon
Devops27 Aug 2025 |2

Who are you again? Infosec experiencing 'Identity crisis' amid rising login attacks

Vendor insists passkeys are the future, but getting workers on board is proving difficult
Research27 Aug 2025 |39

ZipLine attack uses 'Contact Us' forms, White House butler pic to invade sensitive industries

'Many dozens' targeted in ongoing campaign, CheckPoint researcher tellsThe Reg
Cyber-crime26 Aug 2025 |6

Fake CAPTCHA tests trick users into running malware

ClickFix tricks
Research22 Aug 2025 |31

Google yet to take down 'screenshot-grabbing' Chrome VPN extension

Updated Researcher claims extension didn't start out by exfiltrating info... while dev says its actions are 'compliant'
Research21 Aug 2025 |10

AI crawlers and fetchers are blowing up websites, with Meta and OpenAI the worst offenders

Updated One fetcher bot seen smacking a website with 39,000 requests per minute
AI + ML21 Aug 2025 |83

Facial recognition works better in the lab than on the street, researchers show

High accuracy scores come from conditions that don't reflect real-world usage
Research18 Aug 2025 |31

Boffins say tool can sniff 5G traffic, launch 'attacks' without using rogue base stations

UPdated Sni5Gect research crew targets sweet spot during device / network handshake pause
Research18 Aug 2025 |13

'MadeYouReset' HTTP/2 flaw lets attackers DoS servers

Researchers had to notify over 100 vendors of flaw that builds on 2023's Rapid Reset with neat twist past usual mitigations
Research14 Aug 2025 |7

Poisoned telemetry can turn AIOps into AI Oops, researchers show

Sysadmins, your job is safe
Networks12 Aug 2025 |6

Chinese biz using AI to hit US politicians, influencers with propaganda

DEF CON In misinformation, Russia might be the top dog but the Chinese are coming warns former NSA boss
Research08 Aug 2025 |17

Infosec hounds spot prompt injection vuln in Google Gemini apps

Black hat Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed
Research08 Aug 2025 |4

German security researchers say 'Windows Hell No' to Microsoft biometrics for biz

Black Hat Hello loophole could let a rogue admin, or a pwned one, inject new facial scans
Research07 Aug 2025 |31

Patch now: Millions of Dell PCs with Broadcom chips vulnerable to attack

black hat Psst, wanna steal someone's biometrics?
Patches05 Aug 2025 |20

Study finds humans not completely useless at malware detection

Some pinpointed software nasties but were suspicious of printer drivers too
Security05 Aug 2025 |11

Cybercrooks attached Raspberry Pi to bank network and drained ATM cash

Criminals used undocumented techniques and well-placed insiders to remotely withdraw money
Research01 Aug 2025 |26

Kremlin goons caught abusing ISPs to spy on Moscow-based diplomats, Microsoft says

Russia spying on foreign embassies? Say it ain't so
Security31 Jul 2025 |61

Silk Typhoon spun a web of patents for offensive cyber tools, report says

US court docs reveal that infamous Chinese snoops filed IP papers like tax returns
Research31 Jul 2025 |3

FBI: Watch out for these signs Scattered Spider is spinning its web around your org

New malware, even better social engineering chops
Cyber-crime29 Jul 2025 |11

Security pros are drowning in threat-intel data and it's making everything more dangerous

Plus, 60% don't have enough analysts to make sense of it
CSO28 Jul 2025 |17

Freelance dev shop Toptal caught serving malware after GitHub account break-in

updated Malicious code lurking in over 5,000 downloads, says Socket researcher
Cyber-crime25 Jul 2025 |2

Coyote malware abuses Microsoft's UI Automation to hunt banking creds

Some coyotes hunt squirrels, this one hunts users' financial apps
Research24 Jul 2025 |1

Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog

Computer scientist Peter Gutmann tells The Reg why it's 'bollocks'
Research17 Jul 2025 |97

Crims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkit

Updated Someone's OVERSTEPing the mark
Research16 Jul 2025 |3

Nvidia A6000 GPUs flip memory bits if beaten by GPUHammer

Rowhammer returns for more memory-meddling fun
Research14 Jul 2025 |4

How to trick ChatGPT into revealing Windows keys? I give up

No, really, those are the magic words
Research09 Jul 2025 |101

Massive browser hijacking campaign infects 2.3M Chrome, Edge users

updated These extensions weren't malware-laced from the start, researcher says
Research08 Jul 2025 |39

Phishing platforms, infostealers blamed as identity attacks soar

Get your creds in order or risk BEC, ransomware attacks, orgs warned
CSO07 Jul 2025 |

ChatGPT creates phisher’s paradise by recommending the wrong URLs for major companies

Crims have cottoned on to a new way to lead you astray
Research03 Jul 2025 |24

Cl0p cybercrime gang's data exfiltration tool found vulnerable to RCE attacks

Experts say they don't expect the MOVEit menace to do much about it
Research02 Jul 2025 |3

Computer vision research feeds surveillance tech as patent links spike 5×

A bottomless appetite for tracking people as 'objects'
Research25 Jun 2025 |3

Boffins devise voice-altering tech to jam 'vishing' schemes

To stop AI scam callers, break automatic speech recognition systems
Research19 Jun 2025 |42

Do you trust Xi with your 'private' browsing data? Apple, Google stores still offer China-based VPNs, report says

Some trace back to an outfit under US export controls for alleged PLA links
Research13 Jun 2025 |33

Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks

The 16 other flagged issues are on customers, says CRM giant
Research11 Jun 2025 |

Critical Wazuh bug exploited in growing Mirai botnet infection

The open-source XDR/SIEM provider’s servers are in other botnets’ crosshairs too
Research10 Jun 2025 |

Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser

Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more
Research10 Jun 2025 |59

Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs

SentinelOne discovered the campaign when they tried to hit the security vendor's own servers
Research09 Jun 2025 |17

ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist

OpenAI boots accounts linked to 10 malicious campaigns
Research06 Jun 2025 |23

More than a hundred backdoored malware repos traced to single GitHub user

Someone went to great lengths to prey on the next generation of cybercrooks
Cyber-crime05 Jun 2025 |12

AI kept 15-year-old zombie vuln alive, but its time is drawing near

Researchers have come up with a fix for a path traversal bug first spotted in 2010
Research05 Jun 2025 |27

Meta pauses mobile port tracking tech on Android after researchers cry foul

Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins
Research03 Jun 2025 |53

8,000+ Asus routers popped in 'advanced' mystery botnet plot

No formal attribution made but two separate probes hint at the same suspect
Research29 May 2025 |10

Ivanti makes dedicated fans of Chinese spies who just can't resist attacking its buggy kit

If it ain't broke?
Datacenter Networking Nexus23 May 2025 |1

'Ongoing' Ivanti hijack bug exploitation reaches clouds

Nothing like insecure code in security suites
CSO21 May 2025 |4

Intel's data-leaking Spectre defenses scared off yet again

Updated ETH Zurich boffins exploit branch prediction race condition to steal info from memory, fixes have mild perf hit
Research13 May 2025 |5

You think ransomware is bad now? Wait until it infects CPUs

RSAC Rapid7 threat hunter wrote a PoC. No, he's not releasing it
Research11 May 2025 |64

Ghost in the shell script: Boffins reckon they can catch bugs before programs run

Go ahead, please do Bash static analysis
CSO30 Apr 2025 |39
MORE STORIES

[8]ページ先頭

©2009-2026 Movatter.jp