The Register

Broadcom data stolen in payroll provider ransomware raid

A ransomware attack on Business Systems House (BSH) in September 2024 resulted in the theft of Broadcom employee data. At the time, Broadcom was transitioning to a new payroll provider, which may have contributed to the exposure.

CISA, FBI, nations warn of fast flux DNS threat

CISA, on Thursday urged organizations, internet service providers, and security firms to strengthen defenses against so-called fast flux attacks. Malicious cyber actors use fast flux to obfuscate the locations of malicious servers.

FTC's $25.5M Scam Refund Treats Victims to $34 Each

The refunds relate to a case last year in which two Cyprus-based companies, Restoro and Reimage, were accused of deceiving consumers through misleading computer repair services. The FTC alleged the operation started at least in 2018.

Two critical vulns lead to stolen MongoDB data, RCE

Security sleuths found two critical vulnerabilities in a third-party library that MongoDB relies on, which means bad guys can potentially steal data and run code. Mongoose also has two critical security flaws.

Two New OpenSSH Bugs Threaten Enterprise Security, Uptime

Qualys discovered the bugs (CVE-2025-26465 and CVE-2025-26466) in January, per its disclosure timeline. These vulnerabilities enable machine-in-the-middle (MitM) attacks and pre-authentication denial-of-service (DoS) attacks.

YouTube ID exploited to find Gmail deets, says researcher

A security researcher found that Google could leak the email addresses of YouTube channels. Last week he explained he found two vulnerabilities that, when chained, make it possible to sniff out the email addresses.
February 12, 2025

Triplestrength Hits Victims With Ransomware, Cloud Hijacks, Cryptomining

A previously unknown gang dubbed Triplestrength poses a triple threat to organizations: It infects victims' computers with ransomware, then hijacks their cloud accounts to illegally mine for cryptocurrency.

Google Details Nefarious Gemini Use by Iranian, Chinese, and North Korean Hackers

While state-backed actors have successfully used Gemini for tasks such as creating phishing content and gathering information on surveillance targets, Google has indicated that its protective measures have prevented the generation of malware.

Lazarus Group's Latest Heist Hits Hundreds of Victims Globally

North Korea's Lazarus Group compromised hundreds of victims across the globe in a massive secret-stealing supply chain attack that was ongoing as of earlier this month, according to security researchers.

Snoops exploited Fortinet firewalls with 'probable' 0-day

Miscreants running a "mass exploitation campaign" against Fortinet firewalls, which peaked in December, may be using an unpatched zero-day vulnerability to compromise the equipment.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags