A bustling underground ecosystem is providing criminals with the tools to unlock iPhones—and wage phishing attacks against ...
Microsoft Threat Intelligence said attackers placed malicious code inside a Mistral AI download distributed through a Python ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
Google has identified the first zero-day exploit likely developed by artificial intelligence, marking a new era in cyber warfare. The exploit targeted two-factor authentication (2FA) and featured code ...
CDMA2000 was one of the protocols defined for 3G networks and is now years out of date and being phased out worldwide. Nevertheless, there are still vast numbers of phones that will happily connect to ...
The PCPJack worm targets cloud environments and vulnerable web applications to remove TeamPCP infections and steal ...
Claude AI guided a threat actor toward OT ICS SCADA systems in an attack on a water and drainage utility in Mexico.
Dive into The Register's online archive of incisive tech news reporting, features, and analysis dating back to 1998 ...
AI lowers attack barriers in 2025, enabling 7M-user breach and faster exploits, increasing scale and impact of cyber threats.
A viral Instagram hack shows how removable hanger clips can seal snack bags, reduce waste and organize your pantry without buying extra gadgets. ALBERTO PIZZOLI AFP via Getty Images Stop scrolling ...
Simple mobile phones resist sophisticated hacking and tracking better than smartphones Justice Department reaches $1.25 million settlement with Trump 2016 campaign aide over Russia probe This is what ...
The cryptocurrency industry is facing a severe security crisis. In just under 20 days, digital asset platforms have lost more than $605 million to cyberattacks. The latest and most devastating ...