The Register on MSN
30+ Chrome extensions disguised as AI chatbots steal users' API keys, emails, other sensitive data
Are you a good bot or a bad bot? More than 30 malicious Chrome extensions installed by at least 260,000 users purport to be ...
Supply-chain cyberattacks have entered a more aggressive phase: extortion. Instead of quietly stealing data or slipping ...
Learn how IT leaders reduce credential sprawl, regain access visibility, and limit risk using centralized identity controls, SSO, and password management.
Warlock ransomware breached SmarterTools via unpatched SmarterMail, exploiting critical flaws to access Windows systems and deploy encryption payloads ...
Adversaries weaponized recruitment fraud to steal cloud credentials, pivot through IAM misconfigurations, and reach AI ...
Multiple critical vulnerabilities in the popular n8n open-source workflow automation platform allow escaping the confines of ...
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native ...
AI browsers can be hijacked through prompt injection, turning assistants into insider threats. Learn how these exploits work & how to protect data.
RedLine, Lumma, and Vidar adapted in 48 hours. Clawdbot's localhost trust model collapsed, plaintext memory files sit exposed, and traditional defenses can't see the threat. Security teams are already ...
Truebit lost $26 million after a smart-contract overflow bug let an attacker mint tokens at near-zero cost, sending the TRU price down 99%. A $26 million exploit of the offline computation protocol ...
A torrent of proof-of-concept (PoC) exploits for React2Shell has hit the internet following the vulnerability's disclosure last week, and while security researchers say most are fake, ineffective and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results