❌

Normal view

Received β€” 2 February 2026 ⏭ The Register – Security

StopICE hacked to send alarming text messages, admins accuse border patrol agent of sabotage

2 February 2026 at 20:16

The ICE-tracking service says it doesn't store usernames or addresses

ICE-reporting service StopICE has blamed a US Customs and Border Protection (CBP) agent for attacking its app and website and sending users text messages warning them that their information had been "sent to the authorities."…

Russia-linked APT28 attackers already abusing new Microsoft Office zero-day

2 February 2026 at 19:18

Ukraine’s CERT says the bug went from disclosure to active exploitation in days

Russia-linked attackers are already exploiting Microsoft's latest Office zero-day, with Ukraine's national cyber defense team warning that the same bug is being used to target government agencies inside the country and organizations across the EU.…

McDonald's is not lovin' your bigmac, happymeal, and mcnuggets passwords

Your favorite menu item might be easy to remember but it will not secure your account

Change Your Password Day took place over the weekend, and in case you doubt the need to improve this most basic element of cybersecurity hygiene, even McDonald's – yes, the fast food chain – is urging people to get more creative when it comes to passwords. …

Infrastructure cyberattacks are suddenly in fashion. We can buck the trend

2 February 2026 at 11:15

Don't be scared of the digital dark – learn how to keep the lights on

OpinionΒ  Barely a month into 2026, electrical power infrastructure on two continents has tested positive for cyberattacks. One fell flat as attempts to infiltrate and disrupt the Polish distribution grid were rebuffed and reported. The other, earlier attack was part of Operation Absolute Resolve, the US abduction of Venezuela's President Maduro from Caracas on January 3.…

Why native cloud security falls short

2 February 2026 at 09:00

Your cloud security must stand alone

Partner ContentΒ  As cloud adoption accelerates, many organizations are increasingly relying on the native security features offered by cloud service providers (CSPs). The ability to manage web application firewalls (WAF), data encryption, and key management (KMS) within a single provider ecosystem appears efficient and convenient. However, when security and reliability are viewed through the lens of enterprise risk management, this convenience may come at a significant cost.…

Open-source AI is a global security nightmare waiting to happen, say researchers

Also, South Korea gets a pentesting F, US Treasury says bye bye to BAH, North Korean hackers evolve, and more

Infosec in BriefΒ  As if AI weren't enough of a security concern, now researchers have discovered that open-source AI deployments may be an even bigger problem than those from commercial providers. …

Received β€” 1 February 2026 ⏭ The Register – Security

Thousands more Oregon residents learn their health data was stolen in TriZetto breach

30 January 2026 at 19:32

Parent company Cognizant hit with multiple lawsuits

Thousands more Oregonians will soon receive data breach letters in the continued fallout from the TriZetto data breach, in which someone hacked the insurance verification provider and gained access to its healthcare provider customers across multiple US states.…

Java developers want container security, just not the job that comes with it

30 January 2026 at 01:12

BellSoft survey finds 48% prefer pre‑hardened images over managing vulnerabilities themselves

Java developers still struggle to secure containers, with nearly half (48 percent) saying they'd rather delegate security to providers of hardened containers than worry about making their own container security decisions.…

Received β€” 29 January 2026 ⏭ The Register – Security

To stop crims, Google starts dismantling residential proxy network they use to hide

29 January 2026 at 18:00

The Chocolate Factory strikes again, targeting the infrastructure attackers use to stay anonymous

Crims love to make it look like their traffic is actually coming from legit homes and businesses, and they do so by using residential proxy networks. Now, Google says it has "significantly degraded" what it believes is one of the world's largest residential proxy networks.…

Seven habits that help security teams reduce risk without slowing delivery

29 January 2026 at 17:01

The right habits change everything

Sponsored PostΒ  Security teams are under pressure from every direction: supply chain threats are rising, regulatory expectations are tightening, and development cycles aren’t getting any slower. Yet for many organizations, the practical work of improving software security still comes down to the same challenge β€” how do you reduce exposure without constantly battling developers, delaying releases, or piling on process?

That’s where a more consistent set of habits can make a measurable difference.
Rather than treating software supply chain security as a one-off initiative, many teams are shifting toward repeatable practices they can build into everyday workflows. The goal isn’t perfection; it’s improving baseline security in ways that actually stick, across teams and tool chains.

Chainguard is hosting an upcoming webinar-style event designed to help security and engineering leaders identify the habits that matter most. The session exploresΒ seven practical approachesΒ for building more secure software pipelines, with a focus on reducing risk while keeping delivery moving.…

❌