Advertisement · 728 × 90

Posts by Jessica Lyons

Preview
MCP 'design flaw' puts 200k servers at risk: Researcher : Bug or feature?

A design flaw – or expected behavior based on a bad design choice, depending on who is telling the story – baked into Anthropic's official Model Context Protocol (MCP) puts as many as 200,000 servers at risk of complete takeover, according to security researchers.

3 days ago 1 0 0 0
Preview
Anthropic's Project Glasswing CVE count is still guesswork : Like the majority of the companies participating, it remains a mystery

Anthropic surprised the world by declaring that its latest model, Mythos, is so good at bug hunting that it would create chaos if released. Now, with Project Glasswing, 50+ select orgs are testing the hyped up LLM to find holes in their own products. But just how many problems have they discovered?

5 days ago 2 1 0 0
Preview
Anthropic, Google, Microsoft paid AI bug bounties – quietly Exclusive: Researchers who found the flaws scored beer money bounties and warn the problem is probably pervasive

EXCLUSIVE: Security researchers hijacked three popular AI agents that integrate with GitHub Actions by using a new type of prompt injection attack to steal API keys and access tokens, and the vendors who run agents didn’t disclose the problem.

5 days ago 1 1 0 0
Preview
Fake Linux Foundation leader using Slack to phish devs : Google Sites lure leads to bogus root certificate

An unknown malware slinger targeting open source software developers via Slack impersonated a real Linux Foundation official and used pages hosted on Google to steal developers' credentials and take over their systems.

1 week ago 2 1 1 0

Here's my latest: A tale of two supply-chain attacks. Different attackers, but they both targeted open source software and developer environments and shares similar end goals.

1 week ago 4 1 0 0

😆

1 week ago 0 0 0 0

And yet it still works. Every. Time.

1 week ago 1 0 0 0
Advertisement

The struggle is real…

1 week ago 0 0 0 0
Preview
Don't glamorize cybercrims, roast them instead interview: True-crime tales of criminals making fools of themselves

"Everybody's glorifying threat actors, and that's not helping our customers or organizations. These are just individuals, they just use computers, and they just want to steal your data and make money. They're not mythical. They don't have superpowers," Trellix VP John Fokker told me.

2 weeks ago 4 0 0 0

💯

2 weeks ago 3 0 0 0
Preview
Fake Claude Code source downloads actually delivered malware : Source code with a side of Vidar stealer and GhostSocks

Tens of thousands of people eagerly downloaded the leaked Claude Code source code this week, and hundreds - if not more - of those downloads came with a side of credential-stealing malware.

2 weeks ago 133 65 2 20
Preview
1K+ cloud environments infected via Trivy attack RSAC 2026: Crims 'creating a snowball effect' across open source projects

We are seeing a dangerous convergence between supply chain attackers and high-profile extortion groups like Lapsus$," Ben Read, a lead researcher at Wiz, told me via @theregister.com on Tuesday.

3 weeks ago 0 2 0 0
Preview
Iran cyberattack against med tech firm 'just the beginning' : Even without a navy, or air power, 'They'll still have the ability to hack'

“We can remove their navy. We can remove their air power. We can attack them across all instruments of power, diplomatic, information, military, and economic. And they'll still have the ability to hack," retired US Army Lt. Gen. Ross Coffman told me via @theregister.com

1 month ago 1 1 0 0

This story is not about Handala, However, when I mention Handala in this piece, it says the hacktivist crew is a MOIS front. Just like every other story I have written about Handala.

1 month ago 0 0 0 0
Preview
SocksEscort fraud-enabling proxy service taken down : International cops stuck down 23 servers in 7 countries

BREAKING: FBI, international cops take down SocksEscort, a residential proxy service used by criminals to compromise hundreds of thousands of routers worldwide. FBI Deputy Assistant Director Jason Bilnoski spoke exclusively to @theregister.com about the disruption.

1 month ago 1 0 0 0

It's good to be back with @theregister.com Kettle! Give us a listen and subscribe on Apple podcasts, Spotify, whatever podcast platform you like.

1 month ago 1 1 0 0
Preview
AI agent hacked McKinsey chatbot for read-write access : David and Goliath…but with AI agents

Researchers at red-team security startup CodeWall told us their AI agent hacked McKinsey's internal AI platform and gained full read and write access to the chatbot in just two hours. www.theregister.com/2026/03/09/m...

1 month ago 7 2 2 0
Advertisement
Preview
ShinyHunters claims yet another Salesforce customers breach : And they abused a Mandiant-developed open source tool in the attacks

ShinyHunters told me via @theregister.com that the extorion crew has stolen data from about 100 high-profile companies in its latest Salesforce customer data heist, including Salesforce itself.

1 month ago 3 5 0 0
Preview
Dev stunned by $82K Gemini API key bill after theft : Probably not an isolated incident only as researchers have already found 2,863 live API keys exposed

A developer says their company is on the hook for more than $82,000 in unauthorized charges after a stolen Google Gemini API key racked massive usage costs up in just 48 hours.

1 month ago 1 0 0 0
Preview
DEF CON hackers 'fed up with government,' Jake Braun says Interview: Jake Braun thinks hackers need to create a 'Digital arsenal of democracy' to defend us all

Thinking back to Ben Franklin, we saw society moving in the right direction for the last 500 years because of our commitment to science, human rights, etc., and that seems to be at the very least slowing down, if not reversing,” Jake Braun told me via The Register.

1 month ago 1 1 0 0
Preview
They Helped Women Fight Online Abuse. They Were Barred From the U.S.

well this is bullshit

1 month ago 1 0 1 0
Preview
Americans sue Homeland Security over 'illegal' surveillance : 'This is a warning. We know you live right here'

Two US residents have sued several Homeland Security agencies and officials, including Secretary Kristi Noem, for allegedly using surveillance tools to harass them, branding them as "domestic terrorists," and even showing up at their homes based on license-plate recognition.

1 month ago 8 3 0 0
Preview
Adidas investigates third-party data breach : 'Potential data protection incident' at an 'independent licensing partner,' we're told

BREAKING: Adidas has confirmed it is investigating a third-party breach at one of its partner companies after digital thieves claimed they stole information and technical data from the German sportswear giant.

2 months ago 3 2 0 0

agreed

2 months ago 0 0 0 0
Preview
ShinyHunters allegedly drove off with 1.7M CarGurus records : Latest in a rash of grab-and-leak data incidents

CarGurus allegedly suffered a data breach with 1.7 million corporate records stolen, according to a notorious cybercrime crew that posted the online vehicle marketplace on its leak site on Wednesday.

2 months ago 0 0 0 0
Advertisement
Preview
Ransomware crews abuse bossware to blend into networks : As if snooping on your workers wasn't bad enough

Your supervisor may like using employee monitoring apps to keep tabs on you, but crims like the snooping software even more. Threat actors are now using legit bossware to blend into corporate networks and attempt ransomware deployment.

HT: @huntress.com security operations analyst Michael Tigges

2 months ago 2 1 1 0
Preview
Google Fulfilled ICE Subpoena Demanding Student Journalist’s Bank and Credit Card Numbers Amandla Thomas-Johnson didn't know how much information ICE requested in a subpoena now. Google never gave him a chance to fight it.

Don't be evil, Google

2 months ago 1 0 0 0
Preview
Payroll pirates conned the help desk, stole employee’s pay Exclusive: Attackers using social engineering to exploit business processes, rather than tunnelling in via tech

EXCLUSIVE: I spoke with Binary Defense lead threat hunter John Dwyer about a new type of payroll scam where attackers call the help desk, force an MFA token reset, and use the org's own VDI to access HR platforms and reroute paychecks. As John told me: "Every employee on earth becomes a target."

2 months ago 0 0 0 0
Preview
AWS intruder pulled off AI-assisted cloud break-in in 8 mins UPDATED: LLMs automated most phases of the attack

A digital intruder broke into an AWS cloud environment and in just under 10 minutes went from initial access to administrative privileges, thanks to an AI speed assist.

2 months ago 1 1 0 0
Preview
Incident Report: CVE-2024-YIKES A series of unfortunate events.

Best thing I've read all day.

2 months ago 6 4 1 0