
OneNote finally gets “paste text only” feature on Windows and Mac
OneNote is a powerful note-taking app, but that doesn't necessarily mean it has all the features you want. One of the missing features is 'Paste as text only,' and it's finally coming to OneNote. In a blog post, Microsoft confirmed that it's testing the ability...

Your CV is not fit for the 21st century • The Register
The job market is queasy and since you're reading this, you need to upgrade your CV. It's going to require some work to game the poorly trained AIs now doing so much of the heavy lifting. I know you don't want to, but it's best to think of this as dealing with...

RomCom and others exploiting zero-day vulnerability
ESET researchers have discovered a previously unknown vulnerability in WinRAR, being exploited in the wild by Russia-aligned group RomCom. This is at least the third time that RomCom has been caught exploiting a significant zero-day vulnerability in the wild....

Trend Micro reports two critical CVEs under active exploit • The Register
Infosec In Brief A critical vulnerability in the on-prem version of Trend Micro's Apex One endpoint security platform is under active exploitation, the company admitted last week, and there's no patch available. Trend Micro last week warned Apex One 2019...

DEF CON hackers plug security holes in US water systems • The Register
def con A DEF CON hacker walks into a small-town water facility…no, this is not the setup for a joke or a (super-geeky) odd-couple rom-com. It's a true story that happened at five utilities across four states. And now, nine months into providing free...

Google confirms data breach exposed potential Google Ads customers’ info
Google has confirmed that a recently disclosed data breach of one of its Salesforce CRM instances involved the information of potential Google Ads customers. "We're writing to let you know about an event that affected a limited set of data in one of Google's...

60 malicious Ruby gems downloaded 275,000 times steal credentials
Sixty malicious Ruby gems containing credential-stealing code have been downloaded over 275,000 times since March 2023, targeting developer accounts. The malicious Ruby gems were discovered by Socket, which reports they targeted primarily South Korean users of...

OpenAI to fix GPT-5 issues, double rate limits for paid users after outrage
OpenAI's CEO, Sam Altman, overpromised on GPT-5, and real-life results are underwhelming, but it looks like a new update is rolling out that might address some of the concerns. GPT-5 is a state-of-the-art model. In our tests, BleepingComputer found that GPT-5...

WinRAR zero-day exploited to plant malware on archive extraction
A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives...

Chinese biz using AI to influence US politicians • The Register
DEF CON A cache of documents uncovered by Vanderbilt University has revealed disturbing details about how a Chinese company is building up a database of US politicians and influencers with whom to share propaganda. A Vanderbilt security researcher says...