
Black Hat’s network ops center brings rivals together • The Register
Black Hat Neil "Grifter" Wyler is spending the week "looking for a needle in a needle stack," a task he'll perform from the network operations center (NOC) that powers the Black Hat security conference in Las Vegas. The Register popped in to check it out. We...

Does successful cybersecurity today increase cyber risk tomorrow?
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes 07 Aug 2025 • , 3 min. read The 2025 edition of the Black Hat USA conference kicked off with an address from founder Jeff Moss that featured several...

Massive IPTV piracy service with 28,000 channels taken offline
The Alliance for Creativity and Entertainment (ACE) announced the shutdown of Rare Breed TV, a major illegal IPTV service provider, after reaching a financial settlement with its operators. North Carolina-based Rare Breed TV was one of the world's largest...

Microsoft’s AI agent only caught 26% of malware in a test • The Register
Microsoft has rolled out an autonomous AI agent that it claims can detect malware without human assistance. The prototype, called Project Ire, reverse engineers software "without any clues about its origin or purpose," and then determines if the code is...

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security tools and EDRs running on target machines. The abused driver is 'rwdrv.sys' (used by ThrottleStop), which the threat actors register as a...

Google confirms customer data stolen from Salesforce DB • The Register
Google confirmed that criminals breached one of its Salesforce databases and stole info belonging to some of its small-and-medium-business customers. In a late-Tuesday update to an earlier blog post, Google Threat Intelligence admitted that one of the Chocolate...

Trend Micro warns of Apex One zero-day exploited in attacks
Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its Apex One endpoint security platform. Apex One is an endpoint security platform designed to automatically detect and...

Vibe coding tool Cursor allows persistent code execution • The Register
Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a previously approved Model Context Protocol (MCP) configuration, silently...

Pandora confirms data breach amid ongoing Salesforce data theft attacks
Danish jewelry giant Pandora has disclosed a data breach after its customer information was stolen in the ongoing Salesforce data theft attacks. Pandora is one of the largest jewellery brands in the world, with 2,700 locations and over 37,000 employees. "We are...

Millions of Dell PCs with Broadcom chips open to attack • The Register
black hat Critical security flaws in Broadcom chips used in more than 100 models of Dell computers could allow attackers to take over tens of millions of users' devices, steal passwords, and access sensitive data, including fingerprint information, according to...