Jessica Lyons's Avatar

Jessica Lyons

@jessicalyons.bsky.social

Cybersecurity editor @theregister.com Contact me with tips: jessica.lyons@theregister.com or jess.825 on Signal Mama bear, book worm, outdoor lover, coffee and wine snob. PNW after decades in Santa Cruz but Blazers fan always.

5,443 Followers  |  533 Following  |  286 Posts  |  Joined: 27.09.2023  |  1.7912

Latest posts by jessicalyons.bsky.social on Bluesky

Despite multiple arrests and talk of retirement, a crew now calling itself Scattered LAPSUS$ Hunters has reemerged with a data-leak site listing about 40 companies’ Salesforce environments, and is demanding $989.45 to prevent what it claims is about 1B stolen records.

03.10.2025 21:52 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Ret US Navy Rear Admiral Mark Montgomery said it best: "This policy seems more like theatrics and less like readiness."

03.10.2025 21:47 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Pentagon relaxes military cybersecurity training : Beards, body fat, and cyber refreshers now frowned upon

Cybersecurity training, beards, and body fat have something in common, according to the Pentagon. They're not helping the US military fight and win wars.

02.10.2025 23:11 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 3    πŸ“Œ 1
Preview
Air Force admits SharePoint privacy issue; reports of breach Exclusive: Uncle Sam can't quit Redmond

SCOOP: The US Air Force confirmed it's investigating a "privacy-related issue" amid reports of a Microsoft SharePoint-related breach and subsequent service-wide shutdown, rendering mission files and other critical tools potentially unavailable to service members.

01.10.2025 18:10 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Preview
Suspected Chinese spies broke into 'numerous' enterprises : Mandiant CTO anticipates 'hearing about this campaign for the next one to two years'

"As more companies scan their systems, we anticipate we'll be hearing about this campaign for the next one to two years," @mandiant.com CTO Charles Carmakal told me via @theregister.com.

24.09.2025 14:35 β€” πŸ‘ 10    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
Vegas cops book teen allegedly involved in casino hacks : Not old enough to drink, old enough to be accused of causing millions in damage

Las Vegas police arrested an unnamed teen accused of breaking into multiple Las Vegas casino networks in 2023, as part of a series of hacks attributed to Scattered Spider.

23.09.2025 19:11 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
SolarWinds patches critical RCE - for the third time : Or maybe 3 strikes, you're out?

SolarWinds on Tuesday released a hotfix - again - for a critical, 9.8-severity flaw in its Web Help Desk IT ticketing software that could allow a remote, unauthenticated attacker to run commands on a host machine.

23.09.2025 19:04 β€” πŸ‘ 9    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

Doesn't sound like the Norks.

19.09.2025 15:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Scattered Spider teen cuffed after crypto splurge on games : Bad opsec

Perhaps the most incriminating: Somebody took cryptocurrency from a wallet on a server that also held ransom funds and bought gaming gift cards tied to an account in Jubair's name, as well as food-delivery gift cards, which were then used to order takeout to the apartment complex where he lived.

19.09.2025 13:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Scattered Spider gang feigns retirement, breaks into bank : You didn't really trust the crims to keep their word, did you?

Spiders don't change their stripes. Despite gang members' recent retirement claims, Scattered Spider hasn't exited the cybercrime business and instead has shifted focus to the financial sector, with a recent digital intrusion at a US bank.

17.09.2025 19:05 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
HybridPetya ransomware dodges UEFI Secure Boot : Although it hasn't been seen in the wild yet

A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass UEFI Secure Boot on Windows systems, making it the fourth publicly known bootkit capable of punching through the feature and hijacking a PC before the operating system loads.

15.09.2025 18:36 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

"We have observed high-confidence account takeovers in multiple entities," as new phishing service makes it really easy for criminals to hijack Google and Microsoft accounts.

11.09.2025 20:42 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
AI-powered penetration tool downloaded 10K times : Shady, China-based company, all the apps needed for a fully automated attack - sounds totally legit

"Like Cobalt Strike, it can be used for legitimate purposes but it is also ready to be used maliciously without expertise needed since it is fully automated," Dan Regalado, principal AI security researcher at Straiker, told me via @theregister.com

11.09.2025 17:24 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Call audio from gym members, employees in open database Exclusive: HelloGym's data security clearly skipped leg day

Sensitive info from hundreds of thousands of gym customers and staff – including names, financial details, and potentially biometric data in the form of audio recordings – was left sitting in an unencrypted, non-password protected database, according to a security researcher who shut it down.

09.09.2025 17:42 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The crazy, true story behind the first AI-powered ransomware interview: tldr; boffins did it

"This is literally, exactly the code that I wrote, and it's the same functions and the same prompts," NYU engineering student and doctoral candidate Md Raz told me via @theregister.com. "And they think it's a real attack."

08.09.2025 14:51 β€” πŸ‘ 5    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Preview
Crims boast of using HexStrike AI against Citrix bugs : LLMs and 0-days - what could possibly go wrong?

"Like other security frameworks, it can be misused, but it does not include pre-built zero-day exploits," the developer of HexStrike AI told me amid reports of criminals using the red-teaming tool against Citrix NetScaler bugs within hours of disclosure.

03.09.2025 22:55 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Here's how ransomware crims are abusing AI tools : AI-powered ransomware, extortion chatbots, vibe hacking … just wait until agents replace affiliates

It looks like you’re ransoming data. Would you like some help?

03.09.2025 22:50 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Preview
AWS nails Russia's Cozy Bear trying to nick Microsoft creds : Look who's visiting the watering hole these days

Amazon today said it disrupted an intel-gathering attempt by Russia's APT29 to trick Microsoft users into unwittingly granting the Kremlin-backed cyberspies access to their accounts and data.

29.08.2025 19:59 β€” πŸ‘ 7    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
FBI cyber cop: Salt Typhoon pwned 'nearly every American' : Plus millions of other people across 80+ countries

"There's a good chance this espionage campaign has stolen information from nearly every American," Michael Machtinger, deputy assistant director for the FBI's cyber division, told me via @theregister.com

29.08.2025 00:02 β€” πŸ‘ 8    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Preview
Older developers are down with the vibe coding vibe They use AI more but also check it more For those who thought AI vibe coding was just for the youngsters, newly published research shows that developers with over 10 years of experience are more than twice as likely to do it.…

Older developers are down with the vibe coding vibe

28.08.2025 23:36 β€” πŸ‘ 12    πŸ” 2    πŸ’¬ 3    πŸ“Œ 2
Preview
First AI-powered ransomware PoC spotted : Oh, look, a use case for OpenAI's gpt-oss-20b model

ESET malware researchers Anton Cherepanov and Peter Strycek discovered what they describe as the "first known AI-powered ransomware," which they named PromptLock. The good news is that the malware doesn't appear to be fully functional β€” yet. www.theregister.com/2025/08/26/f...

26.08.2025 22:17 β€” πŸ‘ 6    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
ZipLine cyber attack uses White House butler pic : 'Many dozens' targeted in ongoing campaign, CheckPoint researcher tells The Reg

Cybercriminals are targeting critical US manufacturers and supply-chain companies, looking to steal sensitive IP and other data. Their attack involves a novel twist on phishing β€” and a photo of White House butlers.

26.08.2025 19:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AWS patches Q Developer after prompt injection, RCE demo : Move along, nothing to see here

Amazon has quietly fixed a couple of security issues in its coding agent: Amazon Q Developer VS Code extension. Attackers could use these vulns to leak secrets, including API keys from a developer's machine, and run arbitrary code.

20.08.2025 22:00 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Ollama bug allows drive-by attacks - patch now : Reconfigure local app settings via a 'simple' POST request

A now-patched flaw in popular AI model runner Ollama allows drive-by attacks in which a miscreant uses a malicious website to remotely target people's personal computers, spy on their local chats, and even control the models the victim's app talks to. HT to GitLab's Chris Moberly who found the bug.

19.08.2025 23:11 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

When working in a public place like a coffee shop with music playing, does anyone else find it impossible to not sing along?

15.08.2025 21:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Ransomware crews don't care about your EDR : Some custom malware, some legit software tools

At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal, allowing them to bypass almost every major endpoint security tool on the market, escalate privileges, and ultimately steal and encrypt data before extorting victims into paying a ransom.

14.08.2025 22:53 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Ex-White House cyber guru talks Microsoft security fails Comment: Tells The Reg China's ability to p0wn Redmond's wares 'gives me a political aneurysm'

"The Chinese are so well prepared and positioned on Microsoft products that in the event of hostilities, we know for a fact Chinese actors will target our critical infrastructure through Microsoft products," ex-White House cyber and counter-terrorism guru Roger Cressey told me via @theregister.com

08.08.2025 13:43 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Microsoft Exchange bug can allow 'total domain compromise' : No reported in-the-wild exploits…yet

Microsoft and CISA sounded the alarm on another high-severity bug in Exchange Server hybrid deployments that could allow attackers to escalate privileges from on-premises Exchange to the cloud.

07.08.2025 18:11 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Vibe coding tool Cursor allows persistent code execution : More evidence that AI expands the attack surface

Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a previously approved MCP configuration, silently swapping it for a malicious command without any user prompt.

06.08.2025 16:56 β€” πŸ‘ 16    πŸ” 5    πŸ’¬ 0    πŸ“Œ 4
Preview
β€˜A million calls an hour’: Israel relying on Microsoft cloud for expansive surveillance of Palestinians Revealed: The Israeli military undertook an ambitious project to store a giant trove of Palestinians’ phone calls on Microsoft’s servers in Europe

satya.. this is not okay. www.theguardian.com/world/2025/a...

06.08.2025 12:50 β€” πŸ‘ 22    πŸ” 12    πŸ’¬ 0    πŸ“Œ 1

@jessicalyons is following 18 prominent accounts