Sign in / up
The Register

Topics

Security

Security

All SecurityCyber-crimePatchesResearchCSO
Off-Prem

Off-Prem

All Off-PremEdge + IoTChannelPaaS + IaaSSaaS
On-Prem

On-Prem

All On-PremSystemsStorageNetworksHPCPersonal TechCxOPublic Sector
Software

Software

All SoftwareAI + MLApplicationsDatabasesDevOpsOSesVirtualization
Offbeat

Offbeat

All OffbeatDebatesColumnistsScienceGeek's GuideBOFHLegalBootnotesSite NewsAbout Us
Special Features

Special Features

Ransomware in Focus The Future of the Datacenter Cybersecurity Month VMware Explore Cloud Infrastructure Month

Vendor Voice

Vendor Voice

Vendor Voice

All Vendor Voice SourceFuse Amazon Web Services (AWS) New Horizon in Cloud Computing Pure Storage Klika Tech HERE and AWS GE Vernova with AWS Google Cloud Data Transformation Google Gemini
Resources

Resources

Whitepapers Webinars & Events Newsletters

Forescout

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack
Research25 Feb 2025 | 2

700K+ DrayTek routers are sitting ducks on the internet, open to remote hijacking

With 14 serious security flaws found, what a gift for spies and crooks
Cybersecurity Month02 Oct 2024 | 21

CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure

Updated Nearly 60 holes found affecting 'more than 30,000' machines worldwide
Research21 Jun 2022 | 23

What if ransomware evolved to hit IoT in the enterprise?

Proof-of-concept lab work demos potential future threat
Research01 Jun 2022 | 6

The Register icon Biting the hand that feeds IT

About Us

  • Contact us
  • Advertise with us
  • Who we are

Our Websites

  • The Next Platform
  • DevClass
  • Blocks and Files

Your Privacy

  • Cookies Policy
  • Privacy Policy
  • Ts & Cs
Situation Publishing

Copyright. All rights reserved © 1998–2025