Sign in / up
The Register

Topics

Security

Security

All SecurityCyber-crimePatchesResearchCSO
Off-Prem

Off-Prem

All Off-PremEdge + IoTChannelPaaS + IaaSSaaS
On-Prem

On-Prem

All On-PremSystemsStorageNetworksHPCPersonal TechCxOPublic Sector
Software

Software

All SoftwareAI + MLApplicationsDatabasesDevOpsOSesVirtualization
Offbeat

Offbeat

All OffbeatDebatesColumnistsScienceGeek's GuideBOFHLegalBootnotesSite NewsAbout Us
Special Features

Special Features

Ransomware in Focus The Future of the Datacenter Cybersecurity Month VMware Explore Cloud Infrastructure Month

Vendor Voice

Vendor Voice

Vendor Voice

All Vendor Voice SourceFuse Amazon Web Services (AWS) New Horizon in Cloud Computing Pure Storage Klika Tech HERE and AWS GE Vernova with AWS Google Cloud Data Transformation Google Gemini
Resources

Resources

Whitepapers Webinars & Events Newsletters

Checkmarx

Ongoing typosquatting campaign impersonates hundreds of popular npm packages

Puppeteer or Pupeter? One of them will snoop around on your machine and steal your credentials
Research05 Nov 2024 | 11

Hijacked S3 buckets used in attacks on npm packages

Cybercrooks use abandoned AWS storage tool to deliver malware
Storage19 Jun 2023 | 7

Criminals use trending TikTok challenge to make data-stealing malware invisible

PSA: Don't download unknown apps even if they promise naked people
Security29 Nov 2022 | 7

WASP malware stings Python developers

Info-stealing trojan hides in malicious PyPI packages on GitHub
Research16 Nov 2022 | 9

The Register icon Biting the hand that feeds IT

About Us

  • Contact us
  • Advertise with us
  • Who we are

Our Websites

  • The Next Platform
  • DevClass
  • Blocks and Files

Your Privacy

  • Cookies Policy
  • Privacy Policy
  • Ts & Cs
Situation Publishing

Copyright. All rights reserved © 1998–2025