<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>Cybersecurity editor @theregister.com Contact me with tips: jessica.lyons@theregister.com or jess.825 on Signal&#xA;&#xA;Mama bear, book worm, outdoor lover, coffee and wine snob. PNW after decades in Santa Cruz but Blazers fan always.</description><link>https://bsky.app/profile/jessicalyons.bsky.social</link><title>@jessicalyons.bsky.social - Jessica Lyons</title><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mlt4burggs2i</link><description>“At first, yes, this means more patches and thus more work for admins,” @dustinchilds.bsky.social told me. “The goal over time would be to eliminate as many as possible, and, over time, that monthly number goes down.”&#xA;https://www.theregister.com/patches/2026/05/14/welcome-to-the-vulnpocalypse-as-vendors-use-ai-to-find-bugs-and-patches-multiply-like-rabbits/5240027</description><pubDate>14 May 2026 15:15 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mlt4burggs2i</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mkqc2sjho22z</link><description>&#34;I&#39;m concerned about what they are leaving behind: What type of C2 on a sleep cycle is still lingering in these environments?&#34; TrendAI VP Tom Kellermann told me in an exclusive interview about the never-before-seen campaign.&#xA;https://www.theregister.com/2026/04/30/chinese_spies_lurking_networks/</description><pubDate>30 Apr 2026 18:55 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mkqc2sjho22z</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mjztpfi2mk2k</link><description>&#34;Felony murder law does not require that a defendant pull the trigger, only that they commit a dangerous felony that results in death,&#34; ex-FBI cyber chief/Halcyon SVP Cynthia Kaiser told lawmakers.&#xA;https://www.theregister.com/2026/04/21/exfbi_cyber_chief_urges_felony_charges_ransomware/</description><pubDate>21 Apr 2026 20:39 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mjztpfi2mk2k</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mjp3rrintk2p</link><description>A design flaw – or expected behavior based on a bad design choice, depending on who is telling the story – baked into Anthropic&#39;s official Model Context Protocol (MCP) puts as many as 200,000 servers at risk of complete takeover, according to security researchers.&#xA;https://www.theregister.com/2026/04/16/anthropic_mcp_design_flaw/</description><pubDate>17 Apr 2026 14:05 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mjp3rrintk2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mjkuggn3r22p</link><description>Anthropic surprised the world by declaring that its latest model, Mythos, is so good at bug hunting that it would create chaos if released. Now, with Project Glasswing, 50+ select orgs are testing the hyped up LLM to find holes in their own products. But just how many problems have they discovered?&#xA;https://www.theregister.com/2026/04/15/project_glasswing_cves/</description><pubDate>15 Apr 2026 21:42 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mjkuggn3r22p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mjkbgvy2ec2p</link><description>EXCLUSIVE: Security researchers hijacked three popular AI agents that integrate with GitHub Actions by using a new type of prompt injection attack to steal API keys and access tokens, and the vendors who run agents didn’t disclose the problem.&#xA;https://www.theregister.com/2026/04/15/claude_gemini_copilot_agents_hijacked/</description><pubDate>15 Apr 2026 16:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mjkbgvy2ec2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mjfpdmq4ak2p</link><description>An unknown malware slinger targeting open source software developers via Slack impersonated a real Linux Foundation official and used pages hosted on Google to steal developers&#39; credentials and take over their systems.&#xA;https://www.theregister.com/2026/04/13/linux_foundation_social_engineering/</description><pubDate>13 Apr 2026 20:28 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mjfpdmq4ak2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mja62ujkfs2p</link><description>Here&#39;s my latest: A tale of two supply-chain attacks. Different attackers, but they both targeted open source software and developer environments and shares similar end goals.&#xA;https://www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/</description><pubDate>11 Apr 2026 15:36 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mja62ujkfs2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mj5l22mkhs2p</link><description>The struggle is real…&#xA;&#xA;[contains quote post or other embedded content]</description><pubDate>10 Apr 2026 14:50 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mj5l22mkhs2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mitfku32nc2p</link><description>&#34;Everybody&#39;s glorifying threat actors, and that&#39;s not helping our customers or organizations. These are just individuals, they just use computers, and they just want to steal your data and make money. They&#39;re not mythical. They don&#39;t have superpowers,&#34; Trellix VP John Fokker told me.&#xA;https://www.theregister.com/2026/04/05/trellix_john_fokker_roasting_crims/</description><pubDate>06 Apr 2026 13:45 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mitfku32nc2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mijrdfcld22p</link><description>Tens of thousands of people eagerly downloaded the leaked Claude Code source code this week, and hundreds - if not more - of those downloads came with a side of credential-stealing malware.&#xA;https://www.theregister.com/2026/04/02/trojanized_claude_code_leak_github/</description><pubDate>02 Apr 2026 17:49 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mijrdfcld22p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mhth3siqv22p</link><description>We are seeing a dangerous convergence between supply chain attackers and high-profile extortion groups like Lapsus$,&#34; Ben Read, a lead researcher at Wiz, told me via @theregister.com on Tuesday.&#xA;https://www.theregister.com/2026/03/24/1k_cloud_environments_infected_following/</description><pubDate>24 Mar 2026 20:47 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mhth3siqv22p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mhdpgnbzi22p</link><description>“We can remove their navy. We can remove their air power. We can attack them across all instruments of power, diplomatic, information, military, and economic. And they&#39;ll still have the ability to hack,&#34; retired US Army Lt. Gen. Ross Coffman told me via @theregister.com&#xA;https://www.theregister.com/2026/03/18/irans_cyberattack_against_stryker/</description><pubDate>18 Mar 2026 14:34 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mhdpgnbzi22p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mgusyqdqp22a</link><description>BREAKING: FBI, international cops take down SocksEscort, a residential proxy service used by criminals to compromise hundreds of thousands of routers worldwide. FBI Deputy Assistant Director Jason Bilnoski spoke exclusively to @theregister.com about the disruption.&#xA;https://www.theregister.com/2026/03/12/socksescort_fraud_proxy_taken_down_fbi/</description><pubDate>12 Mar 2026 16:28 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mgusyqdqp22a</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mgprmkcixc2q</link><description>It&#39;s good to be back with @theregister.com Kettle! Give us a listen and subscribe on Apple podcasts, Spotify, whatever podcast platform you like.&#xA;&#xA;[contains quote post or other embedded content]</description><pubDate>10 Mar 2026 16:20 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mgprmkcixc2q</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mgprg5w6w22q</link><description>Researchers at red-team security startup CodeWall told us their AI agent hacked McKinsey&#39;s internal AI platform and gained full read and write access to the chatbot in just two hours. https://www.theregister.com/2026/03/09/mckinsey_ai_chatbot_hacked/</description><pubDate>10 Mar 2026 16:16 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mgprg5w6w22q</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mgnlf6g3ss2q</link><description>ShinyHunters told me via @theregister.com that the extorion crew has stolen data from about 100 high-profile companies in its latest Salesforce customer data heist, including Salesforce itself.&#xA;https://www.theregister.com/2026/03/09/shinyhunters_claims_more_highprofile_victims/</description><pubDate>09 Mar 2026 19:23 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mgnlf6g3ss2q</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mg6w5sgtn22q</link><description>A developer says their company is on the hook for more than $82,000 in unauthorized charges after a stolen Google Gemini API key racked massive usage costs up in just 48 hours.&#xA;https://www.theregister.com/2026/03/03/gemini_api_key_82314_dollar_charge/</description><pubDate>03 Mar 2026 23:26 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mg6w5sgtn22q</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mg43l26ygc2p</link><description>Thinking back to Ben Franklin, we saw society moving in the right direction for the last 500 years because of our commitment to science, human rights, etc., and that seems to be at the very least slowing down, if not reversing,” Jake Braun told me via The Register.&#xA;https://www.theregister.com/2026/02/28/def_con_jake_braun_fed_up_govt/</description><pubDate>02 Mar 2026 20:25 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mg43l26ygc2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mfsbq5kpbk2p</link><description>well this is bullshit&#xA;https://www.nytimes.com/2026/02/26/technology/hateaid-online-abuse-free-speech-europe.html</description><pubDate>26 Feb 2026 22:48 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mfsbq5kpbk2p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mfktilpwr22p</link><description>Two US residents have sued several Homeland Security agencies and officials, including Secretary Kristi Noem, for allegedly using surveillance tools to harass them, branding them as &#34;domestic terrorists,&#34; and even showing up at their homes based on license-plate recognition.&#xA;https://www.theregister.com/2026/02/23/americans_sue_homeland_security_over/</description><pubDate>23 Feb 2026 23:45 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mfktilpwr22p</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mf6c4dmimk2a</link><description>BREAKING: Adidas has confirmed it is investigating a third-party breach at one of its partner companies after digital thieves claimed they stole information and technical data from the German sportswear giant.&#xA;https://www.theregister.com/2026/02/18/adidas_investigates_thirdparty_data_breach/</description><pubDate>19 Feb 2026 00:02 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mf6c4dmimk2a</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mf6bhf463c2a</link><description>CarGurus allegedly suffered a data breach with 1.7 million corporate records stolen, according to a notorious cybercrime crew that posted the online vehicle marketplace on its leak site on Wednesday.&#xA;https://www.theregister.com/2026/02/18/shinyhunters_cargurus_breach/</description><pubDate>18 Feb 2026 23:50 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mf6bhf463c2a</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3meoyp642oc2a</link><description>Your supervisor may like using employee monitoring apps to keep tabs on you, but crims like the snooping software even more. Threat actors are now using legit bossware to blend into corporate networks and attempt ransomware deployment. &#xA;&#xA;HT: @huntress.com security operations analyst Michael Tigges&#xA;https://www.theregister.com/2026/02/12/ransomware_slingers_bossware/</description><pubDate>12 Feb 2026 22:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3meoyp642oc2a</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3meocxe552s2a</link><description>Don&#39;t be evil, Google&#xA;https://theintercept.com/2026/02/10/google-ice-subpoena-student-journalist/</description><pubDate>12 Feb 2026 15:34 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3meocxe552s2a</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3melvfvv6222a</link><description>EXCLUSIVE: I spoke with Binary Defense lead threat hunter John Dwyer about a new type of payroll scam where attackers call the help desk, force an MFA token reset, and use the org&#39;s own VDI to access HR platforms and reroute paychecks. As John told me: &#34;Every employee on earth becomes a target.&#34;&#xA;https://www.theregister.com/2026/02/11/payroll_pirates_business_social_engineering/</description><pubDate>11 Feb 2026 16:27 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3melvfvv6222a</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3me55a4bcrk2a</link><description>A digital intruder broke into an AWS cloud environment and in just under 10 minutes went from initial access to administrative privileges, thanks to an AI speed assist.&#xA;https://www.theregister.com/2026/02/04/aws_cloud_breakin_ai_assist/</description><pubDate>05 Feb 2026 19:37 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3me55a4bcrk2a</guid></item><item><link>https://bsky.app/profile/jessicalyons.bsky.social/post/3mdy6adb2x22a</link><description>Best thing I&#39;ve read all day.&#xA;https://nesbitt.io/2026/02/03/incident-report-cve-2024-yikes.html</description><pubDate>03 Feb 2026 20:11 +0000</pubDate><guid isPermaLink="false">at://did:plc:7wlyiuoythympa6jws4bgdkp/app.bsky.feed.post/3mdy6adb2x22a</guid></item></channel></rss>