News

Google unleashes Gemini AI agents on the dark web

The Register - 1 hour 15 min ago
Claims it can analyze millions of daily events with 98 percent accuracy

Google's Gemini AI agents are crawling the dark web, sifting through upward of 10 million posts a day to find a handful of threats relevant to a particular organization.…

Categories: News

Smooth criminals talking their way into cloud environments, Google says

The Register - 1 hour 20 min ago
Voice phishing is second most common initial access method across all IR probes, and top in cloud break-ins

Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims' IT estate – and the No. 1 tactic used when breaking into cloud environments.…

Categories: News

US chip testing firm shrugged off ransomware hit as minor - then came the data leak

The Register - 3 hours 47 min ago
Trio-Tech International initially said hack wasn’t 'material,' but then stolen data was published

Trio-Tech International initially shrugged off a ransomware attack at a Singapore subsidiary as immaterial, only to reverse course days later after discovering stolen data had been disclosed.…

Categories: News

RSAC 2026: Uncle Sam backs out, and AI agents are everywhere

The Register - 3 hours 56 min ago
Infosec pros descend on San Francisco

kettle  When El Reg cybersecurity editor Jessica Lyons joins infosec industry colleagues in San Francisco for RSAC 2026 this week, she's expecting agentic AI to be on everyone's lips - at least those who aren't busy gossiping about the lack of presence from any representatives of the US federal government.…

Categories: News

Microsoft fixes broken Windows update days after vowing fewer broken updates

The Register - 4 hours 56 min ago
The era of reliability begins... right after this out-of-band patch

Microsoft has released an out-of-band update to resolve bugs introduced by a Windows patch just days after promising improved reliability.…

Categories: News

The drone swarm is coming, and NATO air defenses are too expensive to cope

The Register - 6 hours 6 min ago
Ukraine's battlefield lessons show quantity and affordability now trump exquisite hardware

NATO is unprepared to deal with attacks by cheap, mass-produced drones and urgently needs layered, affordable air defense systems to counter the threat, taking a cue from the experience gained by Ukrainian forces over the past four years.…

Categories: News

Russians are posing as Signal support to launch phishing attacks

The Register - Sun, 22/03/2026 - 22:12
PLUS: US takes down Iranian propaganda sites; Marketing company asks 'Why Do We Have Your Information?' And more!

Infosec In Brief  Russian intelligence-affiliated parties are posing as customer support services on commercial messaging applications such as Signal to compromise accounts and conduct phishing attacks, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) warned last Friday.…

Categories: News

Cryptographers engage in war of words over RustSec bug reports and subsequent ban

The Register - Fri, 20/03/2026 - 21:07
Rust security maintainers contend Nadim Kobeissi's vulnerability claims are too much

Since February, cryptographer Nadim Kobeissi has been trying to get code fixes applied to Rust cryptography libraries to address what he says are critical bugs. For his efforts, he's been dismissed, ignored, and banned from Rust security channels.…

Categories: News

UK police force presses pause on live facial recognition after study finds racial bias

The Register - Fri, 20/03/2026 - 13:35
Cams statistically more likely to ID Black people, says new research

A UK police force has suspended its deployment of live facial recognition (LFR) technology after a study revealed it was statistically more likely to identify Black people on a watchlist database.…

Categories: News

Feds disrupt monster IoT botnets behind record-breaking DDoS attacks

The Register - Fri, 20/03/2026 - 13:07
Millions of hijacked devices powered traffic floods targeting defense systems and beyond

The US government has moved to disrupt a cluster of IoT botnets behind some of the largest DDoS attacks ever recorded, including traffic bursts topping 30 terabits per second.…

Categories: News

Jaguar Land Rover's cyber bailout sets worrying precedent, watchdog warns

The Register - Fri, 20/03/2026 - 12:42
Lack of clear criteria risks encouraging firms to lean on state support instead of worrying about insurance

The UK's cyber watchdog has warned that the government's £1.5 billion bailout of Jaguar Land Rover (JLR) risks setting a troubling precedent for how Britain handles major cyber crises.…

Categories: News

Starmer's digital ID reboot raises same old questions as its Blair-era ancestor

The Register - Fri, 20/03/2026 - 10:15
Audit trails aplenty, but no price tag – and no clue how long your data sticks around

Opinion  Last week's UK government consultation on its plans for digital identity had quite a few things missing. It did not include a price estimate - something it said was due to decisions yet to be taken on the scheme's scope - or how long the government would keep "audit trail" records of ID checks.…

Categories: News

While you're here, could you go out of your way to do an impossible job?

The Register - Fri, 20/03/2026 - 07:30
He would have gotten away with it too, if it weren't for a meddling security team's fear of USB

On Call  Each Friday The Register offers a fresh installment of On Call, the reader-contributed column that celebrates the fine art of tech support.…

Categories: News

Unknown attackers exploit yet another critical SharePoint bug

The Register - Thu, 19/03/2026 - 18:54
Last time: Beijing-backed snoops and ransomware crims. Who's next?

Unknown baddies are abusing yet another critical Microsoft SharePoint bug to compromise victims' SharePoint servers, the US government warned.…

Categories: News

Google gives Android users a way to install unverified apps if they prove they really, really want to

The Register - Thu, 19/03/2026 - 18:30
Chocolate Factory describes concession as an attempt to balance openess with safety

It turns out you won't be limited to Google-verified apps an developers on Android after all. In the face of sustained community dissatisfaction with its developer verification requirement, Google has given Android users an out.…

Categories: News

Lock down Microsoft Intune, feds warn after Stryker attack

The Register - Thu, 19/03/2026 - 16:00
Iran-linked attackers wiped employees' devices using Intune

The US government has urged companies to better secure Microsoft Intune, an endpoint management tool that was abused in last week's cyberattack against med-tech firm Stryker.…

Categories: News

Okta made a nightmare micromanager for your AI agents

The Register - Wed, 18/03/2026 - 23:05
Where are you? What are you working on? Why are you doing that?

Identity access and management platform Okta announced the general availability of its Okta for AI Agents, which will give customers the ability to do three things: locate agents, see what they’re doing, and shut them down if need be.…

Categories: News

State snoops and spyware vendors planting info-stealing malware on iPhones, Google warns

The Register - Wed, 18/03/2026 - 21:39
Darksword is the second iOS exploit chain in a month

A new exploit kit targeting iPhone users and stealing their sensitive data is being abused by "multiple" spyware vendors and suspected nation-state goons, security researchers said on Wednesday.…

Categories: News

Amazon security boss says crims abused max-security Cisco firewall flaw weeks before disclosure

The Register - Wed, 18/03/2026 - 17:40
Interlock's post-exploit toolkit exposed

Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as a zero-day vulnerability more than a month before Cisco patched the hole, according to Amazon security boss CJ Moses.…

Categories: News

North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un

The Register - Wed, 18/03/2026 - 13:57
Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators

Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.…

Categories: News

Pages

Subscribe to Sec Tec Limited aggregator - News