The Register

Subscribe to The Register feed
Biting the hand that feeds IT — Enterprise Technology News and Analysis
Updated: 40 min 14 sec ago

Block CISO: We red-teamed our own AI agent to run an infostealer on an employee laptop

Mon, 12/01/2026 - 16:46
Agents must be 'safer and better than humans,' James Nettesheim tells The Reg

interview  When it comes to security, AI agents are like self-driving cars, according to Block Chief Information Security Officer James Nettesheim.…

Categories: News

Infamous BreachForums forum breached, spilling data on 325K users

Mon, 12/01/2026 - 13:07
Website built around buying and selling stolen data has lost control of its own

BreachForums, the serially resurrected cybercrime marketplace, has tripped over itself after a data breach spilled details tied to about 324,000 user accounts.…

Categories: News

Ofcom officially investigating X as Grok's nudify button stays switched on

Mon, 12/01/2026 - 12:19
Tech minister Liz Kendall says the government will back a robust regulatory response

Ofcom is investigating X over potential violations of the Online Safety Act, Britian's comms watchdog has confirmed.…

Categories: News

Tories vow to boot under-16s off social media and ban phones in schools

Mon, 12/01/2026 - 10:25
Opposition leader Kemi Badenoch pitches age limits and classroom curbs as fixes for behavior and mental health

The Tories have pledged to kick under-16s off social media, betting that banning teens from TikTok and Instagram will fix what they see as a growing crisis in kids' mental health and classroom behavior.…

Categories: News

India’s government denies it plans to demand smartphone source code

Mon, 12/01/2026 - 04:37
Says ongoing talks about security are about understanding best practice, not strong-arming vendors

India’s government has denied that it is working on rules that would require smartphone manufacturers to provide access to their source code.…

Categories: News

Malaysia and Indonesia block X over failure to curb deepfake smut

Mon, 12/01/2026 - 01:29
PLUS: Cambodia arrests alleged scam camp boss; Baidu spins out chip biz; Panasonic’s noodle shop plan; And more!

Asia in Brief  The governments of Malaysia and Indonesia have suspended access to social network X, on grounds that it allows users to produce sexual imagery without users’ consent.…

Categories: News

Meta admits to Instagram password reset mess, denies data leak

Sun, 11/01/2026 - 23:43
PLUS: Veeam patches critical vuln; Crims bribing dark web insiders; UK school takedown; And more

infosec in brief  Meta has fixed a flaw in its Instagram service that allowed third parties to generate password reset emails, but denied the problem led to theft of users’ personal information.…

Categories: News

UK government exempting itself from flagship cyber law inspires little confidence

Sat, 10/01/2026 - 09:29
Ministers promise equivalent standards just without the legal obligation

ANALYSIS  From May's cyberattack on the Legal Aid Agency to the Foreign Office breach months later, cyber incidents have become increasingly common in UK government.…

Categories: News

How hackers are fighting back against ICE surveillance tech

Fri, 09/01/2026 - 21:03
Remember when government agents didn't wear masks?

While watching us now seems like the least of its sins, the US Immigration and Customs Enforcement (ICE) was once best known (and despised) for its multi-billion-dollar surveillance tech budget.…

Categories: News

Putinswap: France trades alleged ransomware crook for conflict researcher

Fri, 09/01/2026 - 16:07
Basketball player accused of aiding cybercrime gang extradition blocked in exchange for Swiss NGO consultant

France has released an alleged ransomware crook wanted by the US in exchange for a conflict researcher imprisoned in Russia.…

Categories: News

QR codes a powerful new phishing weapon in hands of Pyongyang cyberspies

Fri, 09/01/2026 - 15:44
State-backed attackers are using QR codes to slip past enterprise security and help themselves to cloud logins, the FBI says

North Korean government hackers are turning QR codes into credential-stealing weapons, the FBI has warned, as Pyongyang's spies find new ways to duck enterprise security and help themselves to cloud logins.…

Categories: News

China-linked cybercrims abused VMware ESXi zero-days a year before disclosure

Fri, 09/01/2026 - 13:28
Huntress analysis suggests VM escape bugs were already weaponized in the wild

Chinese-linked cybercriminals were sitting on a working VMware ESXi hypervisor escape kit more than a year before the bugs it relied on were made public.…

Categories: News

Grok told to cover up as UK weighs action over AI 'undressing'

Fri, 09/01/2026 - 10:21
Image generation paywalled on X after ministers and regulators start asking awkward questions

Grok has yanked its image-generation toy out of the hands of most X users after the UK government openly weighed a ban over the AI feature that "undressed" people on command.…

Categories: News

Help desk read irrelevant script, so techies found and fixed their own problem

Fri, 09/01/2026 - 07:26
As you should, when being told the only remedy is deleting everything and starting again

On Call  2025 has ended and a new year is upon us, but The Register will continue opening Friday mornings with a fresh installment of On Call – the reader-contributed column that tells your tales of tech support.…

Categories: News

As agents run amok, CrowdStrike's $740M SGNL deal aims to help get a grip on identity security

Thu, 08/01/2026 - 22:09
Authentication is basically solved. Authorization is another thing entirely...

CrowdStrike has signed a $740 million deal to buy identity security startup SGNL. The move underscores the growing threat of identity-based attacks as companies struggle to secure skyrocketing numbers of non-human identities, including AI agents.…

Categories: News

Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit

Thu, 08/01/2026 - 18:43
No reports of active exploitation … yet

Cisco patched a bug in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products that allows remote attackers with admin-level privileges to access sensitive information - and warned that a public, proof-of-concept exploit for the flaw exists online.…

Categories: News

Ransomware attacks kept climbing in 2025 as gangs refused to stay dead

Thu, 08/01/2026 - 14:47
Cop wins hit crime infrastructure, not the people behind it

If 2025 was meant to be the year ransomware started dying, nobody appears to have told the attackers.…

Categories: News

CISA flags actively exploited Office relic alongside fresh HPE flaw

Thu, 08/01/2026 - 13:44
Max-severity OneView hole joins a PowerPoint bug that should've been retired years ago

CISA has added a pair of security holes to its actively exploited list, warning that attackers are now abusing a maximum-severity bug in HPE's OneView management software and a years-old flaw in Microsoft Office.…

Categories: News

UK regulators swarm X after Grok generated nudes from photos

Thu, 08/01/2026 - 12:40
Lawyers say Musk's platform may face punishment under Online Safety Act priority offenses

Elon Musk's X platform is under fire as UK regulators close in on mounting reports that the platform's AI chatbot, Grok, is generating sexual imagery without users' consent.…

Categories: News

Maximum-severity n8n flaw lets randos run your automation server

Thu, 08/01/2026 - 11:40
Unauthenticated RCE means anyone on the network can seize full control

A maximum-severity bug in the popular automation platform n8n has left an estimated 100,000 servers wide open to complete takeover, courtesy of a flaw so bad it doesn't even require logging in.…

Categories: News

Pages