News

Linux Foundation kicks off effort to shield FOSS maintainers from AI slop bug reports

The Register - 5 hours 40 min ago
Big Tech donates $12.5 million to get things rolling

Half a dozen Big Tech players have together delivered $12.5 million in grants towards a project that aims to help maintainers of open source projects to cope with AI slop bug reports.…

Categories: News

Japan to allow ‘proactive cyber-defense’ from October 1st

The Register - 6 hours 56 min ago
In less polite places, this is called ‘hacking back’ or ‘offensive cyber-ops’

Japan’s government yesterday decided to allow its Self-Defense Force to conduct offensive cyber-operations, starting on October 1st.…

Categories: News

World<s>Coin</s>'s newest pitch: Scan your eyeballs to prove AI agents really represent you

The Register - Tue, 17/03/2026 - 20:26
Sell your soul to the orb

Sam Altman has cooked up a plan to make his cryptocurrency/identity/eyeball-scanning-orb venture more useful by – you guessed it – adding agentic AI to the mix. Now the technology behind it will be used to identify the human behind bots.…

Categories: News

EU sanctions Iranian cyber front over election meddling, Charlie Hebdo breach

The Register - Tue, 17/03/2026 - 16:18
State-sponsored attackers joined by Chinese snoops and hackers-for-hire in latest round of economic penalties

The Council of the European Union sanctioned Emennet Pasargad on Monday, a company used as a front for a series of Iranian cyberattacks.…

Categories: News

Too big to ignore, too small to be served: the midmarket security gap

The Register - Tue, 17/03/2026 - 09:00
Midmarket security leaders aren't as secure as they think, says Intruder's report

Partner Content  The midmarket matters. JP Morgan estimates approximately 300,000 organizations generating $13T in annual revenue. Yet they occupy an awkward position in the security landscape. They're large enough to be attractive targets with complex digital estates, significant revenue, and valuable data, but not large enough to have the headcount, budget maturity, or tooling sophistication of an enterprise security team.…

Categories: News

Switzerland built a secure alternative to BGP. The rest of the world hasn't noticed yet

The Register - Tue, 17/03/2026 - 08:15
SCION: Proven in banking and healthcare, slow to spread everywhere else

Feature  BGP, the Border Gateway Protocol, was not designed to be secure. It was designed to work – to route packets between the thousands of autonomous systems that make up the internet, quickly and at scale.…

Categories: News

Gartner suggests Friday afternoon Copilot ban because tired users may be too lazy to check its mistakes

The Register - Tue, 17/03/2026 - 04:37
Admins may be even more exhausted by then, because securing Microsoft’s AI helper is not a trivial job

Gartner analyst Dennis Xu has half-jokingly suggested banning use of Microsoft’s Copilot AI on Friday afternoons, because he fears at that time of week users may be too lazy to properly check its possibly offensive output.…

Categories: News

Bank built its own threat hunting agent because vendors can’t keep pace with new threats

The Register - Tue, 17/03/2026 - 02:37
AI helped send weekly threat signal count from 80 million to 400 billion, then helped response time shrink from two days to 30 minutes

Australia’s Commonwealth Bank built its own agentic AI threat hunting tools, because vendors are too slow to develop tools that can cope with emerging AI-powered threats, according to General Manager of Cyber Defence Operations Andrew Pade.…

Categories: News

Robotics surgical biz Intuitive discloses phishing attack

The Register - Mon, 16/03/2026 - 20:04
Operations and hospital networks not affected, we're told

Robotics-assisted surgical tech firm Intuitive said that unauthorized intruders gained access to some of its internal IT business applications after stealing an employee's credentials during a phishing attack.…

Categories: News

Cybercrime has skyrocketed 245% since the start of the Iran war

The Register - Mon, 16/03/2026 - 18:40
Hacktivists use proxy services from Russia, China for 'billions of designed-for-abuse connection attempts'

Cybercrime has skyrocketed since the start of the Iran war, according to Akamai, which reports a 245 percent increase in everything from credential harvesting attempts to automated reconnaissance traffic aimed at banks and other critical businesses.…

Categories: News

AI finally delivers those elusive productivity gains... for cybercriminals

The Register - Mon, 16/03/2026 - 16:40
Interpol says fraud schemes using the tech are 4.5x more profitable

AI is apparently good for the bottom line if your business is crime. Financial fraud schemes carried out with the help of artificial intelligence are 4.5 times more profitable than those that aren't enhanced, according to Interpol's latest estimates.…

Categories: News

Flaw in UK's corporate registry let directors rummage through rival records

The Register - Mon, 16/03/2026 - 12:18
Back button blunder in WebFiling service run by Companies House revealed confidential paperwork

Companies House was forced to pull down its record-filing platform for the entire weekend to rectify a "security issue" that exposed the personal details of company directors and other data to any logged in users.…

Categories: News

Outsourcer Telus admits to attack – may have lost a petabyte of data to ShinyHunters

The Register - Sun, 15/03/2026 - 23:24
PLUS: Citrix CISO urges patch blitz; Mandiant founder reveals AI red-teaming tech; Bitter privacy news for Starbucks; And more

Infosec In Brief  Canadian outsourcer Telus Digital has admitted it fell victim to a cyberattack.…

Categories: News

Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others

The Register - Fri, 13/03/2026 - 17:17
And then they send victims to the legit VPN download to hide their tracks

A group of cybercriminals tracked as Storm-2561 is using fake enterprise VPN clients from CheckPoint, Cisco, Fortinet, Ivanti, and other vendors to steal users' credentials, according to Microsoft.…

Categories: News

Interpol cybercrime crackdown leads to 94 arrests, 45,000 IP takedowns

The Register - Fri, 13/03/2026 - 12:39
Operation Synergia's third season is the most productive to date

Ninety-four people were arrested as part of a global, multi-month cybercrime crackdown, Interpol revealed today.…

Categories: News

NanoClaw latches onto Docker Sandboxes for safer AI agents

The Register - Fri, 13/03/2026 - 11:50
Take your YOLO and box it up

exclusive  NanoClaw, an open source agent platform, can now run inside Docker Sandboxes, furthering the project's commitment to security.…

Categories: News

Google rushes Chrome update fixing two zero-days already under attack

The Register - Fri, 13/03/2026 - 11:25
Skia graphics lib and V8 JavaScript engine brings browser's tally of actively exploited bugs to three in 2026

Google has pushed out an emergency Chrome update to fix two previously unknown vulnerabilities that attackers were already exploiting before the patches landed.…

Categories: News

Rogue AI agents can work together to hack systems and steal secrets

The Register - Thu, 12/03/2026 - 23:49
Prompt like a hard-ass boss who won't tolerate failure and bots will find ways to breach policy

AI agents work together to bypass security controls and stealthily steal sensitive data from within the enterprise systems in which they operate, according to tests carried out by frontier security lab Irregular.…

Categories: News

Operating Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud

The Register - Thu, 12/03/2026 - 16:23
International cops stuck down 23 servers in 7 countries

Cops from eight countries this week disrupted SocksEscort, a residential proxy service used by criminals to compromise hundreds of thousands of routers worldwide and carry out digital fraud, costing businesses and consumers millions.…

Categories: News

CISA warns max-severity n8n bug is being exploited in the wild

The Register - Thu, 12/03/2026 - 13:34
No rest for project maintainers battered by slew of vulnerability disclosures

The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that hackers are exploiting a max-severity remote code execution (RCE) vulnerability in workflow automation platform n8n.…

Categories: News

Pages

Subscribe to Sec Tec Limited aggregator - News