News

Why native cloud security falls short

The Register - 31 min 8 sec ago
Your cloud security must stand alone

Partner Content  As cloud adoption accelerates, many organizations are increasingly relying on the native security features offered by cloud service providers (CSPs). The ability to manage web application firewalls (WAF), data encryption, and key management (KMS) within a single provider ecosystem appears efficient and convenient. However, when security and reliability are viewed through the lens of enterprise risk management, this convenience may come at a significant cost.…

Categories: News

Open-source AI is a global security nightmare waiting to happen, say researchers

The Register - Sun, 01/02/2026 - 23:40
Also, South Korea gets a pentesting F, US Treasury says bye bye to BAH, North Korean hackers evolve, and more

Infosec in Brief  As if AI weren't enough of a security concern, now researchers have discovered that open-source AI deployments may be an even bigger problem than those from commercial providers. …

Categories: News

AI security startup CEO posts a job. Deepfake candidate applies, inner turmoil ensues.

The Register - Sun, 01/02/2026 - 14:14
'I did not think it was going to happen to me, but here we are'

Nearly every company, from tech giants like Amazon to small startups, has first-hand experience with fake IT workers applying for jobs - and sometimes even being hired. …

Categories: News

January blues return as Ivanti coughs up exploited EPMM zero-days

The Register - Fri, 30/01/2026 - 22:01
Consider yourselves compromised, experts warn

Ivanti has patched two critical zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) product that are already being exploited, continuing a grim run of January security incidents for enterprise IT vendors.…

Categories: News

Thousands more Oregon residents learn their health data was stolen in TriZetto breach

The Register - Fri, 30/01/2026 - 18:32
Parent company Cognizant hit with multiple lawsuits

Thousands more Oregonians will soon receive data breach letters in the continued fallout from the TriZetto data breach, in which someone hacked the insurance verification provider and gained access to its healthcare provider customers across multiple US states.…

Categories: News

Java developers want container security, just not the job that comes with it

The Register - Fri, 30/01/2026 - 00:12
BellSoft survey finds 48% prefer pre‑hardened images over managing vulnerabilities themselves

Java developers still struggle to secure containers, with nearly half (48 percent) saying they'd rather delegate security to providers of hardened containers than worry about making their own container security decisions.…

Categories: News

Maybe CISA should take its own advice about insider threats hmmm?

The Register - Thu, 29/01/2026 - 23:19
The call is coming from inside the house

opinion  Maybe everything is all about timing, like the time (this week) America's lead cyber-defense agency sounded the alarm on insider threats after it came to light that its senior official uploaded sensitive documents to ChatGPT.…

Categories: News

To stop crims, Google starts dismantling residential proxy network they use to hide

The Register - Thu, 29/01/2026 - 17:00
The Chocolate Factory strikes again, targeting the infrastructure attackers use to stay anonymous

Crims love to make it look like their traffic is actually coming from legit homes and businesses, and they do so by using residential proxy networks. Now, Google says it has "significantly degraded" what it believes is one of the world's largest residential proxy networks.…

Categories: News

AV vendor goes to war with security shop over update server scare

The Register - Thu, 29/01/2026 - 16:58
eScan lawyers up after Morphisec claimed 'critical supply-chain compromise'

A spat has erupted between antivirus vendor eScan and threat intelligence outfit Morphisec over who spotted an update server incident that disrupted some eScan customers earlier this month.…

Categories: News

Seven habits that help security teams reduce risk without slowing delivery

The Register - Thu, 29/01/2026 - 16:01
The right habits change everything

Sponsored Post  Security teams are under pressure from every direction: supply chain threats are rising, regulatory expectations are tightening, and development cycles aren’t getting any slower. Yet for many organizations, the practical work of improving software security still comes down to the same challenge — how do you reduce exposure without constantly battling developers, delaying releases, or piling on process?

That’s where a more consistent set of habits can make a measurable difference.
Rather than treating software supply chain security as a one-off initiative, many teams are shifting toward repeatable practices they can build into everyday workflows. The goal isn’t perfection; it’s improving baseline security in ways that actually stick, across teams and tool chains.

Chainguard is hosting an upcoming webinar-style event designed to help security and engineering leaders identify the habits that matter most. The session explores seven practical approaches for building more secure software pipelines, with a focus on reducing risk while keeping delivery moving.…

Categories: News

ShinyHunters swipes right on 10M records in alleged dating app data grab

The Register - Thu, 29/01/2026 - 15:05
Extortion crew says it's found love in someone else's info as Match Group plays down the impact

ShinyHunters has added a fresh notch to its breach belt, claiming it has pinched more than 10 million records from Match Group, a US firm that owns some of the world's most widely used swipe-based dating platforms.…

Categories: News

Patch or perish: Vulnerability exploits now dominate intrusions

The Register - Thu, 29/01/2026 - 13:53
Apply fixes within a few hours or face the music, say the pros

What good is a fix if you don't use it? Experts are urging security teams to patch promptly as vulnerability exploits now account for the majority of intrusions, according to the latest figures.…

Categories: News

Cyberattack on Poland's power grid could have turned deadly in winter cold

The Register - Thu, 29/01/2026 - 12:10
Close call after an apparently deliberate attempt to starve a country of energy at the worst time

Cybersecurity experts involved in the cleanup of the cyberattacks on Poland's power network say the consequences could have been lethal.…

Categories: News

Ransomware crims forced to take off-RAMP as FBI seizes forum

The Register - Wed, 28/01/2026 - 21:26
Cybercrime solved. The end

Ransomware crims have just lost one of their best business platforms. US law enforcement has seized the notorious RAMP cybercrime forum's dark web and clearnet domains.…

Categories: News

Everybody is WinRAR phishing, dropping RATs as fast as lightning

The Register - Wed, 28/01/2026 - 18:59
Russians, Chinese spies, run-of-the-mill crims …

Come one, come all. Everyone from Russian and Chinese government goons to financially motivated miscreants is exploiting a long-since-patched WinRAR vuln to bring you infostealers and Remote Access Trojans (RATs).…

Categories: News

Fortinet unearths another critical bug as SSO accounts borked post-patch

The Register - Wed, 28/01/2026 - 16:30
More work for admins on the cards as they await a full dump of fixes

Things aren't over yet for Fortinet customers – the security shop has disclosed yet another critical FortiCloud SSO vulnerability.…

Categories: News

Old Windows quirks help punch through new admin defenses

The Register - Wed, 28/01/2026 - 13:16
Google researcher sits on UAC bypass for ages, only for it to become valid with new security feature

Microsoft patched a bevy of bugs that allowed bypasses of Windows Administrator Protection before the feature was made available earlier this month.…

Categories: News

Paranoid WhatsApp users rejoice: Encrypted app gets one-click privacy toggle

The Register - Tue, 27/01/2026 - 22:15
Meta also replaces a legacy C++ media-handling security library with Rust

Users of Meta's WhatsApp messenger looking to simplify the process of protecting themselves are in luck, as the company is rolling out a new feature that combines multiple security settings under a single, toggleable option. …

Categories: News

Let them eat sourdough: ShinyHunters claims Panera Bread as stolen credentials victim

The Register - Tue, 27/01/2026 - 19:49
Plus, the gang says it got in via Microsoft Entra SSO

ShinyHunters says it stole several slices of data from Panera Bread, but that's just the yeast of everyone's problems. The extortionist gang also claims to have stolen data from CarMax and Edmunds, in addition to three other organizations it posted to its blog last week.…

Categories: News

China-linked group accused of spying on phones of UK prime ministers' aides – for years

The Register - Tue, 27/01/2026 - 15:50
Reports say Salt Typhoon attackers accessed handsets of senior govt folk

Chinese state-linked hackers are accused of spending years inside the phones of senior Downing Street officials, exposing private communications at the heart of the UK government.…

Categories: News

Pages

Subscribe to Sec Tec Limited aggregator - News