Cryptographers engage in war of words over RustSec bug reports and subsequent ban Rust security maintainers contend Nadim Kobeissi's vulnerability claims are too much Security20 Mar 2026 | 29
UK police force presses pause on live facial recognition after study finds racial bias Cams statistically more likely to ID Black people, says new research Public Sector20 Mar 2026 | 42
Feds disrupt monster IoT botnets behind record-breaking DDoS attacks Millions of hijacked devices powered traffic floods targeting defense systems and beyond Cyber-crime20 Mar 2026 | 11
Jaguar Land Rover's cyber bailout sets worrying precedent, watchdog warns Lack of clear criteria risks encouraging firms to lean on state support instead of worrying about insurance Cyber-crime20 Mar 2026 | 25
Starmer's digital ID reboot raises same old questions as its Blair-era ancestor Opinion Audit trails aplenty, but no price tag – and no clue how long your data sticks around Public Sector20 Mar 2026 | 59
While you're here, could you go out of your way to do an impossible job? On Call He would have gotten away with it too, if it weren't for a meddling security team's fear of USB On-Prem20 Mar 2026 | 96
Unknown attackers exploit yet another critical SharePoint bug Last time: Beijing-backed snoops and ransomware crims. Who's next? Cyber-crime19 Mar 2026 | 3
Google gives Android users a way to install unverified apps if they prove they really, really want to Chocolate Factory describes concession as an attempt to balance openess with safety Security19 Mar 2026 | 53
Lock down Microsoft Intune, feds warn after Stryker attack Iran-linked attackers wiped employees' devices using Intune Cyber-crime19 Mar 2026 | 11
Okta made a nightmare micromanager for your AI agents Where are you? What are you working on? Why are you doing that? AI + ML18 Mar 2026 | 4
State snoops and spyware vendors planting info-stealing malware on iPhones, Google warns Darksword is the second iOS exploit chain in a month Research18 Mar 2026 | 25
Ransomware crims abused Cisco 0-day weeks before disclosure, says Amazon security boss Interlock's post-exploit toolkit exposed Security18 Mar 2026 |
North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators Cyber-crime18 Mar 2026 | 27
Britain's satellite-watching gap to be plugged with £17.5M eyeball in Cyprus No 1 Space Operations Squadron will get a persistent stare capability Offbeat18 Mar 2026 | 34
Iran's cyberattack against med tech firm is 'just the beginning' Even without a navy, or air power, 'They'll still have the ability to hack' Security18 Mar 2026 | 12
Linux Foundation kicks off effort to shield FOSS maintainers from AI slop bug reports Big Tech donates $12.5 million to get things rolling AI + ML18 Mar 2026 | 18
Japan to allow ‘proactive cyber-defense’ from October 1st In less polite places, this is called ‘hacking back’ or ‘offensive cyber-ops’ Security18 Mar 2026 | 9
WorldCoin's newest pitch: Scan your eyeballs to prove AI agents really represent you Sell your soul to the orb Security17 Mar 2026 | 20
EU sanctions Iranian cyber front over election meddling, Charlie Hebdo breach State-sponsored attackers joined by Chinese snoops and hackers-for-hire in latest round of economic penalties Security17 Mar 2026 | 6
Too big to ignore, too small to be served: the midmarket security gap Midmarket security leaders aren't as secure as they think, says Intruder's report Partner Content
Microsoft breaks Microsoft account sign-ins in Windows 11 with latest update OneDrive, Office, Teams Free users greeted with phantom 'no internet' errors, restart may help if you're lucky
While you're here, could you go out of your way to do an impossible job? On Call He would have gotten away with it too, if it weren't for a meddling security team's fear of USB
Jeff Bezos' rocket company Blue Origin applies to launch 51,000 datacenter satellites ‘Project Sunrise’ needs a network that doesn’t exist, a rocket that’s hardly flown, and FCC approval
Supermicro co-founder arrested, charged over $2.5B Nvidia GPU sales to China Indictment claims dummy servers and bogus docs used to slip past US export controls
UK to rethink tech buying after Palantir contracts Government looks for sovereign tech as NHS deal nears break clause
Jaguar Land Rover's cyber bailout sets worrying precedent, watchdog warns Lack of clear criteria risks encouraging firms to lean on state support instead of worrying about insurance
Feds disrupt monster IoT botnets behind record-breaking DDoS attacks Millions of hijacked devices powered traffic floods targeting defense systems and beyond
UK police force presses pause on live facial recognition after study finds racial bias Cams statistically more likely to ID Black people, says new research
Cryptographers engage in war of words over RustSec bug reports and subsequent ban Rust security maintainers contend Nadim Kobeissi's vulnerability claims are too much
Alibaba has made 470,000 AI chips, admits they’re inferior and may always be Sees optimizing its entire cloud around homebrew silicon as the way to compete
Switzerland built a secure alternative to BGP. The rest of the world hasn't noticed yet Feature SCION: Proven in banking and healthcare, slow to spread everywhere else Networks17 Mar 2026 | 67
Gartner suggests Friday afternoon Copilot ban because tired users may be too lazy to check its mistakes Admins may be even more exhausted by then, because securing Microsoft’s AI helper is not a trivial job Security17 Mar 2026 | 35
Bank built its own threat hunting agent because vendors can’t keep pace with new threats AI helped send weekly threat signal count from 80 million to 400 billion, then helped response time shrink from two days to 30 minutes Security17 Mar 2026 | 11
Robotics surgical biz Intuitive discloses phishing attack Operations and hospital networks not affected, we're told Cyber-crime16 Mar 2026 | 1
Cybercrime has skyrocketed 245% since the start of the Iran war Hacktivists use proxy services from Russia, China for 'billions of designed-for-abuse connection attempts' Cyber-crime16 Mar 2026 | 1
AI finally delivers those elusive productivity gains... for cybercriminals Interpol says fraud schemes using the tech are 4.5x more profitable Cyber-crime16 Mar 2026 | 7
Flaw in UK's corporate registry let directors rummage through rival records Back button blunder in WebFiling service run by Companies House revealed confidential paperwork Security16 Mar 2026 | 16
Outsourcer Telus admits to attack – may have lost a petabyte of data to ShinyHunters Infosec In Brief PLUS: Citrix CISO urges patch blitz; Mandiant founder reveals AI red-teaming tech; Bitter privacy news for Starbucks; And more Security15 Mar 2026 | 6
Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others And then they send victims to the legit VPN download to hide their tracks Cyber-crime13 Mar 2026 | 4
Interpol cybercrime crackdown leads to 94 arrests, 45,000 IP takedowns Operation Synergia's third season is the most productive to date Cyber-crime13 Mar 2026 | 6
NanoClaw latches onto Docker Sandboxes for safer AI agents exclusive Take your YOLO and box it up Security13 Mar 2026 | 3
Google rushes Chrome update fixing two zero-days already under attack Skia graphics lib and V8 JavaScript engine brings browser's tally of actively exploited bugs to three in 2026 Patches13 Mar 2026 | 8
Rogue AI agents can work together to hack systems and steal secrets Prompt like a hard-ass boss who won't tolerate failure and bots will find ways to breach policy Research12 Mar 2026 | 7
Operation Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud International cops stuck down 23 servers in 7 countries Cyber-crime12 Mar 2026 | 4
CISA warns max-severity n8n bug is being exploited in the wild No rest for project maintainers battered by slew of vulnerability disclosures Cyber-crime12 Mar 2026 | 1
China’s CERT warns OpenClaw can inflict nasty wounds Like deleting data, exposing keys, and loading malicious content - which may be why Beijing has reportedly banned it Security12 Mar 2026 | 1
Iran plots 'infrastructure warfare' against US tech giants State news published a list of nearly 30 sites that could be targeted Security11 Mar 2026 | 44
Iran-linked cyber crew says they hit US med-tech firm Meanwhile, Verifone says 'no evidence' to support the digital intruders' claims Cyber-crime11 Mar 2026 | 6
Meta, international cops use handcuffs and AI to stop scammers 150k accounts nuked, 21 suspects arrested Cyber-crime11 Mar 2026 | 8
ICO fines Police Scotland over data-sharing debacle in gross misconduct case Blue-on-blue internal investigation lands force £66k fine Security11 Mar 2026 | 16
Swiss e-voting pilot can't count 2,048 ballots after USB keys fail to decrypt them Officials suspend Basel-Stadt trial and launch probe Public Sector11 Mar 2026 | 109
Dutch cops bust teen suspected of posing as bank staff to steal cards 17-year-old allegedly withdrew large sums of cash from ATMs Cyber-crime11 Mar 2026 | 2
EU legal eagle says banks should refund cybercrime victims first, argue later Analysis Advocate General urges rethink of PSD2 to speed compensation after scams Security11 Mar 2026 | 5
Building the UK’s next generation of cyber talent Reflecting on the relaunch of the UK Cyber Team and introducing the next phase of leadership Partner Content
Critical Microsoft Excel bug weaponizes Copilot Agent for zero-click information disclosure attack Could steal sensitive personal and financial data Security10 Mar 2026 | 39
Cybercrime isn't just a cover for Iran's government goons - it's a key part of their operations Ransomware, malware-as-a-service, infostealers benefit MOIS, too Cyber-crime10 Mar 2026 | 14
Crooks compromise WordPress sites to push infostealers via fake CAPTCHA prompts Rapid7 says crims broke into more than 250 sites globally, including a US Senate candidate’s campaign page Cyber-crime10 Mar 2026 | 8
Fake job applications pack malware that kills endpoint detection before stealing data Russian-speaking attackers lure HR staff into downloading ISO files that disable defenses Research10 Mar 2026 | 39
Ericsson blames vendor vishing slip-up for breach exposing thousands of records Crooks used simple phone scam to compromise vendor account, spilling personal and financial data belonging to more than 15,000 people Cyber-crime10 Mar 2026 | 3
Protecting democracy means democratizing cybersecurity. Bring on the hackers Opinion Digital freedom needs a Kali Linux for the rest of us Security10 Mar 2026 | 9
Polish cops bust alleged teen DDoS kit sellers – youngest just 12 Kids profited from tools used to attack popular websites, say officials Cyber-crime10 Mar 2026 | 25
AI vs AI: Agent hacked McKinsey's chatbot and gained full read-write access in just two hours David and Goliath…but with AI agents Security09 Mar 2026 | 24
ShinyHunters claims more high-profile victims in latest Salesforce customers data heist And they abused a Mandiant-developed open source tool in the attacks Cyber-crime09 Mar 2026 |
EV charger biz ELECQ zapped by ransomware crooks, customer contact data stolen Exclusive An attack on the company’s AWS platform may have exposed customers' names and home addresses Cyber-crime09 Mar 2026 | 14
Dutch cops warn 100 alleged scammers: Turn yourselves in or we tell Grandma Two-week deadline to fraudsters to fess up or have their faces plastered across every screen in the country Security09 Mar 2026 | 21
Russian cybercrims phish their way into officials' Signal and WhatsApp accounts Dutch spies flag large-scale campaign to hijack secure messaging accounts Cyber-crime09 Mar 2026 | 13
Microsoft Azure CTO set Claude on his 1986 Apple II code, says it found vulns This isn't just a nostalgia trip – billions of legacy microcontrollers may be at risk AI + ML09 Mar 2026 | 45
Royal Navy races to arm ships against drone threat Britain's Ministry of Defence wants a counter-drone system designed, contracted, and delivered within weeks Edge + IoT09 Mar 2026 | 106
Iran is the first out-loud cyberwar the US has fought Kettle Cyber is no longer the hush-hush thing it used to be, as team Trump invades Iran with hackers taking the lead Security09 Mar 2026 | 25
FBI is investigating breach that may have hit its wiretapping tools Infosec In Brief PLUS: Europol takes down two crime gangs; LastPass users phished (again); Crooks increase crypto hauls; And more Security08 Mar 2026 | 10
AI agents now help attackers, including North Korea, manage their drudge work interview Crims 'will do what gets them their objective easiest and fastest,' Microsoft threat intel boss tells The Reg Security08 Mar 2026 | 9
Firefox taps Anthropic AI bug hunter, but rancid RAM still flipping bits Now if only device makers would deliver higher quality components AI + ML06 Mar 2026 | 32
Spyware disguised as emergency-alert app sent to Israeli smartphones Steals SMS messages, location data, contacts … and delivers it to Hamas-linked crew Cyber-crime06 Mar 2026 | 26
Cisco warns of two more SD-WAN bugs under active attack Switchzilla says flaws could allow file overwrites or privilege escalation Cyber-crime06 Mar 2026 | 4
Microsoft spots ClickFix campaign getting users to self-pwn on Windows Terminal Crooks tweak familiar copy-paste ruse so that victims run malicious commands themselves Cyber-crime06 Mar 2026 | 5
Son of government contractor arrested after alleged $46M crypto heist from US Marshals FBI and French GIGN swoop on Saint Martin, John Daghita in cuffs Security06 Mar 2026 | 6
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October Released from the curse of the update bork fairy OSes06 Mar 2026 | 10
Transport for London says 2024 breach affected 7M customers, not 5,000 Attackers accessed systems holding data tied to millions of Oyster and contactless users Cyber-crime06 Mar 2026 | 12
Google says spyware makers and China-linked groups dominated zero-day attacks last year Of the 90 zero-days GTIG tracked in 2025, 43 hit enterprise tech Security05 Mar 2026 | 2
Iran intelligence backdoored US bank, airport, software outfit networks MOIS-linked MuddyWater crew has a new, custom implant Cyber-crime05 Mar 2026 | 18
UK watchdog eyes Meta's smart glasses after workers say they 'see everything' Contractors tasked with improving AI reportedly had access to intimate footage captured through wearables Security05 Mar 2026 | 113
'Hundreds' of Iranian hacking attempts have hit surveillance cameras since the missile strikes Attack infrastructure attributed to 'several Iran-nexus threat actors' Cyber-crime04 Mar 2026 | 33
Malware-laced OpenClaw installers get Bing AI search boost Think before you download Cyber-crime04 Mar 2026 | 6
LexisNexis confirms data breach at Legal & Professional arm, some customer records affected Crooks claim 2 GB haul from AWS instance via React2Shell exploit Cyber-crime04 Mar 2026 | 8
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation Follows suggestions iPhone-pwning toolset bears hallmarks of zero-days that targeted Russian diplomats Security04 Mar 2026 | 8
Google feels the need for security speed, so will ship Chrome updates every two weeks Retains eight-weekly Extended Stable releases but warns fortnightly updates are the best way to stay safe Software04 Mar 2026 | 18
Dev stunned by $82K Gemini bill after unknown API key thief goes to town Probably not an isolated incident only as researchers have already found 2,863 live API keys exposed Security03 Mar 2026 | 45
Chat at your own risk! Data brokers are selling deeply personal bot transcripts AI conversations for sale include sensitive health and legal details AI + ML03 Mar 2026 | 13
Cyberwarriors elevated to big leagues in US war with Iran No more hiding in the server closet: Cyber ops mentioned alongside kinetic warfare as critical to conflict Security03 Mar 2026 | 13
Turns out most cybercriminals are old enough to know better Law enforcement data shows profit-driven cybercrime is dominated by 35- to 44-year-olds, not script kiddies Cyber-crime03 Mar 2026 | 15
Until last month, attackers could've stolen info from Perplexity Comet users just by sending a calendar invite AI browsing agent left local files open for the taking Research03 Mar 2026 | 4
Chrome Gemini panel became privilege escalator for rogue extensions High-severity flaw let malicious add-ons access system via browser's embedded AI feature Security03 Mar 2026 | 4
Cybercriminals swipe 15.8M medical records from French doctors ministry Third-party software supplier breached leading to leak of notes Cyber-crime03 Mar 2026 | 4
Gamers furious as indie studio Cloud Imperium quietly admits to data breach Slow disclosure and odd reassurance that exposing names and contact details won't be a problem isn't going down well Security03 Mar 2026 | 39
Phish of the day: Microsoft OAuth scams abuse redirects for malware delivery Crims hope for payday from malicious payloads rather than stealing access tokens Security03 Mar 2026 | 3
Iran's cyberwar has begun 'Expect elevated activity for the foreseeable future' Cyber-crime02 Mar 2026 | 14
UK businesses told to brace cyber defenses amid Iran conflict risk NCSC urges all to review posture as escalating tensions increase risk of indirect digital spillover Cyber-crime02 Mar 2026 | 5
Memory scalpers hunt scarce DRAM with bot blitz We can remember it for you wholesale, and sell it back to you for big bucks Security02 Mar 2026 | 13
Scammers try to SIM-swap Dubai citizens hours after Iranian missile strikes Vulnerable citizens targeted by criminals purporting to represent fake police crisis department Cyber-crime02 Mar 2026 | 6
UK government's Vulnerability Monitoring System is working - fixes flow far faster Infosec In Brief PLUS: Firefox adds XSS protection; Leadership turnover at CISA; FTC exempts some data collection Security02 Mar 2026 | 4
South Korea’s tax office apologizes for leaking seed phrase to seized crypto Went from triumph at having busted tax dodgers to embarrassment at losing the proceeds Cyber-crime02 Mar 2026 | 5
Denizens of DEF CON are 'fed up with government' Interview Jake Braun thinks hackers need to create a 'Digital arsenal of democracy' to defend us all Research28 Feb 2026 | 65
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool Credential and cryptocurrency theft, live surveillance, ransomware - an attacker's Swiss Army knife Cyber-crime27 Feb 2026 |
Suspected Nork digital intruders caught breaking into US healthcare, education orgs Who is knocking at the Dohdoor? Cyber-crime27 Feb 2026 | 3
Ransomware payments cratered in 2025, but attacks surged to record highs Smaller crews piled in as old names splintered and rebranded Research27 Feb 2026 | 5
French DIY etailer ManoMano admits customer data stolen Updated Crooks claim they helped themselves to over 37M accounts during January hit on subcontractor Cyber-crime27 Feb 2026 | 9
Cops back Dutch telco Odido after second wave of ShinyHunters leaks Company refuses to pay ransom as attackers threaten larger daily dumps Cyber-crime27 Feb 2026 | 6
Rapid AI-driven development makes security unattainable, warns Veracode Report claims more vulnerabilities created than fixed as remediation gap widens Software26 Feb 2026 | 13
Scattered Lapsus$ Hunters auditioning female voices to sharpen social engineering Telegram posts promise up to $1,000 per call as gang refines IT helpdesk ruse Cyber-crime26 Feb 2026 | 4
Five Eyes warn: Patch your Cisco SD-WAN or risk root takeover A rare joint alert from all five spy agencies means serious business Networks26 Feb 2026 | 10