Skip to main content

Half of VMware users plan to reduce usage by 2028

1 hour 23 minutes ago
Silent exodus brewing but other customers say they feel trapped

Half of VMware users plan to reduce their use of the virtualization pioneer’s products by 2028, according to a survey by independent analyst firm Virtified.…

Simon Sharwood

Mozilla introduces cq, describing it as 'Stack Overflow for agents'

3 hours 10 minutes ago
A knowledge database where AI agents read, add and score the items – what could go wrong?

Mozilla is building cq - described by staff engineer Peter Wilson as "Stack Overflow for agents" - as an open source project to enable AI agents to discover and share collective knowledge.…

Tim Anderson

Systemd-free antiX Linux 26: Debian 13, in bonsai form

4 hours 2 minutes ago
Plus: Still supports 32-bit hardware or VMs

AntiX Linux is a heavily cut-down version of Debian 13, with a choice of init systems and ultralightweight GUIs. This means it's able to run usefully on older and lower-end PCs – and, of course, to run faster on modern ones.…

Liam Proven

Avalonia bolts Linux and WebAssembly onto .NET MAUI

5 hours 9 minutes ago
Broader platform coverage lands, if developers can tolerate the rough edges

AvaloniaUI has previewed MAUI support for Linux and WebAssembly browser applications – platforms Microsoft's own cross-platform .NET framework lacks – but low adoption and persistent bugs are likely to constrain uptake.…

Tim Anderson

Public-private partnerships vital in disrupting China's Typhoons, says RSA panel with no government speakers

16 hours 16 minutes ago
Washington content to be represented by actual empty chairs

RSAC 2026  Back in the day (circa 2023) when cybercrime group Scattered Spider and its help-desk voice-phishing calls were a relatively new threat, the feds considered pulling the government's top cyber-threat hunters and their private-sector counterparts into one room to share information, in real time, about this loosely knit extortion ring that was terrorizing enterprises.…

Jessica Lyons

Smooth criminals talking their way into cloud environments, Google says

16 hours 16 minutes ago
Voice phishing is second most common initial access method across all IR probes, and top in cloud break-ins

RSAC 2026  Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims' IT estate – and the No. 1 tactic used when breaking into cloud environments.…

Jessica Lyons

AI agents are 'gullible' and easy to turn into your minions

16 hours 19 minutes ago
Zenity CTO demos 0-click AI agent exploits on stage at RSAC

RSAC 2026  There's a very simple reason why just about every enterprise AI agent is vulnerable to zero-click attacks, according to Michael Bargury, CTO of AI security company Zenity.…

Jessica Lyons

Palantir trial plugs into UK financial watchdog's data trove

17 hours 9 minutes ago
US analytics firm handed access to sensitive intel, raising yet more questions about vendor lock-in

US data miner Palantir has quietly landed inside the UK's financial watchdog, plugging into a trove of sensitive data as Whitehall simultaneously insists it wants to wean itself off exactly this kind of dependency.…

Carly Page

Lightning-fast exploits make it essential to patch fast, ask questions later

18 hours 20 minutes ago
Here's where you ought to spend your security billable hours budget this year

Strengthen your MFA policies, double-down on anti-phishing training, and for Jobs' sake, patch all your vulns right away. The past year of intelligence collected by Cisco's Talos threat hunters suggests that attackers are moving faster to exploit vulns, and fooling more staff than ever into giving up their credentials. …

Brandon Vigliarolo
Checked
1 hour 2 minutes ago
The Register
Biting the hand that feeds IT — Enterprise Technology News and Analysis
Subscribe to The Register feed