The Register

  • OpenClaw, but in containers: Meet NanoClaw
    by Thomas Claburn on March 1, 2026 at 11:30

    A smaller, security-conscious take on the viral AI agent platform Interview  Ideally, you shouldn’t have to defend yourself against your own AI agent. But we don’t live in an ideal world and an unrestrained agent can cause a ton of damage.…

  • SaaS-pocalypse chatter is doomster pr0n. It would be nice if enterprise IT were boring again
    by Lindsay Clark on March 1, 2026 at 08:38

    Lost among the investor froth, someone has to do all the boring stuff. And they’ll probably be around for the next spin of the hype cycle Opinion  Say goodbye to the SaaS-pocalypse theory, which posits that advances in AI will bring the software-as-a-service market to its knees. Say hello to “a feedback loop with no natural brake.” Or doomster porn, as others would have it.…

  • Denizens of DEF CON are ‘fed up with government’
    by Jessica Lyons on February 28, 2026 at 11:11

    Jake Braun thinks hackers need to create a ‘Digital arsenal of democracy’ to defend us all Interview  Hackers – especially Jake Braun – are “fed up with government.”…

  • Open source devs consider making hogs pay for every Git pull
    by Steven J. Vaughan-Nichols on February 28, 2026 at 08:22

    Careless big-time users are treating FOSS repos like content delivery networks Opinion  I’m at the Linux Foundation Members Summit, and Sonatype’s CTO Brian Fox introduced me to a new open source problem. I wouldn’t have thought that was possible, but here I am.…

  • Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool
    by Jessica Lyons on February 27, 2026 at 22:59

    Credential and cryptocurrency theft, live surveillance, ransomware – an attacker’s Swiss Army knife A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks on Windows machines by bundling ransomware and data theft, along with credential and cryptocurrency stealers, live surveillance, and a whole host of other illicit capabilities, all controllable from a centralized dashboard.…

How To Geek