Ian Barker

Ransomware attacks targeted at weekends and holidays

Ransomware dark web

Most ransomware attacks occur during weekends and holidays, times of distraction or disruption when the majority of SOCs are not adequately staffed.

A new report from Semperis finds that 52 percent of surveyed organizations in the US, UK, France, Germany, Italy, Spain, Singapore, Canada, Australia and New Zealand were targeted at holidays or weekends.

Continue reading

How AI-powered digital employee experience programs are reshaping IT [Q&A]

Digital employee experience DEX

Digital employee experience, or DEX, is about how employees engage with the technology and services they use every day: everything from laptops, apps, collaboration tools to networks.

We spoke to Dean Fernandes, CTO of NWN.ai to find out more about the importance of DEX and how it’s changing the world of IT.

Continue reading

Social media and marketplace scams surge ahead of the holiday season

Shopping scam doubt

New research from online protection company Malwarebytes exposes how social media and online marketplaces have become hotbeds for holiday shopping scams.

It finds that 51 percent of people encounter scams on social media weekly while an unlucky 27 percent meet scams daily. For marketplace shoppers, 36 percent are hit with a scam weekly and 15 percent experience one daily.

Continue reading

Security teams want automation but 96 percent face problems implementing it

Automation graphic

A new survey of 750 senior cyber security professionals across the US, UK and Australia, carried out by Opinion Matters for ThreatQuotient, finds 97 percent now regard automation, increasingly powered by AI technologies, as essential to business operations.

However, despite 49 percent of respondents obtaining net new budget allocation for cybersecurity automation this year -- up from 39 percent last year -- 96 percent still face persistent challenges, particularly around technology limitations, lack of trust in the outcomes of automated processes, and insufficient time to implement solutions.

Continue reading

Why CISOs are betting on identity firewalls to stop the next breach [Q&A]

Non-human identity fingerprint

The network firewall was designed for a world that doesn’t exist anymore. When corporate assets sat behind a data center perimeter, inspecting packets between ‘inside’ and ‘outside’ made sense.

But today, with workloads spread across multiple clouds, SaaS platforms, and edge environments, that perimeter has dissolved. Attackers don’t need to smash through firewalls when they can compromise privileged credentials and operate from within. A rogue or stolen admin account can cause catastrophic damage, something no network firewall can stop. The battlefield has shifted from networks to identities.

Continue reading

One in 11 new Black Friday websites is malicious

Domain name fake

Retailers aren’t the only ones to want to make the most of Black Friday, it’s a boom time for scammers too. New analysis by Check Point reveals that one in 11 newly registered Black Friday-themed domains is classified as harmful.

October saw 158 new Black Friday related domains, a 93 percent increase over the 2025 monthly average. Early November intensified that growth, with more than 330 new related domains appearing in only the first 10 days.

Continue reading

Over 71 percent of in-house IT builds fail to deliver

Project fail

A survey of over 2,000 IT and security decision-makers finds that 71 percent of in-house IT builds are eventually abandoned. In heavily regulated industries like manufacturing and finance this rises to 83 percent, which underscores how complexity and compliance pressures make homegrown systems difficult to sustain.

The study from Exclaimer calls this ‘The DIY Mirage’, a false sense of control and efficiency that fades as maintenance demands, compliance risks, and long-term costs grow.

Continue reading

CVE system struggling to keep pace with modern development

Cybersecurity

A new report finds that the Common Vulnerabilities and Exposures (CVE) system struggles to keep pace with the realities of modern software development.

The study from Sonatype analyzed 1,552 open source vulnerabilities disclosed in 2025 and found that nearly two-thirds (64 percent) lacked severity scores from the National Vulnerability Database (NVD).

Continue reading

Half of security teams struggling to cope with volume of vulnerabilities

Cloud vulnerability lock

As the number of CVEs continues to rise, a new study finds 46 percent of respondents say that the volume of vulnerabilities has placed additional strain on their security teams’ resources impacting not only organizational security but also staff well being.

The report from Hackuity also shows that 26 percent, admit this pressure has contributed to a data breach, while 36 percent, report it resulted in a regulatory fine.

Continue reading

What went wrong at Cloudflare?

Cloudflare

You may have noticed that yesterday ChatGPT, X and a number of other websites -- including BetaNews for a while -- were unavailable due to an issue with online security service Cloudflare. So what went wrong?

According to the company the problem occurred after a configuration file designed to handle threat traffic did not work as intended and ‘triggered a crash’ in its software handling traffic for its wider services.

Continue reading

Red Hat announces Project Hummingbird to boost cloud-native development

Software supply chain development

Today’s IT leaders frequently face a critical trade-off between delivery speed and systems security. AI-assisted and -generated coding tools accelerate development cycles, but this speed can run counter to the realities of managing multi-faceted, complicated software components.

This seemingly leaves CIOs with two choices, moving at the speed of business while balancing potential production systems risks, or being overcautious to the point of losing to competitor’s innovations.

Continue reading

Governance failures disrupt cloud migration plans

Cloud migration data

Nearly 40 percent of organizations have experienced security or compliance incidents directly linked to governance gaps introduced during cloud migration according to a new report.

The study from Pathlock, based on responses from 620 enterprise IT, compliance, and security leaders, finds that in spite of the regulatory pressures many organizations face, with respondents operating under major regulations like SOX, GDPR, and others, governance is often treated as an afterthought.

Continue reading

How AI is reshaping the future of healthcare [Q&A]

AI doctor medicine

Artificial intelligence is reshaping healthcare systems across the globe. But to see where it stands today, and where it could be in the coming years, we need to better understand how AI can accelerate patient discharges, improve cancer detection, and support overstretched staff, while also addressing the barriers that have slowed adoption.

AI won’t replace doctors, but it can save healthcare. To find out how we spoke to prominent CIO with decades of healthcare experience, Richard Corbridge. Richard was previously the Chief Information Officer for the Health Service Executive in Ireland and was instrumental in the reform of the Irish healthcare technology system.

Continue reading

New detection platform built to prevent intellectual property theft

IP data theft

Most high-value digital assets, including source code, financial reports, strategic roadmaps, patents and proprietary research, don’t contain traditional sensitive data identifiers. As a result, they’re invisible to legacy pattern-matching tools.

This blind spot exposes organizations to intellectual property theft, insider threats, and accidental leaks through modern collaboration platforms and shadow AI tools. This is why Nightfall is today announcing the launch of AI File Classifier Detectors, a solution that uses large language models (LLMs) to classify and protect business-critical documents that traditional DLP tools can‘t see.

Continue reading

80 percent of IT leaders overestimate cybersecurity readiness

Glowing security padlock

A new study from WanAware shows a widening disconnect between how prepared organizations believe they are for cybersecurity incidents and how they actually perform under real-world conditions.

The survey of 600 leaders across industries finds 80 percent of cybersecurity and IT decision-makers claim they can detect and contain a cyber incident in under eight hours. However, external benchmarks, including IBM’s Cost of a Data Breach 2025 report, show attackers dwell inside environments undetected for an average of 181 days and breaches take 60 days to contain.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.