Ransomware attacks targeted at weekends and holidays
Most ransomware attacks occur during weekends and holidays, times of distraction or disruption when the majority of SOCs are not adequately staffed.
A new report from Semperis finds that 52 percent of surveyed organizations in the US, UK, France, Germany, Italy, Spain, Singapore, Canada, Australia and New Zealand were targeted at holidays or weekends.
How AI-powered digital employee experience programs are reshaping IT [Q&A]
Digital employee experience, or DEX, is about how employees engage with the technology and services they use every day: everything from laptops, apps, collaboration tools to networks.
We spoke to Dean Fernandes, CTO of NWN.ai to find out more about the importance of DEX and how it’s changing the world of IT.
Social media and marketplace scams surge ahead of the holiday season
New research from online protection company Malwarebytes exposes how social media and online marketplaces have become hotbeds for holiday shopping scams.
It finds that 51 percent of people encounter scams on social media weekly while an unlucky 27 percent meet scams daily. For marketplace shoppers, 36 percent are hit with a scam weekly and 15 percent experience one daily.
Security teams want automation but 96 percent face problems implementing it
A new survey of 750 senior cyber security professionals across the US, UK and Australia, carried out by Opinion Matters for ThreatQuotient, finds 97 percent now regard automation, increasingly powered by AI technologies, as essential to business operations.
However, despite 49 percent of respondents obtaining net new budget allocation for cybersecurity automation this year -- up from 39 percent last year -- 96 percent still face persistent challenges, particularly around technology limitations, lack of trust in the outcomes of automated processes, and insufficient time to implement solutions.
Why CISOs are betting on identity firewalls to stop the next breach [Q&A]
The network firewall was designed for a world that doesn’t exist anymore. When corporate assets sat behind a data center perimeter, inspecting packets between ‘inside’ and ‘outside’ made sense.
But today, with workloads spread across multiple clouds, SaaS platforms, and edge environments, that perimeter has dissolved. Attackers don’t need to smash through firewalls when they can compromise privileged credentials and operate from within. A rogue or stolen admin account can cause catastrophic damage, something no network firewall can stop. The battlefield has shifted from networks to identities.
One in 11 new Black Friday websites is malicious
Retailers aren’t the only ones to want to make the most of Black Friday, it’s a boom time for scammers too. New analysis by Check Point reveals that one in 11 newly registered Black Friday-themed domains is classified as harmful.
October saw 158 new Black Friday related domains, a 93 percent increase over the 2025 monthly average. Early November intensified that growth, with more than 330 new related domains appearing in only the first 10 days.
Over 71 percent of in-house IT builds fail to deliver
A survey of over 2,000 IT and security decision-makers finds that 71 percent of in-house IT builds are eventually abandoned. In heavily regulated industries like manufacturing and finance this rises to 83 percent, which underscores how complexity and compliance pressures make homegrown systems difficult to sustain.
The study from Exclaimer calls this ‘The DIY Mirage’, a false sense of control and efficiency that fades as maintenance demands, compliance risks, and long-term costs grow.
CVE system struggling to keep pace with modern development
A new report finds that the Common Vulnerabilities and Exposures (CVE) system struggles to keep pace with the realities of modern software development.
The study from Sonatype analyzed 1,552 open source vulnerabilities disclosed in 2025 and found that nearly two-thirds (64 percent) lacked severity scores from the National Vulnerability Database (NVD).
Half of security teams struggling to cope with volume of vulnerabilities
As the number of CVEs continues to rise, a new study finds 46 percent of respondents say that the volume of vulnerabilities has placed additional strain on their security teams’ resources impacting not only organizational security but also staff well being.
The report from Hackuity also shows that 26 percent, admit this pressure has contributed to a data breach, while 36 percent, report it resulted in a regulatory fine.
What went wrong at Cloudflare?
You may have noticed that yesterday ChatGPT, X and a number of other websites -- including BetaNews for a while -- were unavailable due to an issue with online security service Cloudflare. So what went wrong?
According to the company the problem occurred after a configuration file designed to handle threat traffic did not work as intended and ‘triggered a crash’ in its software handling traffic for its wider services.
Red Hat announces Project Hummingbird to boost cloud-native development
Today’s IT leaders frequently face a critical trade-off between delivery speed and systems security. AI-assisted and -generated coding tools accelerate development cycles, but this speed can run counter to the realities of managing multi-faceted, complicated software components.
This seemingly leaves CIOs with two choices, moving at the speed of business while balancing potential production systems risks, or being overcautious to the point of losing to competitor’s innovations.
Governance failures disrupt cloud migration plans
Nearly 40 percent of organizations have experienced security or compliance incidents directly linked to governance gaps introduced during cloud migration according to a new report.
The study from Pathlock, based on responses from 620 enterprise IT, compliance, and security leaders, finds that in spite of the regulatory pressures many organizations face, with respondents operating under major regulations like SOX, GDPR, and others, governance is often treated as an afterthought.
How AI is reshaping the future of healthcare [Q&A]
Artificial intelligence is reshaping healthcare systems across the globe. But to see where it stands today, and where it could be in the coming years, we need to better understand how AI can accelerate patient discharges, improve cancer detection, and support overstretched staff, while also addressing the barriers that have slowed adoption.
AI won’t replace doctors, but it can save healthcare. To find out how we spoke to prominent CIO with decades of healthcare experience, Richard Corbridge. Richard was previously the Chief Information Officer for the Health Service Executive in Ireland and was instrumental in the reform of the Irish healthcare technology system.
New detection platform built to prevent intellectual property theft
Most high-value digital assets, including source code, financial reports, strategic roadmaps, patents and proprietary research, don’t contain traditional sensitive data identifiers. As a result, they’re invisible to legacy pattern-matching tools.
This blind spot exposes organizations to intellectual property theft, insider threats, and accidental leaks through modern collaboration platforms and shadow AI tools. This is why Nightfall is today announcing the launch of AI File Classifier Detectors, a solution that uses large language models (LLMs) to classify and protect business-critical documents that traditional DLP tools can‘t see.
80 percent of IT leaders overestimate cybersecurity readiness
A new study from WanAware shows a widening disconnect between how prepared organizations believe they are for cybersecurity incidents and how they actually perform under real-world conditions.
The survey of 600 leaders across industries finds 80 percent of cybersecurity and IT decision-makers claim they can detect and contain a cyber incident in under eight hours. However, external benchmarks, including IBM’s Cost of a Data Breach 2025 report, show attackers dwell inside environments undetected for an average of 181 days and breaches take 60 days to contain.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.