Sumo brings agentic AI to cybersecurity investigations
Modern security operations centers (SOCs) face a perfect storm of complexity: growing alert volumes, fragmented tools, and pressure to respond faster than ever.
Intelligent operations platform Sumo Logic is announcing new advancements to Dojo AI, its enterprise-grade agentic AI platform for security operations to help security teams reduce alert fatigue, accelerate investigations, and streamline security workflows.
Why offensive security is the future of cybersecurity [Q&A]
In an era where cyber threats are evolving faster than ever, organizations can no longer rely solely on reactive defences. Offensive security, once a niche practice, is now a strategic imperative.
To better understand this shift, we spoke with Scott Reininga, CEO of Reversec, a cybersecurity firm at the forefront of offensive security innovation. He explains why offensive security is becoming essential, how it differs from traditional methods, and what organizations can do to adopt a more proactive stance.
Learning to spot the AI phone scammers
Scam phone calls are a fact of life these days, whether it’s home improvement grants or someone pretending to be your bank. UK mobile network O2 recently blocked 50 million dodgy calls monthly using its defense system.
But now they’re often being made using AI rather than real people in distant call centers. Naveed Janmohamed, CEO and founder of the AI research assistant Anara, says learning to spot artificial voices during phone calls might save thousands of people from sophisticated cons that have already stolen millions from unsuspecting consumers.
Brit’s fear privacy breaches despite Online Safety Act
Although the UK's Online Safety Act has made significant strides in holding online platforms accountable for harmful content, new research reveals a concerning gap in personal cybersecurity awareness among British internet users.
The study from AstrillVPN analysed search data from Google Keyword Planner to identify the privacy concerns most frequently searched by Britons. The results show password security and anonymous browsing are currently dominating the public’s attention.
How biometrics are reshaping authentication [Q&A]
The death of the password has been predicted for a very long time, though other methods are now gaining significant traction.
Perhaps the most successful of these is the use of biometrics. We talked to David Stauffer, director of sales North America at Veridas, about how biometrics is transforming authentication across financial services and telcos, and how voice-based verification enhances security against fraud, user experience and operational efficiency.
Power availability shapes future data center plans
Power constraints in the world’s largest data center hubs are now reshaping where hyperscalers plan their next wave of expansion, according to new analysis by DC Byte.
The analysis tracks activity across more than 8,000 facilities and looks at how the geography of hyperscale growth is evolving in response to mounting infrastructure pressure. Hyperscalers are now securing power and land up to 24 to 36 months before delivery as constraints intensify in markets such as Northern Virginia, Frankfurt and Singapore.
How LLMs could revolutionize ad blocking
Ad blocking software has traditionally relied on filter lists. These need time consuming and regular maintenance in order to keep them up to date and effective.
There have been previous attempts to update ad blocking using machine learning, but new research from AdGuard looks at the potential to use large language models (LLMs) to improve the way it works.
Online shoppers warned of QR code phishing scam
With Black Friday on the horizon and peak holiday shopping underway people are expecting deliveries. When shoppers are tracking multiple orders at once they are far more willing to trust a parcel that arrives unexpectedly and a new quishing scam is looking to exploit that.
If scammers have your name and address from previous data breaches, scraped social media posts or public directories, they cab easily make a fake parcel look authentic. Adding a QR code makes people think it’s related to tracking or returns so they’re likely to scan it without thinking.
The invisible attack that could be stealing your payment details while you shop
Experts from NordVPN are warning about a rise in ‘invisible’ attacks that can steal payment details on legitimate eCommerce sites.
Known as e-skimming this involves malicious JavaScript code being injected into legitimate eCommerce sites to steal customers’ payment data during checkout. This is the online equivalent of physical skimming devices found on ATMs or gas pumps.
KEV catalog missing 88 percent of exploits
New research from Miggo Security suggests that CISA’s Known Exploited Vulnerabilities (KEV) catalog now reflects only a small slice of real-world exploit risk in open source, and it raises questions about how the industry should be using KEV going forward.
Using open source code speeds innovation but expands the attack surface with every imported library and dependency. The result is a growing catalog of vulnerabilities, each one a potential entry point for attackers.
Bridging the gap between legacy systems and AI [Q&A]
Many companies are still heavily reliant on legacy systems, which can lead to high maintenance costs, limited flexibility, and increased security risks. All of which can hold back AI integration.
We spoke to Jorge Lopez, CEO of Jalasoft, about the critical role legacy systems play in today’s rapidly evolving AI landscape and how organizations can modernize strategically without disrupting core operations.
Developers more productive with AI but only 18 percent fully trust it
New research finds that 85 percent of developers report higher productivity with AI, yet only 18 percent say that they fully trust it.
The study from Techreviewer was conducted among senior developers, CTOs, and tech executives from 19 countries. It shows that 64 percent of developers use AI tools every day, with only two percent never using them. ChatGPT leads in popularity at 84 percent usage, followed by Claude (64 percent), Copilot (56 percent), and Cursor (53 percent).
Cybercriminal activity increases ahead of the holiday season
Every year, the holiday season brings a predictable spike in online activity. However, in 2025, new reports suggest the volume of newly created malicious infrastructure, account compromise activity, and targeted exploitation of eCommerce systems is markedly higher.
Fortinet’s FortiGuard labs identified more than 18,000 holiday-themed domains registered in the past three months, including terms such as ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale.’ At least 750 of these were confirmed malicious. This indicates many domains are still considered non-malicious, posing a potential risk.
Is your digital calendar putting you at risk?
New research from Bitsight finds that events synced in your digital calendar could be exposing you to phishing, malware and AI jailbreak attacks.
Bitsight’s TRACE research team discovered more than 390 abandoned domains related to iCal sync requests for subscribed calendars, potentially putting around four million devices at risk.
Ransomware attacks targeted at weekends and holidays
Most ransomware attacks occur during weekends and holidays, times of distraction or disruption when the majority of SOCs are not adequately staffed.
A new report from Semperis finds that 52 percent of surveyed organizations in the US, UK, France, Germany, Italy, Spain, Singapore, Canada, Australia and New Zealand were targeted at holidays or weekends.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.