Application layer comes under threat

Risk threat readiness

A new report from Contrast Security exposes a growing crisis at the application layer as adversaries use AI to easily launch previously sophisticated attacks at scale.

Recent reports from Verizon (DBIR 2025) and Google Mandiant (M-Trends 2025) confirm what many security leaders already suspect: components of the application layer are among the most targeted and least protected part of the modern enterprise.

Continue reading

Outdated printer firmware can leave organizations open to attack

Woman using multi-function printer

In the past the printer has tended to be a pretty dumb device, but as they’ve gained more features and extra connectivity printers have become a target for attacks and potentially a way of gaining access to networks.

A new report from HP Wolf Security, based on global study of 800+ IT and security decision-makers (ITSDMs), highlighs the challenges of securing printer hardware and firmware.

Continue reading

Financial firms keen to use AI but their data isn't ready

Future artificial intelligence robot and cyborg.

A new study into AI readiness shows that while financial services firms are ready to adopt AI, they still have work to do in terms of improving data quality and modernizing systems.

The study from Indicum finds many financial services firms are hindered by legacy data systems and outdated IT infrastructure, which often lack the real-time processing and data quality capabilities required for effective AI deployment.

Continue reading

Ransomware surges 63 percent in Q2

Ransomware money

The second quarter of this year has seen a 63 percent increase in publicly disclosed ransomware attack volumes, with a total of 276 incidents compared to Q2 2024, according to the latest report from BlackFog.

This represents the highest number of attacks for this timeframe since the company began tracking ransomware volumes in 2020. All three months in the quarter set a new high compared with the same time period in previous years. June saw 113 percent increase with a total of 96 attacks. There was a 51 percent increase in April with a total of 89 attacks, and a 40 percent increase in May with 91 attacks.

Continue reading

Differing levels of access to AI create new inequalities

Artificial intelligence risk trap

A new survey of 4,000 knowledge workers across the UK, US, Germany, and Canada reveals that higher earners have disproportionate access to the latest AI tools and training, allowing them to reap AI's promised rewards.

In contrast, the study from The Adaptavist Group reveals that lower earners and women are being shut out from AI opportunities, which impacts their skill development, job satisfaction, and time savings, both personally and professionally.

Continue reading

What has AI done for us? Celebrating AI Appreciation Day

AI appreciation day

In the last few years artificial intelligence has found its way into more and more areas of our world and its progress shows no signs of slowing down.

Of course most things these days need a day to mark their achievements and today is AI Appreciation Day. So, what has AI done for us and what can we expect from it in future? Some industry experts gave us their views.

Continue reading

Is business logic abuse a growing problem for APIs? [Q&A]

Enterprise cyberattack

Tricking applications into altering their processes or surrendering information is a highly efficient way for attackers to carry out theft or fraud while minimizing the risk of detection.

We asked Mohammad Ismail, VP of EMEA at Cequence Security, to explain how this business logic abuse is carried out and why it’s becoming a growing problem.

Continue reading

Internet-exposed assets reveal industry vulnerability profiles

Internet web scraping

New analysis from CyCognito of over two million internet-exposed assets, across on-prem, cloud, APIs, and web apps, identifies exploitable assets across several key industries, using techniques that simulate real-world attacker behavior.

Techniques used include black-box pentesting using 90,000+ exploit modules, credential stuffing simulations, data exposure detection, etc. The study also used Dynamic Application Security Testing (DAST) to identify runtime web application vulnerabilities, as well as active vulnerability scanning of internet-facing services to detect CVEs, misconfigurations, and exposed assets.

Continue reading

Analysis of breached passwords shows almost all are weak

Bad password

New research from Specops has analyzed 10 million random passwords from the billion+ breached password list used by Specops Password Auditor and finds that a startling 98.5 percent are weak.

The research defines a ‘strong’ password as having at least 15 characters in length and at least two different character classes. A long password of 15 identical-class characters (for example all lowercase) is easier to crack than one that mixes in digits or symbols.

Continue reading

Google launches new AI security initiatives

AI protection security

Ahead of the summer’s round of cybersecurity conferences Google is announcing a range of new initiatives aimed at bolstering cyber defenses with the use of AI.

Last year the company launched Big Sleep, an AI agent developed by Google DeepMind and Google Project Zero, that actively searches and finds unknown security vulnerabilities in software.

Continue reading

Encryption adoption up but sensitive data is still at risk

Blue of ring and gears with key lock inside

Encryption adoption has soared to 94 percent, but inconsistent application continues to put sensitive data at risk, finds a new survey.

The study from secure storage maker Apricorn shows that 59 percent of IT security decision makers say encryption has increased, allowing them to better protect their data, including on lost/stolen devices.

Continue reading

Security teams struggle to prioritize and patch vulnerabilities

System patching

According to a new report 39 percent of security professionals say they struggle to prioritize risk remediation and patch deployment, with 35 percent saying they struggle to maintain compliance when it comes to patching vulnerabilities.

The study from Ivanti also finds 87 percent of security pros feel they do do not have access to the critical data needed to make informed security decisions. In addition 46 percent believe IT teams lack urgency when addressing cybersecurity problems.

Continue reading

93 percent of software execs plan to introduce custom AI agents

Agentic-AI

New research from OutSystems shows an increasing trend in agentic AI prioritization among software executives with 93 percent of organizations already developing -- or planning to develop -- their own custom AI agents.

IT leaders are under pressure to deliver measurable business value while managing constrained resources and aligning technology investments with long-term strategic goals. Introducing agentic AI helps address these demands by tackling challenges like fragmented tools, and limited ability to leverage data siloed across the organization.

Continue reading

The searches that reveal the most common email mistakes

Mistake-at-work

It’s known as an ohnosecond -- that moment just after you realize that you’ve made a mistake. Something that happens frequently with emails when you press send too soon, do reply all when you didn’t meant to, or just send a message to the wrong person.

A new study from ZeroBounce has analyzed search data from Google Keyword Planner to determine which email mistakes UK residents commonly make and need help fixing.

Continue reading

Addressing key tech challenges in the public sector [Q&A]

Public sector AI

Earlier this year the UK government released its State of digital government review, looking at how the public sector must urgently transform the way it approaches digital technology.

But with escalating cybersecurity threats, fragmented data strategies, and a widening digital skills gap, the sector may be setting itself up to fail. We spoke to Adam Casey, director of cyber security and CISO at tmc3, a Qodea company, to discuss the challenges the report raises and how they can be addressed.

Continue reading

Load More Articles