Ian Barker

Cybercriminals use AI to make malware less detectable

Malware shield

Cybercriminals are using AI-created malware that is adept at avoiding detection by traditional antivirus models, according to the latest report from Acronis.

The report also finds email attacks and ransomware cases have exploded relative to last year. Acronis-monitored endpoints are picking up valuable data about how cybercriminals operate and how some attacks have become more intelligent, sophisticated, and difficult to detect.

Continue reading

Dropbox introduces new AI-powered productivity features

1-dash-stacks-2560xauto

Cloud storage provider Dropbox is launching two new AI-powered productivity tools -- though they're not available to everyone just yet.

Dropbox Dash is a universal search that connects all of your tools, content, and apps in a single search bar to help you easily find what you need. There's also Dropbox AI, a new feature that lets customers quickly summarize and get information from their Dropbox files.

Continue reading

Attackers exploit the growing use of mobile devices

mobile-security

The growth in mobile device and app usage has created a growing attack surface, with 60 percent of global web traffic now coming from mobile devices. So it's not surprising that increasing numbers of cybercriminals and nation state actors want to exploit these areas of vulnerability.

The latest Global Mobile Threat Report from Zimperium finds that 80 percent of phishing sites now either specifically target mobile devices or are built to function on both mobile devices and desktops.

Continue reading

Proton Pass free password manager emerges from beta

PASS-imagedark-3-nologo

Although alternative technologies continue to make inroads, most of us are still heavily reliant on passwords to secure our digital identities.

Proton, the company behind Proton Mail, Proton VPN and other products, launched a new, free password manager called -- you'll have guessed already -- Proton Pass in beta a couple of months ago.

Continue reading

Why CSOs are prioritizing PKI infrastructure as they adapt to post-quantum cryptography [Q&A]

Blue of ring and gears with key lock inside

A growing number of machine identities leaves organizations with the task of managing increasingly complex PKI infrastructure.

We spoke to Chris Hickman, CSO of Keyfactor, about how organizations can go about reducing PKI complexity as well as other trends to keep in mind as they adapt to an era of post-quantum cryptography.

Continue reading

Majority are worried about the safety and accuracy of ChatGPT

ChatGPT

As generative AI tools continue to make the news there are growing concerns over safety and security as well as the accuracy of information produced.

Most people don't trust ChatGPT and have worries about its security and safety according to a new survey from Malwarebytes. The research shows that 81 percent are concerned about security and safety risks.

Continue reading

DDoS attacks more than doubled in 2022

DDoS attacks

New research from Nexusguard shows that last year DDoS attacks worldwide increased by 115.1 percent over the 2021 level.

Attackers have also continued to alter their threat vectors by targeting the application platforms, online databases, and cloud-based storage systems within Internet Service Providers (ISPs). This has resulted in a significantly greater impact globally as organizations continue to move more of their workloads to the cloud.

Continue reading

Enterprise SIEMs miss 76 percent of attack techniques

Attack route

Security information and event management systems (SIEMs) are missing detections for 76 percent of MITRE ATT&CK techniques that adversaries use to breach their environments, according to a new report.

Produced by CardinalOps, the study analyzes real-world data from production SIEMs -- including Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic -- covering more than 4,000 detection rules, nearly one million log sources, and hundreds of unique log source types.

Continue reading

Threat landscape is getting worse say CISOs

stressed worker

A new study of over 200 CISOs and senior security leaders at organizations with over 5,000 employees shows that 93 percent have suffered at least one cyberattack in the last year and all of them think the security landscape is worsening.

The research from Censys also shows that 53 percent identify the need to secure their organization's entire attack surface as their top priority.

Continue reading

End of life data risks sustainability targets

Sustainable Concept - Sustainability Business

Environmental sustainability has a high to moderate influence on their approach to processing end of life (EOL) data for 88 percent of respondents according to a new survey.

But more than a third (39 percent) of enterprises are yet to implement a plan to reduce their data footprint, leaving them at risk of compliance failures in light of upcoming sustainability regulations.

Continue reading

Three-quarters of consumers are ready to ditch a company after a ransomware attack

Displeased suspicious young woman

A new study shows that 75 percent of consumers would switch their business to another company following a ransomware attack.

The survey, from backup appliance company Object First, also reveals that consumers are requesting increased protection from vendors that hold their data, with 55 percent favoring companies with comprehensive data protection measures such as reliable backup and recovery, password protection, and identity and access management strategies.

Continue reading

Stolen identities remain top cybersecurity threat

identity theft hacker

Stolen identities continue to cause massive breaches, exposing 1.5 billion user records and costing businesses an average of $9.4 million per breach in 2022, according to a new report.

The ForgeRock 2023 Identity Breach Report shows that attackers continue to target credentials and use them as a stepping stone to infiltrate an organization across industries and geographies. What’s more and AI is making it more difficult for the average human to identify threats.

Continue reading

Physical meets digital -- the changing world of augmented reality [Q&A]

Augmented Reality Glasses

The physical and digital worlds continue to intertwine in new and exciting ways, and more precise mapping of the real world opens up unique opportunities for brands to drive more traffic and engagement to physical locations.

We spoke to Rypplzz CEO Josh Pendrick about why he believes augmented reality is a sector that's ripe for disruption.

Continue reading

New index allows companies to measure their cybersecurity capabilities

Software testing

Cyberattacks are increasingly a feature of everyday life, yet many companies remain unaware of their teams' true readiness to defend against them.

Cyber defense specialist RangeForce is launching a new Defense Readiness Index (DRI), a pioneering scoring system which gauges an organization's readiness to effectively respond to the cyberattacks it is likely to face.

Continue reading

When is an IT risk a cyber risk? And why the difference matters [Q&A]

risk jigsaw piece

There tends to be some confusion about where cyber risk ends and where IT risk starts and the terms are often used interchangeably.

We spoke to Gary Lynam, head of ERM advisory at risk management specialist Protecht, to find out more about understanding and managing the different types of risk that enterprises face.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.