Cybercriminals use AI to make malware less detectable


Cybercriminals are using AI-created malware that is adept at avoiding detection by traditional antivirus models, according to the latest report from Acronis.
The report also finds email attacks and ransomware cases have exploded relative to last year. Acronis-monitored endpoints are picking up valuable data about how cybercriminals operate and how some attacks have become more intelligent, sophisticated, and difficult to detect.
Dropbox introduces new AI-powered productivity features


Cloud storage provider Dropbox is launching two new AI-powered productivity tools -- though they're not available to everyone just yet.
Dropbox Dash is a universal search that connects all of your tools, content, and apps in a single search bar to help you easily find what you need. There's also Dropbox AI, a new feature that lets customers quickly summarize and get information from their Dropbox files.
Attackers exploit the growing use of mobile devices


The growth in mobile device and app usage has created a growing attack surface, with 60 percent of global web traffic now coming from mobile devices. So it's not surprising that increasing numbers of cybercriminals and nation state actors want to exploit these areas of vulnerability.
The latest Global Mobile Threat Report from Zimperium finds that 80 percent of phishing sites now either specifically target mobile devices or are built to function on both mobile devices and desktops.
Proton Pass free password manager emerges from beta


Although alternative technologies continue to make inroads, most of us are still heavily reliant on passwords to secure our digital identities.
Proton, the company behind Proton Mail, Proton VPN and other products, launched a new, free password manager called -- you'll have guessed already -- Proton Pass in beta a couple of months ago.
Why CSOs are prioritizing PKI infrastructure as they adapt to post-quantum cryptography [Q&A]


A growing number of machine identities leaves organizations with the task of managing increasingly complex PKI infrastructure.
We spoke to Chris Hickman, CSO of Keyfactor, about how organizations can go about reducing PKI complexity as well as other trends to keep in mind as they adapt to an era of post-quantum cryptography.
Majority are worried about the safety and accuracy of ChatGPT


As generative AI tools continue to make the news there are growing concerns over safety and security as well as the accuracy of information produced.
Most people don't trust ChatGPT and have worries about its security and safety according to a new survey from Malwarebytes. The research shows that 81 percent are concerned about security and safety risks.
DDoS attacks more than doubled in 2022


New research from Nexusguard shows that last year DDoS attacks worldwide increased by 115.1 percent over the 2021 level.
Attackers have also continued to alter their threat vectors by targeting the application platforms, online databases, and cloud-based storage systems within Internet Service Providers (ISPs). This has resulted in a significantly greater impact globally as organizations continue to move more of their workloads to the cloud.
Enterprise SIEMs miss 76 percent of attack techniques


Security information and event management systems (SIEMs) are missing detections for 76 percent of MITRE ATT&CK techniques that adversaries use to breach their environments, according to a new report.
Produced by CardinalOps, the study analyzes real-world data from production SIEMs -- including Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic -- covering more than 4,000 detection rules, nearly one million log sources, and hundreds of unique log source types.
Threat landscape is getting worse say CISOs


A new study of over 200 CISOs and senior security leaders at organizations with over 5,000 employees shows that 93 percent have suffered at least one cyberattack in the last year and all of them think the security landscape is worsening.
The research from Censys also shows that 53 percent identify the need to secure their organization's entire attack surface as their top priority.
End of life data risks sustainability targets


Environmental sustainability has a high to moderate influence on their approach to processing end of life (EOL) data for 88 percent of respondents according to a new survey.
But more than a third (39 percent) of enterprises are yet to implement a plan to reduce their data footprint, leaving them at risk of compliance failures in light of upcoming sustainability regulations.
Three-quarters of consumers are ready to ditch a company after a ransomware attack


A new study shows that 75 percent of consumers would switch their business to another company following a ransomware attack.
The survey, from backup appliance company Object First, also reveals that consumers are requesting increased protection from vendors that hold their data, with 55 percent favoring companies with comprehensive data protection measures such as reliable backup and recovery, password protection, and identity and access management strategies.
Stolen identities remain top cybersecurity threat


Stolen identities continue to cause massive breaches, exposing 1.5 billion user records and costing businesses an average of $9.4 million per breach in 2022, according to a new report.
The ForgeRock 2023 Identity Breach Report shows that attackers continue to target credentials and use them as a stepping stone to infiltrate an organization across industries and geographies. What’s more and AI is making it more difficult for the average human to identify threats.
Physical meets digital -- the changing world of augmented reality [Q&A]


The physical and digital worlds continue to intertwine in new and exciting ways, and more precise mapping of the real world opens up unique opportunities for brands to drive more traffic and engagement to physical locations.
We spoke to Rypplzz CEO Josh Pendrick about why he believes augmented reality is a sector that's ripe for disruption.
New index allows companies to measure their cybersecurity capabilities


Cyberattacks are increasingly a feature of everyday life, yet many companies remain unaware of their teams' true readiness to defend against them.
Cyber defense specialist RangeForce is launching a new Defense Readiness Index (DRI), a pioneering scoring system which gauges an organization's readiness to effectively respond to the cyberattacks it is likely to face.
When is an IT risk a cyber risk? And why the difference matters [Q&A]


There tends to be some confusion about where cyber risk ends and where IT risk starts and the terms are often used interchangeably.
We spoke to Gary Lynam, head of ERM advisory at risk management specialist Protecht, to find out more about understanding and managing the different types of risk that enterprises face.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.