New gangs and new tactics mean more victims of ransomware

ransomware key

Ransomware actors have been forming affiliate gangs and using new tactics in order to lure additional victims, according to a new report.

The latest 2022 Bi-Annual Cyber Threat Report from Deep Instinct reveals changes in the world of ransomware gangs, including LockBit, Hive, BlackCat, and Conti.

Continue reading

Why data science is failing marketers

frustrated

Companies can now gather more information about their customers than ever before. But according to a new study data science is not benefiting marketers, with 84 percent of marketing executives saying their ability to predict customer behavior is guesswork.

The report from predictive analytics company Pecan AI, based on surveys carried out by Wakefield Research, finds four out of five marketing execs report difficulty in making data-driven decisions despite all of the consumer data at their disposal.

Continue reading

Defending against critical infrastructure attacks [Q&A]

industrial skyline

Critical infrastructure is a prime target for cybercriminals and nation state actors. It often operates on legacy operational technologies (OT) which have vulnerabilities that can't be fixed easily or directly. 

We spoke to John Moran, technical director, business development at Tufin, to discuss how organizations can protect themselves. John is a former incident response consultant and is a cybercrime forensics expert.

Continue reading

Phishing volumes increase over 30 percent with well-known brands as favorite targets

Phishing

The latest report from email security and threat detection company Vade shows the volume of phishing emails up 31 percent in the last quarter compared to Q2.

Volumes peaked in July (79.2 million), dipping in August (57.5 million), and rebounding in September (67.2 million). If this pace continues through Q4, phishing volumes in the second half of 2022 are set to exceed those reached in the first half (315 million).

Continue reading

How far will you go to protect your personal data?

worried laptop privacy

No longer shop with a brand? Pay more for goods and services from a company with a better privacy record? Stop using an app?

All of these and more are actions people are prepared to take if they find out organizations aren't keeping their data safe, according to a new report from DataGrail.

Continue reading

Popular vulnerability scanners are only 73 percent accurate

software scanning

New research from Rezilion finds that there's a high level of inaccuracies and noise created by the market's most popular commercial and open-source scanning technologies.

Researchers examined 20 popular containers on DockerHub, ran them locally, and scanned them using six different, popular vulnerability scanners in the commercial and open-source market. Taking false negatives into account the scanners returned only 73 percent of relevant results out of all vulnerabilities that should have been identified, including those the scanners failed to detect.

Continue reading

Phishing attacks increase 61 percent over last year

phishing keyboard hook

A new report analyzing billions of link-based URLs, attachments and natural language messages in email, mobile and browser channels over six months in 2022, finds more than 255 million phishing attacks -- a 61 percent increase compared to 2021.

The study from messaging security company SlashNext shows earlier security strategies, including secure email gateways, firewalls, and proxy servers are no longer stopping threats, as bad actors increasingly launch these attacks from trusted services and business and personal messaging apps.

Continue reading

Application security best practices and trends [Q&A]

Padlock

Businesses today face a wider and more dangerous array of cybersecurity threats than ever before. In the UK alone there were more than 400,000 reports of fraud and cybercrime in 2021. Those crimes come with significant costs too. In addition to the reputational damage that comes with cybersecurity incidents, data breaches cost UK companies an average of US$4.35 million.

That makes it critical that organizations have the best possible cyber defences in place, not just for the threats they face today but also for those of tomorrow. This is especially true for business-critical applications like ERP systems that need to be run continuously in order for the organization to keep operating smoothly and servicing its customers.

Continue reading

Economic uncertainty leads digital marketers to focus on customer experience

digital marketing

The pandemic led to a boom in online commerce, but as it fades away enterprises are keen to find new ways to understand and reach their customers, at the same time as addressing increasing privacy concerns.

Customer experience company Acquia commissioned Vanson Bourne to seek the views of 2,000 consumers and 200 marketers in the UK and the US on the digital marketing landscape.

Continue reading

Visibility into communications remains a worry for compliance and security chiefs

can string businessman phone listen

Two-thirds (66 percent) of security and compliance leaders are worried that their employees are using unmonitored communications channels, according to a new report.

The study from Theta Lake finds 67 percent of respondents expect the usage of collaboration tools and popular platforms like Microsoft Teams, Zoom, Webex, Slack and RingCentral to increase.

Continue reading

Free solution helps admins manage remote workforces

home working security

Hybrid work took off during then pandemic, but there's no doubt that it's now here to stay and remote support is a critical tool for IT teams as they troubleshoot end users' technical issues and support onboarding and offboarding.

Today sees identity and device management specialist JumpCloud launching a new, free cloud-based solution that allows IT admins and MSPs to support global workers by quickly accessing remote end-user devices at the click of a button.

Continue reading

IBM aims to breakdown barriers to AI adoption

Artificial intelligence

IBM is unveiling a set of new AI capabilities that aim to reduce some of the top barriers to AI adoption and drive down the cost and time investment it currently takes to build and implement AI applications.

The expansion to its embeddable AI software portfolio sees the release of three new libraries designed to help IBM Ecosystem partners, clients and developers more easily, quickly and cost-effectively build their own AI-powered solutions and bring them to market.

Continue reading

67 percent of UK IT decision makers are concerned about supply chain issues

break_chain

A new survey of UK IT decision makers from cybersecurity company WithSecure looks at global supply chain issues, with 67 percent of respondents believing that these issues will either remain the same (28 percent) or get worse (39 percent) within the next year.

As issues around inflation and supply shortages remain high in the news agenda, 43 percent believe they are very knowledgeable in their understanding of supply chain issues. However, few are confident of quick fixes to these global issues, and 60 percent of respondents believe that they will last for two years or more.

Continue reading

How facial recognition can help improve remote productivity

Facial recognition mesh

Remote working has become the norm for many following the COVID pandemic. But while it offers many benefits for both employers and workers, it can also lead to problems with productivity and stress.

A new infographic from work time management firm TrackTime24 looks at some of the issues faced by remote workers and at how improved time tracking technology using facial recognition can help.

Continue reading

Why SBOMs are key to securing the software supply chain [Q&A]

supply chain

Attacks on the software supply chain have become more common in recent years. Part of the key to tackling them lies in understanding what components are in your software and where they originate.

This is why the software bill of materials (SBOM) has become a vital tool for organizations seeking to secure their software. We spoke to Alex Rybak, senior director, product management at Revenera to learn more about SBOMs and what advantages they offer.

Continue reading

Load More Articles