New tool aims to stop 'Solver Service' bots

robot solving puzzle

Researchers at anti-bot specialist Kasada have recently uncovered the use of 'Solver Service' bots -- an API-as-a-service tool created to bypass the majority of bot management systems.

By 'solving' a bot detection system's defense, these allow enterprising cybercriminals to now commercialize the Solver Service they deciphered and sell it for a profit. This means buyers can successfully conduct automated bot attacks without any technical skills -- and without having to worry about what bot defenses a site may have in place.

Continue reading

OpenSSF looks to further strengthen supply chain security

supply chain

As we reported a few weeks ago, OpenSSF in conjunction with the White House and others has launched a 10-point plan and funding with the aim of improving the security of the software supply chain.

OpenSSF has also announced a number of new members including premier members, Atlassian and Sonatype, who will join the OpenSSF governing board.

Continue reading

Automating networks for whatever comes next [Q&A]

remote working

Digital transformation and modernization of IT is sweeping across many organizations at the moment. But one aspect that's sometimes neglected is their impact on networks.

How can enterprises scale their networks to cope with change and what part can automation play in the mix? We spoke to Ernest Lefner, chief product officer at Gluware, and co-founder and former co-chairman of ONUG (Open Network User Group), to find out.

Continue reading

Data-driven tools prove key to business growth

Analyzing data on computer

Data and analytics are instrumental to helping organizations successfully solve problems and 84 percent of organizations have either already deployed or have data-driven projects on their roadmaps.

A new study from Foundry shows data-driven projects continue to accelerate as 34 percent of organizations state that they have already deployed or implemented them compared to 28 percent of organizations saying the same in 2021.

Continue reading

Enterprises overspend by millions on cloud services

cloud money dollars

New research reveals enterprises are over-spending on cloud services by up to $8.5 million, as IT leaders grow frustrated with poor management tools, vendor-lock in and issues with accessing data.

A study from Couchbase of IT decision makers at enterprises with more than 1,000 staff finds a typical annual spend on cloud services to now stand at $33 million. However, functions that are not currently meeting businesses expectations account for over 35 percent of the total cost.

Continue reading

Poor alerts hamper effective automation of threat detection

Threat concept

According to a new report 85 percent of IT security professionals have experienced preventable business impacts resulting from insufficient response procedures, while 97 percent say that more accurate alerting would increase their confidence in automating threat response actions.

The State of the Modern SOC report from Deepwatch is based on a survey by Dimensional Research of over 300 security professionals, working at US organizations with 1,000 or more employees.

Continue reading

APIs and cloud apps are greatest threats to enterprise security readiness

Intelligent APIs

A survey of over 400 CISOs finds they are are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs).

The study from CISOs Connect, an invitation-only community of cyber experts and part of Security Current, finds the IT components rated as most needing improvement are: APIs (42 percent), cloud applications (SaaS) (41 percent), and cloud infrastructure (IaaS) (38 percent).

Continue reading

Almost half of IT security leaders believe they won't be breached

Relaxed businessman working with a laptop

A new study shows 47 percent of security leaders do not believe they will be breached despite the increasing sophistication and frequency of attacks.

The survey of 1,000 IT and security professionals across eight countries, conducted by The Enterprise Strategy Group for Illumio finds in the past two years alone 76 percent have been attacked by ransomware and 66 percent have experienced at least one software supply chain attack.

Continue reading

How artificial intelligence and machine learning are changing the development landscape [Q&A]

Artificial intelligence

It's an increasingly rare application these days that doesn’t claim to incorporate some form of artificial intelligence or machine learning capability.

But while this may be great from a marketing standpoint it does pose a challenge for developers. We spoke to Luis Ceze, CEO and co-founder of OctoML, to find out more.

Continue reading

82 percent of CIOs believe their software supply chains are vulnerable

supply chain

A new global study of 1,000 CIOs finds that 82 percent say their organizations are vulnerable to cyberattacks targeting software supply chains.

The research from machine identity specialist Venafi suggests the shift to cloud native development, along with the increased speed brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex.

Continue reading

New study reveals serious disconnect in executive planning for cyberattacks

Executive meeting

A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.

The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.

Continue reading

The role of encrypted traffic analysis for threat detection [Q&A]

data_encryption_tablet

Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.

But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.

Continue reading

What is needed to make digital transformation work? [Q&A]

Digital transformation

Digital transformation is a topic that's been in the air for more than just a few years now, but the impact of the pandemic and the need for businesses to adapt has rapidly brought it back to the forefront.

It's also no longer just about IT. Digital transformation is an enterprise-wide endeavor, connecting and affecting all business units and requires a shift in mindset to take full advantage of the opportunities it offers.

Continue reading

Researchers uncover cybercriminal stronghold targeting Facebook users

Facebook icon on mobile screen

The Facebook Messenger 'Is That You?' video phishing scam has been around since 2017, but a recent investigation into it by researchers at Cybernews has led to the discovery of what they're calling a 'cybercriminal stronghold'.

Threat actors are using this to infect the social network with thousands of malicious links each day. The research has also identified at least five suspects, thought to be residing in the Dominican Republic.

Continue reading

Americans have their sensitive bits exposed over 700 times a day

Disgusted PC

Americans have sensitive data relating to their online activity and location exposed 747 times daily, almost twice as much as Europeans who have their data exposed 376 times a day on average.

A new report from Atlas VPN looks at real-time bidding (RTB), which runs in the background on websites and apps and tracks what you look at, no matter how private or sensitive it is.

Continue reading

Load More Articles