Ian Barker

New solution automates fixing Linux vulnerabilities

More than ever enterprises are turning to Linux solutions. But while the open source OS has a good reputation for security that doesn't mean that it’s invulnerable and it's important to stay on top of updates and patching.

Seal Security is launching Seal OS, a holistic solution designed to automatically fix vulnerabilities in both Linux operating systems and application code.

Continue reading

Record-breaking number of vulnerabilities predicted for 2025

A new report predicts a record-breaking 41,000 to 50,000 new Common Vulnerabilities and Exposures (CVEs) this year, based on data from the National Vulnerability Database (NVD).

The forecast, from the Forum of Incident Response and Security Teams (FIRST), suggests an 11 percent increase compared to 2024, and a whopping 470 percent increase compared to 2023.

Continue reading

Deepfake fraud calls target consumer cash

AI-generated voice impersonation scams are an increasing threat, with 31 percent of US consumers, 27 percent of Canadians, and 26 percent of UK consumers reporting encounters with deepfake fraud calls.

A new report from Hiya, based on data from the company's Voice Intelligence Network and a January 2025 survey of 12,000 consumers across the US, Canada, the UK, Germany, France, and Spain, shows that more than 30 percent of those targeted fell victim, suffering significant financial losses. In the US, the average reported loss was $539, while UK victims faced the steepest losses at £1,479 ($1,867).

Continue reading

Attacks on manufacturing up but less than half businesses are prepared

A new study from Omdia finds that 80 percent of manufacturing firms experienced a significant increase in overall security incidents or breaches last year, but only 45 percent are adequately prepared in their cybersecurity.

The survey of over 500 technology executives worldwide shows a heightened risk of cyber attacks comes as manufacturers move to leverage IT such as cloud, AI, and Internet of Things (IoT) as part of their digital transformation -- a process defined as Industry 4.0.

Continue reading

Apple has removed its strongest data protection from UK users -- why and what does it mean?

Apple's Advanced Data protection allows the data that its users store in iCloud to be end-to-end encrypted. On Friday of last week the company announced that it would be removing this tool from users in the UK.

The move follows a demand from the UK government to allow 'backdoor' access into data in order to investigate crime. The problem is that even Apple can't access ADP protected data and the company argues that a backdoor would be exploited by attackers.

Continue reading

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they're evaluating their preparedness from a business, safety, skills, and product level. But there's another key factor at the backend that's being overlooked: the network.

Full GenAI adoption introduces significant new challenges and demands on the network, such as bandwidth strain and unique security vulnerabilities. If these demands aren't accommodated, organizations won't realize the benefits of GenAI.

Continue reading

Deepfake fraud attempts grow over 2,000 percent

Financial institutions are facing a significant increase in deepfake fraud attempts, which have grown by a staggering 2,137 percent in the last three years.

Data from Signicat based on responses from 1,200 people in the financial and payment sectors across seven European countries, including the UK, shows that account takeover is the leading type of fraud their customers are exposed to, followed by card payment fraud and phishing.

Continue reading

AI-powered solution detects insider threats

Insider security incidents remain a problem for business, yet many organizations struggle with limited budgets, minimal talent resources, and tools that fail to detect subtle insider threat patterns.

OpenText is launching a new Core Threat Detection and Response solution, an AI-powered product designed to address the growing challenge of insider threats and advanced attacks.

Continue reading

Why are virtual CISOs becoming so popular? Because organizations need them [Q&A]

It's becoming common in the cybersecurity industry to encounter two situations that are equally untenable.

On the one hand, the job of a typical chief information security officer (CISO) has become overburdened with the high stress of constantly evolving risks, talent shortages, budget constraints, board disconnects and more, leading to burnout. On the other, many organizations, particularly small to midmarket ones, don't have the resources to afford a full-time security executive, despite facing the same cybersecurity and compliance challenges as everyone else.

Continue reading

Mobile-first phishing attacks surge as specific capabilities are targeted

As organizations increasingly rely on mobile devices for business operations, including multi-factor authentication and mobile-first applications, mobile phishing poses a severe risk to enterprise security.

New research from Zimperium's zLabs shows a surge in mobile-focused attacks, dubbed 'mishing', activity peaking in August 2024 with over 1,000 daily attack records. These attacks are specifically designed to evade desktop security measures, executing only on mobile devices.

Continue reading

Cybersecurity professionals not happy in their jobs

Only a third of cybersecurity professionals would recommend their employer according to a new study carried out by IANS Research in collaboration with Artico Search.

It finds low satisfaction coincides with perceptions of limited career growth, with fewer than 40 percent of respondents satisfied with their advancement opportunities and more than 45 percent expressing frustration over slow progression. While compensation remains a factor, the ability to develop new skills and advance within an organization has a greater impact on retention.

Continue reading

Public sector professionals worried about the security risks of AI

AI adoption is gaining momentum in the public sector as elsewhere, with benefits like predictive analytics and issue detection, but concerns still linger.

Around four in 10 respondents to a new study by SolarWinds, focused on public sector staff, say they are extremely or very concerned about potential risks associated with adopting AI, such as data privacy and compliance, making full-scale implementation a cautious process.

Continue reading

New Connectivity Guru uses AI to streamline Wi-Fi troubleshooting

The average home now has multiple devices reliant on Wi-Fi connections and businesses have many times more. Users expect fast, consistent speeds, but troubleshooting problems can be complicated, leading to frustration, while service teams lack the visibility to diagnose issues beyond the router.

With the launch of its Connectivity Guru, TechSee is harnessing Agentic AI to transform the way Wi-Fi issues are diagnosed and resolved.

Continue reading

Malware-as-a-Service accounts for 57 percent of all threats

A new report from Darktrace reveals that Malware-as-a-Service (MaaS) is now responsible for 57 percent of all cyber threats to organizations, a 17 percent increase from the first half of 2024.

The use of remote access trojans (RATs) has also seen a significant increase in the latter half of last year, representing 46 percent of campaign activity identified, compared to only 12 percent in the first half.

Continue reading

Software supply chain attacks and how to deal with them [Q&A]

Increased use of open source and third-party code leaves organizations open to more attacks on the software supply chain.

Open source vulnerabilities have become a prime target for attackers and organizations need to strengthen their defenses. We spoke to Richard Clark, senior solutions architect at JFrog, to discuss the importance of proactive measures in protecting against these threats.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.