Ian Barker

Unprecedented DDoS surge sees ‘tsunami’ of attacks

DDOS attack, cyber protection. virus detect. Internet and technology concept.

A new report from digital trust provider DigiCert highlights an unprecedented surge in distributed denial-of-service (DDoS) attacks that reached ‘internet tsunami’ scale, with two events peaking at 2.4 Tbps (terabits per second) and 3.7 Tbps respectively.

Attack traffic increasingly originates from regions where digital infrastructure is outpacing regulation, with Vietnam, Russia, Colombia, and China ranking among the top five sources.

Continue reading

Delay responding to email breaches likely to lead to ransomware attacks

Alerts email security

A new report shows that organizations taking longer than nine hours to address an email security breach have a 79 percent chance of also being a victim of ransomware.

The study from Barracuda, based on a survey of 2,000 IT decision makers carried out by Vanson Bourne, also finds that most of the organizations surveyed (78 percent) experienced an email breach in the previous 12 months, with the average cost to recover reaching $217,068.

Continue reading

70 percent of major breaches caused by overlapping risks

Businesswoman in risk metering and management concept

New research from business risk specialist Panaseer shows that major breaches are being caused by toxic combinations -- overlapping risks that compound and amplify each other, until they form a critical vulnerability.

The company analyzed 20 major breaches that have occurred over the past five years. In 14 of the 20 cases, it found clear evidence of compounding risks forming toxic combinations that magnified the overall impact.

Continue reading

Job automation -- could AI replace your CEO? [Q&A]

AI robot CEO

Many people worry that AI and automation will lead to people losing their jobs and that this could be true even at senior levels.

We spoke to Alex Walsh, CEO and co-founder of agentic AI platform Oraion, who believes that, instead of destroying jobs, AI can actually enhance them.

Continue reading

Confidence in ransomware recovery is high but actual success rates remain low

Recovery Backup Restoration Data Storage Security Concept

A new study from OpenText of nearly 1,800 global IT and security leaders shows a false sense of confidence in ransomware readiness.

The report shows that 95 percent of respondents say they’re confident in their ransomware recovery -- yet only 15 percent of those attacked have fully recovered their data.

Continue reading

Generalist teams vs specialist tools -- the enterprise IT paradox [Q&A]

Enterprise technology

With hyperscalers better able to attract the best talent and headcount tight across the board, most enterprises are leaning heavily on generalist IT teams to manage their environments.

But in many cases the tools they’re expected to use were designed for specialists. Legacy tools like ConnectWise, Device42, or ServiceNow often require deep expertise, complex integrations, or expensive customization making them unsuitable for generalist teams.

Continue reading

How did it do that? Over half of IT leaders not confident explaining AI model decisions

meeting shrug puzzled

A new report from Anaconda shows 51.4 percent of IT leaders say they’re not very confident in explaining AI model decisions to regulators, executives, or customers.

As a result they’re over-promising and under-delivering, and this trouble communicating creates unrealistic expectations for customers and stakeholders. 26 percent of respondents identify difficulty demonstrating ROI as a top concern. What’s more just 22 percent say they would describe their organization’s AI deployment as ‘strategic’.

Continue reading

Cyber incidents cost organizations millions

Cybersecurity investment money

Security leaders estimate that, on average, cyber incidents cost their organization $3.7 million, with 46 percent suffering from an outage or disruption to their services as a consequence of attacks.

A new survey from Red Canary of 550 security leaders, from the US, UK, New Zealand, Australia, and the Nordic countries, finds that SOC teams continue to struggle with the challenges of securing cloud environments, identities, and AI technologies amid evolving threats.

Continue reading

Are we human or are we security risk?

Human error head hands

Not quite how The Killers put it, but a new report shows Human workers remain the most consistent point of attack for cybercriminals, with shadow IT and AI-driven social engineering providing attackers with both new tools and new targets.

The 2025 Global Threat Intelligence Report from Mimecast reveals key trends, including the rise of smarter, AI-powered phishing and social engineering cyberattacks, and threat groups increasingly using trusted services to evade detection and reach targets. Mimecast’s analysis finds that phishing accounts for 77 percent of all attacks up from 60 percent in 2024 with attackers likely leveraging more AI tools.

Continue reading

How infostealers have changed the cybersecurity landscape

infostealer

Many of the recent wave of high-profile cyberattacks can be traced back to the theft of a single set of credentials which have allowed the attacker to access and move within a corporate network.

A new report from Flashpoint looks at the rise of large-scale information-stealing malware campaigns and how ‘infostealer’ malware has been a key enabler, responsible for the theft of over 1.8 billion corporate and personal email accounts, passwords, cookies, and other sensitive data.

Continue reading

Access to public web data is essential for the AI market

Internet web data

New poll data reveals that 89 percent of respondents say access to public web data is critical for ensuring a fair and competitive AI market.

The survey carried out at this year’s OxyCon web intelligence event shows organizations are getting worried they are losing access to precious web data, robbing them of the ability to make the AI of the future as democratic as possible. 64 percent of respondents say their organisations has been blocked from more websites than a year ago.

Continue reading

How enterprise developers are moving from fragmented tools to unified platforms [Q&A]

Software architecture development

Across large organizations, developers and DevOps teams rely on an ever-growing collection of specialized tools. But while these offer valuable flexibility, they can also create significant pain points.

We spoke to Chintana Wilamuna, VP of solutions architecture at WSO2, about how the landscape is changing from fragmented, purpose-built development tools toward comprehensive, unified platforms.

Continue reading

Cybercriminals turn to stealth to bypass malware detection

Hacker malware stealth

A new report reveals a 40 percent (quarter-over-quarter) increase in evasive, advanced malware. The data highlights encrypted channels as adversaries' favored attack vector using Transport Layer Security (TLS), the encryption protocol behind most secure web traffic.

The study from WatchGuard Technologies, which provides cybersecurity for MSPs, shows 70 percent of all malware is now delivered via encrypted connections, the findings highlight attackers’ increasing reliance on obfuscation and stealth, and the need for organizations to improve visibility into encrypted traffic and adopt flexible protection strategies.

Continue reading

Ransomware payments hit record highs as threats get harder to detect

Ransomware key cash

The frequency of ransomware attacks has dropped from eight incidents per organization to five or six incidents in the last year, but at the same time the average ransomware payment has surged by more than a million dollars, from $2.5M to $3.6M.

A new Global Threat Landscape report from ExtraHop, based on research by Censuswide, finds threat actors are shifting away from broad, indiscriminate attacks to a more targeted approach that yields better results.

Continue reading

Observability data drives key decisions on customer experience and more

Observability magnifier code

The latest Splunk State of Observability report for 2025, released today by Cisco, shows that observability insights are guiding key business decisions in customer experience, product roadmap forecasting, and brand perception.

The study based on a survey of 1,855 ITOps and engineering professionals worldwide, and underscores how observability has evolved beyond an IT function to a boardroom priority. It finds 74 percent believe observability is important for monitoring critical business processes and 66 percent say it is key to understanding user journeys.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.