Ian Barker

13 percent of Q1 phishing attacks related to COVID-19

Coronavirus

In the first quarter of 2020 phishing attacks increased by 22.5 percent compared to the end of 2019, and 13 percent of all phishing was related to COVID-19.

A new report from Positive Technologies also shows that in Q1 there were 23 very active APT groups whose attacks targeted mostly government agencies, industrial, finance, and medical institutions.

Continue reading

F-Secure uncovers counterfeit Cisco network devices

Network switch

Finnish cybersecurity company F-Secure has published a report detailing its investigation into a pair of counterfeit Cisco network switches.

The investigation concludes that the counterfeits had been designed to bypass processes that authenticate system components. Two different counterfeit versions of Cisco Catalyst 2960-X series switches were discovered by an IT company after a software update stopped them from working.

Continue reading

How digital transformation is changing the oil and gas industry [Q&A]

refinery industry

Businesses across all sectors are looking to review their processes and launch digital transformation projects. But long-established industries like oil and gas, while innovative in some areas often lag behind with their back office systems.

We spoke to Leon Busch, COO of specialist in this sector WolfePak Software to find out how companies in this field are using transformation and what it's doing for their businesses.

Continue reading

New security platform traces end-to-end cloud app activity

Cloud visibilty

Using complex cloud applications built with microservices and APIs can often expose business logic that threat actors use to infiltrate applications and private data.

A new application security company Traceable is launching today with a platform that traces end-to-end application activity from the user and session all the way through the application code. Traceable's TraceAI machine learning and distributed tracing technology analyzes data to learn normal application behavior and detect any activity that deviates from the norm.

Continue reading

Productivity is key to profits but most companies can't measure it

time and money

AI-powered productivity company enaible has released a new survey looking at executive viewpoints on workforce productivity in light of the economic and remote working impact of COVID-19.

It finds that 83 percent of respondents are relying on productivity to improve both margins and profitability, and 83 percent believe that worker productivity will be critical in their companies' ability to recover from the economic impact of the coronavirus pandemic.

Continue reading

Email impersonation attacks target dispersed workforces

fake identities

With increased numbers of people working remotely, a new report reveals that cybercriminals are using email impersonation to prey on the sense of urgency of an increasingly distracted and dispersed workforce.

Email security company GreatHorn has collected data from over 640 security, IT and C-suite professionals to gain a better understanding of new threat vectors and attack strategies. It found almost half of respondents (48.7 percent) report seeing impersonations of people such as colleagues, customers or vendors.

Continue reading

More than half of cybersecurity professionals suffer overwork or burnout

workplace stress

New research from the UK's Chartered Institute of Information Security (CIISec) shows that overwork and burnout remain major problems for the IT security sector.

The study of almost 450 cybersecurity professionals shows that 54 percent of respondents have either left a job due to overwork or burnout, or have worked with someone who has.

Continue reading

New platform combines application and infrastructure risk management

Risk dial

Vulnerability management specialist RiskSense is launching a new version of its platform that harmonizes threat analysis, prioritization and risk scoring across both network-based assets and applications.

RiskSense aggregates and normalizes outputs from multiple data sources including SAST, DAST, open source software, containers, pen testing and bug bounty programs. This approach enables organizations to easily pinpoint and fix vulnerabilities in their attack surface regardless of where they arise.

Continue reading

Meeting the challenges of digital transformation [Q&A]

digital transformation

More and more enterprises are looking to implement digital transformation projects. But often they underestimate the complexity of the task and the degree of change that it requires across the organization.

So what are the major challenges that these projects face and what can businesses do to overcome them? We spoke to Andreas Prins, VP of platform strategy at digital transformation platform Digital.ai to find out.

Continue reading

Klipsch launches smaller, better fitting wireless earphones with an F1 collaboration

Klipsch T5 II McLaren

The trouble with in-ear-style wireless earphones is they can be bulky and hard to keep in place or -- we're looking at you Apple -- have those little antennas that make you look like you've stuck cigarette ends in your ears.

Klipsch is changing all that with its new T5 II range. They are around 25 percent smaller than the earlier T5s and more closely mimic the shape of the ear for maximum comfort. They also come with six sets of ear tips to ensure more people can get a good fit.

Continue reading

Imperva launches new cloud data security solution to help digital transformation

cloud lock

As companies accelerate their digital transformation programs, many move data into the cloud without all the security controls necessary to protect both their organization and customers’ data. This leaves them vulnerable to cyberattacks and without evidence of compliance with data protection regulations

Cybersecurity specialist Imperva is launching a new SaaS Cloud Data Security product that gives businesses visibility and compliance oversight for data hosted in a database-as-a-service (DbaaS).

Continue reading

Security staff suffering alert fatigue as report volumes increase

security alert

According to a new study, 70 percent of security teams have seen more than double the volume of security alerts in the past five years. These high volumes of reports cause problems for IT security teams with 83 percent saying their security staff experience 'alert fatigue'.

The survey conducted by Dimensional Research on behalf of continuous intelligence specialist Sumo Logic also shows that while automation is helpful it isn't a complete solution.

Continue reading

Remote working exposes organizations to more security risks

home working

A new survey released today by security software firm NetMotion reveals that 47 percent of organizations believe remote work has exposed their organization to high or extreme security risk.

Of these 62 percent are most concerned that workers will visit malicious URLs that could compromise networks and devices, while 45 percent are worried about workers accessing inappropriate content.

Continue reading

New solution helps enterprises understand application relationships and risk

Networked computers

Modern businesses rely on a variety of applications, but failing to understand the relationships between them can lead to increased risks.

To address this vArmour is launching a new version of its Application Controller solution, enabling enterprises to take control of operational risk by discovering and understanding application relationships across their IT environment and help maximize the value of their existing investments.

Continue reading

Fake content drives online fraud

Fake/genuine

Based on a study of 34,000 sites and apps, as well as a survey of over 1,000 consumers conducted in June 2020, new research details how content abuse is a critical part of the fraud supply chain, the interconnected ecosystem of fraud.

The research, carried out by digital trust and safety firm Sift, also uncovered a fraud ring based in Russia where fraudsters executed a card-testing scheme through fake listings on an e-commerce marketplace.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.