New access suite helps companies integrate their security


It's not uncommon for enterprises to use a number of different analytics and operations tools as part of their security posture.
Managing these different tools as part of an overall policy, though, can be difficult. Pulse Secure is launching a new suite of secure access solutions for hybrid IT that provides organizations with a simplified, modular and integrated approach to modernize their access productivity, management and control.
Zero trust adoption grows as businesses look for end-to-end security


The idea that organizations should have a trusted internal network and an untrusted external one is rapidly giving way to a posture of zero trust across the board.
A new survey of 500 IT security leaders by identity specialist Okta finds a massive 275 percent year-on-year growth in the number of North American organizations that have or plan to have a defined zero trust initiative on the books in the next 12-18 months.
COVID-19 scam sites pass quarter of a million


The first quarter of this year has seen a massive growth in phishing and counterfeit pages, with around a third of them related to COVID-19.
A new report from fraud prevention company Bolster shows that it detected 854,441 confirmed phishing and counterfeit pages and four million suspicious pages, with more than a quarter of a million devoted to COVID-19.
Home working leads to 42 percent increase in devices on corporate networks


New research released today from Sepio Systems, a rogue device mitigation firm, reveals a 42 percent jump in the number of devices connected to corporate networks, compared with the pre-COVID-19 period.
Not only has the number of connected devices increased, there are also almost three times the number of different device vendors. This means many unbranded or budget makes of equipment being used that are not commonly found in the enterprise environment.
AOMEI makes its cloud management tool free for three months


We've seen lots of companies making their products available free during the current crisis. AOMEI has already made its backup tool available free for a year.
It's now added to that by making the full version of its cloud management tool MultCloud available free for three months.
Hackers favor quieter methods to attack websites


While high profile attacks like phishing scams targeting stimulus payments make the headlines, a new report shows they are actually on the decline.
The annual security report from website security specialist SiteLock finds that quiet attack methods, like backdoor files, are more favored among hackers as they become increasingly sophisticated and turn to methods that can go undetected and deliver the biggest payout.
Make good use of your lockdown with free 'Learn From Home Day'


If you fancy using your increased time at home to learn some new skills but haven't got around to it yet, you are about to run out of excuses.
This Wednesday, May 13th, sees the launch of Codeacademy's Learn From Home Day a set of interactive classes on a range of different topics, organized in partnership with other enterprises. From 10:45 am to 5:45 pm ET there will be a choice of sessions covering subjects as diverse as coding, drawing, cooking, parenting and more.
Phishing attack evades Microsoft 365 security


Researchers at email protection company Armorblox have uncovered a targeted email phishing attack designed to get past Microsoft 365 security.
The attack is a variant of 'PerSwaysion', a recent spate of credential phishing attacks that utilize compromised accounts and leverage Microsoft file-sharing services to lull victims into a false sense of security.
Publicly disclosed breaches are down 58 percent


The total number of publicly reported breaches in Q1 2020 has decreased by 58 percent compared to the same period last year according to a new report from Risk Based Security.
Despite the number of breaches being down though, the number of records exposed for this quarter soared to 8.4 billion -- a 273 percent increase compared to Q1 2019, and a record for the same period since at least 2005, when detailed reporting began.
How to protect against the latest payload-less social engineering attacks [Q&A]


Social engineering is one of the most common approaches taken by cybercriminals in order to steal data or get users to install malware.
But a new generation of payload-less attacks is now starting to emerge. How can businesses protect themselves from these threats? We spoke to Evan Reiser, CEO and co-founder of email security specialist Abnormal Security to find out.
Europe's fifth largest bank leaks sensitive information online


Santander, the fifth largest bank in Europe and the 16th largest in the world, has been leaking sensitive company data due to a misconfiguration on one of its websites.
Security analysts at CyberNews discovered that Santander's Belgian branch, Santander Consumer Bank, had a misconfiguration in its blog domain that allowed for its files to be indexed.
Gaming helps people cope with lockdown -- but at a cost


A new survey, commissioned by cybersecurity company BullGuard, has revealed that gamers are taking advantage of the social isolation to up their playing time
By doing so, 49 percent say they are alleviating lockdown anxiety, 84 percent are understandably relieving their boredom, while 60 percent are battling it out online to help block out the current situation.
The average password is reused 2.7 times


Despite the fact that credential stuffing using stolen passwords is one of the most common ways of breaching systems, new research from Balbix for this year's World Password Day finds that over 99 percent of employees reuse passwords across work accounts, or between work and personal accounts.
In addition the average password is reused not just once, but 2.7 times, and the average user is sharing eight passwords between all their accounts with 7.5 passwords shared between work and personal accounts.
Hacker group has targeted Asia Pacific governments in five-year campaign


Researchers at Check Point have uncovered a China-based hacker group that has been targeting multiple national Governments in the APAC region over the past five years, to gather political intelligence and conduct espionage.
Targets include Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei. After infiltrating one government body, the hacker group uses that body’s contacts, documents and servers to launch targeted phishing attacks against new government targets.
Collaboration between teams helps boost security confidence


Organizations using software to help their IT and information security teams collaborate and align are three times more confident in the effectiveness of their information security efforts according to a new study.
The report from security automation specialist SaltStack shows that 54 percent of InfoSec leaders say they communicate effectively with IT professionals, but only 45 percent of IT professionals agree.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.