Ian Barker

Low code

AI won't replace low-code/no-code tools

According to a new study, 76 percent of tech leaders say that AI will make their existing low-code/no-code tools more efficient instead of replacing them altogether.

The survey from App Builder, with third-party research firm Dynata, finds use of low-code and no-code tools have steadily increased over the past decade and become an integral piece of how 95 percent of teams now build scalable applications.

By Ian Barker -
Pylons energy infrastructure

Cyberattacks on utilities pose risk to public safety

A new survey of 350 UK and US utility operators reveals that 62 percent of water, water treatment and electricity companies have been affected by cyberattacks in the last 12 months.

The study from Semperis finds that nearly 60 percent of attacks were carried out by nation-state groups

By Ian Barker -
Web bot internet scraping

The rise of the 'gray bots' targeting websites for data

We all know about good bots like search engine crawler bots, SEO bots, and customer service bots. And we know about bad bots, designed for malicious or harmful online activities like breaching accounts to steal personal data or commit fraud.

New research from Barracuda identifies an additional breed of 'gray bots', and these include GenAI scraper bots, designed to extract or scrape large volumes of data from websites, often to train generative AI models. Other examples of gray bots are web scrapers and automated content aggregators that collect web content such as news, reviews, travel offers and more.

By Ian Barker -
Privacy text on keyboard button. Internet privacy concept.

AI contributes to a more complex privacy landscape

Despite many organizations reporting significant business gains from using GenAI, data privacy is still a major risk. Notably, 64 percent of respondents to a new survey worry about inadvertently sharing sensitive information publicly or with competitors, yet nearly half admit to inputting personal employee or non-public data into GenAI tools.

The latest Data Privacy Benchmark Study from Cisco, with input from from 2,600 privacy and security professionals across 12 countries, shows an increased focus on investing in AI governance processes, an overwhelming 99 percent of respondents anticipate reallocating resources from privacy budgets to AI initiatives in the future.

By Ian Barker -
DDOS attack, cyber protection. virus detect. Internet and technology concept.

Politically motivated DDoS attacks target critical infrastructure

Distributed Denial of Service (DDoS) attacks have become a dominant means of waging cyberwarfare linked to socio-political events such as elections, civil protests and policy disputes, according to the latest DDoS Threat Intelligence Report from NetScout.

Throughout the year, DDoS attacks have been intricately tied to social and political events, including Israel experiencing a 2,844 percent surge linked to hostage rescues and political conflicts, Georgia enduring a 1,489 percent increase during the lead-up to the passage of the 'Russia Bill', and Mexico having a 218 percent increase during national elections.

By Ian Barker -
EU security NIS2

What NIS2 implementation means for enterprises [Q&A]

As cyberattacks across sectors continue to rise, businesses face pressure to enhance their security postures amid budget restraints and operational challenges.

In the EU, the new Network and Information Security Directive (NIS2) is making it mandatory for companies in Europe -- and those doing business with Europe -- to not only invest in cybersecurity, but to prioritize it regardless of budgets and team structures.

By Ian Barker -
Domain name fake

Lookalike domains used to boost effectiveness of email scams

Lookalike domains, crafted to closely resemble authentic domains, enable a wide range of deceptive activities. By sending emails that appear to originate from trusted sources, attackers can effectively conduct a variety of scams from phishing and social engineering attacks to invoice fraud.

A new report from BlueVoyant looks at how cybercriminals encourage their victims to click on lookalike domains, whilst highlighting the critical need for vigilance and proactive measures to counteract these threats.

By Ian Barker -
Software supply chain development

Software supply chain threats increase in the AI era

Managing and securing the software supply chain end-to-end is vital for delivering trusted software releases.

But a new report from JFrog finds emerging software security threats, evolving DevOps risks and best practices, and potentially explosive security concerns in the AI era.

By Ian Barker -
World-Backup-Day

World Backup Day -- your annual reminder that you need to look after your data

Today -- which of course you knew already -- is World Backup Day, an idea that began in 2011 as a reminder from a group of Reddit users who had seen too many people lose their important files. They deliberately picked the day before April Fool's to get across that you’d be a fool not to backup your data.

Although it started a bit of a joke it's become a useful reminder that backups are important and figures in the industry now see it as good for raising awareness. Here’s what some of them think.

By Ian Barker -
Cloud security lock

What businesses miss when protecting their data [Q&A]

No business is immune from the threat of cyberattack, but when it comes to protecting their most critical and sensitive data many feel they are inadvertently helping attackers through the leaking information.

We spoke to Paul Laudanski, director of security research at Onapsis, to learn about the most common errors and how to guard against them,

By Ian Barker -
digital marketing

Over 60 percent of malicious traffic targets retailers ahead of PCI DSS 4.0 deadline

As we approach the 31st March deadline for compliance with the new PCI DSS 4.0 payment security standard, new data from Cequence Security shows automated fraud is increasing with retailers facing 66.5 percent of all malicious traffic.

Using data from real transactions and attack data from Cequence's Unified API Protection (UAP) platform, the report highlights the growing attack surface cybercriminals exploit in payment infrastructure, loyalty programs, and product pricing systems.

By Ian Barker -
Linux penguin security

Navigating Linux security and management in a multi-OS landscape [Q&A]

While Windows remains the most targeted operating system, Linux, once regarded as 'secure by default', has now emerged as the second-most infected OS, according to the 2024 Elastic Global Threat Report.

Linux's expanding use beyond servers has broadened its attack surface. Plus, its open-source nature, while great for developers, can also lead to mistakes and security holes. We spoke to Apu Pavithran, founder and CEO of Hexnode, to find out more about why Linux is being targeted and how it can be defended.

By Ian Barker -
Temptation fraud bribe

Psst, wanna be a fraudster? Ordinary consumers are being lured into cybercrime

A new report from Sift reveals an alarming democratization of cybercrime, with 34 percent of consumers seeing offers to participate in payment fraud online, an 89 percent increase over 2024.

The report details how fraudsters openly advertise and sell stolen payment information and fraud services on social media platforms and deep web forums like Telegram, significantly lowering the barrier to entry for anyone to participate in fraudulent activities.

By Ian Barker -
Futuristic robot artificial intelligence huminoid AI programming coding

70 percent of organizations are developing AI apps

Over 70 percent of developers and quality assurance professionals responding to a new survey say their organization is currently developing AI applications and features, with 55 percent stating that chatbots and customer support tools are the main AI-powered solutions being built.

The research from Applause surveyed over 4,400 independent software developers, QA professionals and consumers explored common AI use cases, tools and challenges, as well as user experiences and preferences.

By Ian Barker -
Solar panels on roof

Here comes the sun -- along with the solar power vulnerabilities

We're always being encouraged to be greener in our energy usage these days and many people have turned to solar power as a means of doing their bit and reducing their bills.

But the inverter used to convert energy from solar panels to usable household electricity is usually an IoT device and could therefore be vulnerable. New research from Forescout analyzed equipment from six of the top 10 vendors of solar power systems worldwide: Huawei, Sungrow, Ginlong Solis, Growatt, GoodWe, and SMA. It has uncovered 46 new vulnerabilities across three of these inverter vendors, Sungrow, Growatt, and SMA.

By Ian Barker -

© 1998-2025 BetaNews, Inc. All Rights Reserved.