Brits warned of scams ahead of emergency alert test


This Sunday, September 7th, the UK will test its emergency alert system, sending a message that will cause 4G and 5G mobile phones and tablets to emit a loud siren sound and vibrate for about 10 seconds.
But Marc Porcar, CEO of QR Code Generator, is warning that fraudsters are likely to exploit the upcoming government test, particularly targeting elderly and vulnerable people who may be confused by the alerts.
Rethinking AppSec for the AI era [Q&A]


The application security landscape has always been a complex one and can lead to teams spending too much time hunting down vulnerabilities. With AI becoming more popular there are even greater risks to consider.
We spoke to Yossi Pik, co-founder and CTO at Backslash Security, to discuss how AppSec needs to adapt to the greater use of AI.
New enterprise browser aimed at securing BYOD and third-party devices


Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.
The new feature, available to Check Point Harmony SASE customers from today, delivers full visibility, granular policy enforcement, and compliance-ready data protection without persistent agents or endpoint ownership.
Insider breaches hit 61 percent of enterprises


A new study sponsored by OPSWAT, a specialist in critical infrastructure protection, reveals that organizations face escalating risks from insider activity, legacy tools, and the growing complexity of artificial intelligence (AI).
Based on research carried out by the Ponemon Institute, the report finds that in the past two years, 61 percent of organizations have suffered file-related breaches caused by negligent or malicious insiders, at an average cost of $2.7 million per incident.
How AI agents are reshaping the threat landscape


The agentic AI ecosystem, powered by large language models (LLMs), is creating a new class of cybersecurity risks according to a new report.
The study from Radware finds AI agents can act autonomously, access tools and private resources, and interoperate between one another. As enterprises turn to AI agents, there is a need to govern and secure this new emerging layer of digital infrastructure.
Proactive agents bring AI to data analysis teams


Data insights platform WisdomAI is launching a new Proactive Agents feature that aims to supplement data analysis teams with the ability to proactively learn, monitor metrics, detect anomalies, prepare analysis, and execute decisions, allowing humans to focus on strategy and judgment.
“Data analysts have long been the gatekeepers to insights -- but they’re hard to scale, and no company can hire unlimited analysts,” says Soham Mazumdar, CEO and co-founder of WisdomAI. “Proactive Agents change that. They act as AI teammates that scale your data team’s capacity, increase productivity across the organization, and democratize access to analyst-grade work. Every employee can now benefit from the kind of monitoring and analysis that used to require dedicated headcount.”
Enterprises left dangerously exposed by identity protection ‘maturity myth’


New research from Osterman and Silverfort reveals that although nearly 70 percent of organizations believe their identity defenses are ‘mature’ there is a worrying gap between perception and reality.
This comes against a rising tide of identity threats, 72.1 percent of identity leaders report that the threat level of identity-related attacks has increased or remained unchanged in the past year. The most significant jumps include AI-powered attacks, ransomware-based attacks, and social engineering of desk staff to reset credentials or MFA factors (up 14.3 percent).
Windows 10 support costs could top $7 billion


With support for Windows 10 due to end on October 14th, it’s estimated that there will still be over 120 million PCs running the OS still in use by the deadline.
New analysis from Nexthink warns that with the first year of extended support costing $61 per device, organizations could collectively be facing a multi-billion dollar bill.
Tycoon phishing kit uses sneaky new techniques to hide malicious links


Phishing emails often feature malicious links (URLs) that lead victims to fake websites
where they are infected with harmful software or tricked into giving away personal
information.
There’s a constant battle between security tools getting better at identifying bad links and attackers trying to hide them more effectively. Barracuda has uncovered some of the latest approaches its researchers are seeing in attacks involving the advanced phishing-as-a-service (PhaaS) kit, Tycoon.
Securing Kubernetes in the enterprise [Q&A]


As more organizations scale up containerized workloads they’re also facing increasing security and compliance challenges.
Kim McMahon part of the leadership team at Sidero Labs to discuss the vulnerabilities enterprises are encountering when scaling up Kubernetes on traditional operating systems and what they can do to counter them.
Over half of UK SMEs set to adopt AI in the next year


A new report shows that 52 percent of UK SMEs are already using or plan to adopt AI tools within the next 12 months.
The study, from fintech company SumUp, is based on a survey of 750 business owners and decision makers within small UK businesses and finds that 27 percent see AI mostly as an opportunity, highlighting its potential to drive growth or increase efficiency.
New fully open and transparent large language model launches -- it’s Swiss, of course


The Swiss have something of a reputation for being methodical -- particularly when it comes to things like banking -- so it’s no surprise that they take a similar approach to creating a large language model.
EPFL, ETH Zurich and the Swiss National Supercomputing Centre (CSCS) have today released Apertus, a large-scale, open, multilingual LLM. Apertus -- Latin for ‘open’ -- the name highlights its distinctive feature, that the entire development process, including its architecture, model weights, and training data and recipes, is openly accessible and fully documented.
Do Americans dream of AI?


Artificial intelligence is making its way into more and more areas of our lives and it seems that includes our dreams.
New research from Amerisleep.com, shows that one in five Americans have dreamed about AI and 16 percent are doing so several times a month. While these dreams may reflect curiosity, some reveal anxieties about the role of technology.
Why one-time security assessments are no longer sufficient [Q&A]


With cyber threats becoming more numerous and ever more sophisticated, it’s becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.
One-time security assessments are looking increasingly inadequate. We spoke to CyberProof CEO Tony Velleca to discuss how organizations can effectively implement a Continuous Threat Exposure Management (CTEM) strategy to improve their protection.
How much is your privacy at risk from wearable devices?


Wearable devices have brought us numerous benefits in recent years, allowing us to understand our health and fitness level better and encouraging a more active lifestyle. But are they also putting our privacy at risk?
A new report from vpnMentor takes a look into what information wearable devices are collecting. It also investigates how that data is being used, shared and, in some cases, monetized.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.