Santa Claus may be coming to town but bots are getting all the best Christmas presents
New research from Imperva shows that 71 percent of UK consumers believe bad bots are ruining Christmas by snapping up all the most wanted presents.
It finds that 40 percent of consumers surveyed say they have been thwarted when trying to buy a gift in the past, only to find that it was completely sold out.
97 percent of banks hit by third-party data breaches
New analysis released by SecurityScorecard reveals that 97 percent of the top 100 US banks have experienced a third-party data breach in the past year.
As banks increasingly rely on third-party vendors for core functions, their exposure to supply chain vulnerabilities increases. Using the largest proprietary risk and threat intelligence dataset, SecurityScorecard's experts analyzed how third-party breaches impact the banking sector.
'Circuit compression' technology brings commercial quantum a step closer
Quantum computing is something that we've been covering for a while but commercial implementations always seem to be tantalizingly out of reach.
It could be getting nearer though thanks to work by Classiq Technologies, with Deloitte Tohmatsu Group, and Mitsubishi Chemical Corporation to demonstrate improved circuit compression.
The five email attacks to watch for in 2025
Despite the rise of other means of communication email remains the most commonly used. This makes it attractive to cybercriminals as it offers an entry point to businesses and the gateway that employees rely on to do their jobs.
A new report from Abnormal Security highlights the attacks that we’re likely to see in the next year and shows the need for improved defenses, including the use of AI.
How business function mapping can help align IT and cybersecurity with business priorities [Q&A]
In the modern business world, organizations face the ongoing challenge of aligning their IT and cybersecurity efforts with their business priorities.
The difficulty lies in understanding how your infrastructure supports your business's core functions. Without this understanding, prioritizing cybersecurity initiatives, managing vulnerabilities, and ensuring business continuity remains an uphill battle.
A quarter of organizations suffer AI-enhanced attacks against APIs or LLMs
A new study finds 25 percent of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75 percent of respondents expressing serious concern about AI-enhanced attacks in the future.
The research from API specialist Kong shows that although 85 percent say they're confident in their organization's security capabilities, 55 percent of respondents have experienced an API security incident in the past year, highlighting a notable disconnect.
AI impacts on data storage infrastructure
As we've already seen today organizations are struggling with the increasing demands of data infrastructure. Another new report from MinIO highlights how organizations are leveraging object storage for AI, machine learning (ML), and data-intensive workloads.
The survey of over 650 IT leaders 70 percent of enterprise data is in object storage today and this is expected to grow to 75 percent over the next two years.
Enterprises struggle to meet data infrastructure demands
Internal IT teams are being pushed to the brink, balancing the demands of modern data management with limited resources according to a new report.
The study from DataStrike gathered insights from nearly 200 IT leaders and decision-makers, it finds that 55 percent of organizations rely solely on internal IT teams to manage their data infrastructure, with only a small fraction (19 percent) outsourcing these critical functions.
Containers are a weak link in supply chain security
The use of container images is growing fast thanks to their flexibility and convenience, but they can also represent a weak cybersecurity link in software supply chains.
A new report from NetRise looks at the scope and scale of the components and risks found across 70 of the most commonly downloaded Docker Hub container images.
IBM brings optics into the data center to save energy and boost speed
When we think of optical technology it tends to be in terms of transmitting data over long distances. Today IBM is unveiling a breakthrough in optics technology that for the first time puts the speed and power of fiber optics inside servers and onto circuit boards.
Using a new process that replaces electrical wires with optical waveguides,this effectively enables chip connectivity at the speed of light.
The race against AI web scrapers: effective strategies to protect your data [Q&A]
A surge in artificial intelligence (AI), generative AI (GenAI), and machine learning (ML) technologies is creating a massive online appetite for data. These tools are hungry for training data, this has boosted AI web scraping, which sits in a legal gray zone. Sometimes it's legal, sometimes it's not, but what's clear is that it's having ripple effects across online businesses.
We talked to Nick Rieniets, field CTO of Kasada, to learn more about the impact of web scraping and what companies can do to protect their content.
Pro-Russian hacktivists target Europe
A new report shows that 96 percent of attacks conducted by a leading pro-Russian hacktivist group targeted Europe this year, with attackers focusing on influencing public perception and trust over direct technical disruptions.
Based on research and data from more than 135,000 security events in 160 countries, the Security Navigator report from Orange Cyberdefense also reveals that hacktivists were responsible for 23 percent of cyberattacks that directly targeted OT and 46 percent of these attacks resulted in a 'manipulation of control.'
Why it's time for a reset of security metrics [Q&A]
Historically, security metrics have focused on measuring how many attacks are successful and how long it takes for a successful attack to be detected. This is perhaps unsurprising since the bulk of the industry has focused on building tools to detect adversaries.
We spoke to Nicko van Someren, chief technology officer at Absolute Security, to learn why companies focusing purely on defense can create more risk for their organizations, and why instead of focusing on 'time to detection,' it's time to reset security metrics to focus on 'time to recovery.'
The top five most-phished industries
New research reveals the top five industries most frequently targeted by specifically tailored phishing attacks using either the recipient's name, email address, phone number, or company name.
The study from Cofense using data drawn from the Cofense Intelligence product between Q3 2023 to Q3 2024 shows, unsurprisingly, that finance tops the list, accounting for 15.5 percent of all credential phishing emails where the product redacted information from the subject in order to safeguard the recipient.
Over 30 percent of organizations need daily specialist support on virtual desktop issues
A new survey of 1,000 front line IT workers from Nexthink finds that 31 percent of organizations have daily virtual desktop infrastructure (VDI) problems requiring specialist intervention.
A further 40 percent are having issues on a weekly basis, as level one and two support staff are often unable to manage the complexity of VDI.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.