Ian Barker

Credential theft escalates as threat actors use stealthier tactics

Cybercriminals are pivoting to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises have declined.

These are among the findings of a new report from IBM X-Force which also observes an 84 percent increase in emails delivering infostealers in 2024 compared to the previous year, a method threat actors rely heavily on to scale identity attacks.

Continue reading

New watchdog platform designed to protect enterprise AI deployments

As enterprises turn to increasingly sophisticated AI applications and agentic AI workflows, the large cloud footprint required to support such complex systems has become critically difficult to secure.

To address this issue Operant AI is launching AI Gatekeeper, a runtime defense platform designed to block rogue AI agents, LLM poisoning, and data leakage wherever AI apps are deployed, securing live AI applications end-to-end beyond Kubernetes and the edge.

Continue reading

Flawed phone apps could risk enterprise data

Analysis of over 17,000 enterprise-used mobile apps by Zimperium zLabs finds that 92 percent of all apps and 56 percent of the top 100 apps use flawed cryptographic methods that could be putting organizations at risk.

Even more concerning, five percent of top 100 apps were found to have high-severity cryptography flaws including hardcoded keys and outdated algorithms.

Continue reading

Could this be the end of CVE? And what does it mean for cybersecurity?

The CVE (Common Vulnerabilities and Exposures) database is widely used across many cybersecurity tools, allowing the tracking of vulnerabilities.

The CVE program has been in existence for 25 years but today MITRE -- the non-profit organization which looks after the database -- has announced that its contract with the US Department of Homeland Security to operate the CVE Program hasn't been renewed.

Continue reading

How agentic AI takes GenAI to the next level [Q&A]

Agentic AI

Agentic AI has been in the news quite a bit of late, but how should enterprises expect it to impact their organizations?

We spoke to Mike Finley, CTO of AnswerRocket, to discuss Agentic AI's benefits, use cases and more.

Continue reading

Microsoft vulnerabilities hit a record high in 2024

The latest annual Microsoft Vulnerabilities Report from BeyondTrust, reveals a record-breaking number of reported vulnerabilities last year.

Total vulnerabilities reached an all-time high of 1,360 in 2024, an 11 percent increase from the previous record of 1,292 in 2022. Elevation of Privilege (EoP) vulnerabilities comprised 40 percent of all those reported.

Continue reading

Browser extensions leave enterprises open to attack

Despite being present on virtually every employee's browser, extensions and plug-ins are rarely monitored by security teams or controlled by IT and a new report shows that could be leaving enterprises at risk.

The study from LayerX Security combines statistics from real-life usage data from enterprise users, with data available from public extension stores to reveal how organizations and employees interact with extensions, the associated risks and security blind spots.

Continue reading

Less than a third of companies consistently meet compliance standards

New research shows that only 29 percent of all organizations say their compliance programs consistently meet internal and external standards.

The report from Swimlane reveals that fragmented workflows, manual evidence gathering and poor collaboration between security and governance, risk and compliance (GRC) teams are leaving organizations vulnerable to audit failures, regulatory penalties and security gaps.

Continue reading

AI makes bots easier to deploy and harder to detect

Automated bot traffic surpassed human-generated traffic for the first time in a decade last year, making up 51 percent of all web traffic. This shift is largely attributed to the rise of AI and Large Language Models (LLMs), which have simplified the creation and scaling of bots for malicious purposes.

The latest Imperva Bad Bot Report from Thales shows cybercriminals are increasingly leveraging these technologies to create and deploy malicious bots which now account for 37 percent of all internet traffic -- a significant increase from 32 percent in 2023.

Continue reading

Illumio uses security graphs to identify threats

The idea of security graphs was floated last year by Microsoft to make it easier to identify risks across networks.

Today Illumio is one of the first to make commercial use of this idea with the launch of Illumio Insights, the industry's first cloud detection and response (CDR) solution powered entirely by an AI security graph.

Continue reading

Organizations fix under half of exploitable vulnerabilities

The latest State of Pentesting report from Cobalt reveals that organizations are fixing less than half of all exploitable vulnerabilities, with just 21 percent of GenAI app flaws being resolved.

It also highlights a degree of over-confidence with 81 percent of security leaders saying they are 'confident' in their firm's security posture, despite 31 percent of the serious findings discovered having not been resolved.

Continue reading

Quantum solution aims to secure communication using satellites

Today is World Quantum Day -- which probably means that it simultaneously both is and isn't. Seriously though, we're used to hearing dire warnings about how quantum computing threatens encryption and private communication, but of course it can also be part of the solution.

A new alliance between Partisia, a leader in multiparty computation (MPC), Squareroot8, a provider of quantum-safe communication solutions and NuSpace, a company specializing in IoT connectivity services and Satellite-As-A-Service wants to place a Quantum Random Number Generator (QRNG) on a satellite in space.

Continue reading

How software engineering can tackle performance challenges [Q&A]

Software engineering organizations often grapple with challenges that hinder their output -- including productivity blind spots, duplicate work, deadlines that don't stand a chance, burnout, and other hidden costs that eat up time and energy.

And while metrics can signal a problem, they don't always uncover the root cause or -- more importantly -- how to fix it. To explore this, we spoke to Joe Levy, CEO of Uplevel, an engineering optimization system helping developers independently measure the ROI of AI adoption.

Continue reading

Initial access brokers target mid-sized businesses for ransomware

Initial access brokers (IABs) are the invisible engine of modern cybercrime. They don't execute ransomware attacks, but they do enable them.

Research from Check Point External Risk Management (formerly Cyberint) shows that IABs are increasingly targeting smaller businesses, with 60.5 percent of listings targeting SMBs (companies with $5M - $50M revenue), representing a new 'sweet spot' for attackers.

Continue reading

Gcore launches DDoS protection for enterprise infrastructure

Organizations are increasingly faced with complex DDoS attacks that disrupt operations, increase latency, and compromise network security.

Security solutions company Gcore is launching 'Super Transit', which is not a big van but a cutting-edge DDoS protection and acceleration feature, designed to safeguard enterprise infrastructure while delivering lightning-fast connectivity.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.