Newly launched APIs found by attackers in under 30 seconds
Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and less secure. New research from Wallarm shows the average time for a new API to be found by attackers is just 29 seconds.
The research used a honeypot to look at API activity and in its first 20 days in November the lngest time taken for a new API to be discovered was 34 seconds.
Experts call for proactivity to combat state-sponsored cyber threats in 2025
In 2024, opposing nation-states have utilized cyberattacks to project power and disruption from within their own borders. This shift has been epitomized by the rise of the “Axis of Upheaval,” dominated by the CRINKs nations -- China, Russia, Iran, North Korea -- who share a common reliance on using cyberattacks to wreak havoc in an affordable manner.
Whether it’s North Korea using ransomware to generate revenue for its isolated regime, or Russia focusing on disrupting and eroding public trust in democratic institutions, each state is finding its niche to cause harm. Despite these varied goals and techniques, it’s the same sectors again and again in the crosshairs. Whether it’s CNI, healthcare, or finance, these organizations now must protect against a wide range of attack styles and techniques.
Elon Musk seems to confirm some details of his Gmail rival X Mail
There have been rumors circulating for some time that creating an email service to compete against Gmail was on Elon Musk’s to-do list. While concrete details about what it might look like and when it might appear have been elusive, Musk has started to give something of an idea of his vision.
The billionaire has said on multiple occasions, including in the last few days, that X Mail is on the cards, but now he has given a clearer indication of what it might involve. The question is -- are people ready for it?
Netflix expands Moments feature from iOS to Android, so you can share your favorite clips from shows
There are so many classic scenes from shows and movies and, just like music fans like to share amazing drum solos, guitar riffs and lyrics with friends, there is something joyous about connecting over a shared video clip.
YouTube has long made it possible to share snippets of a videos, and earlier this year, Netflix introduced a feature called Moments to iOS. This provides a way to share a meaningful, impactful, funny or beautiful scene from a Netflix show or movie, and now the same feature is available globally on Android.
Google launches Whisk for creative AI image remixing
Google has introduced Whisk, a new generative AI tool designed to make image creation more interactive and creative. Unlike traditional AI tools that rely heavily on lengthy text prompts, Whisk allows users to start with images. Simply drag and drop images into the interface, and Whisk lets you generate unique creations by combining these visuals in novel ways.
Whisk enables users to input up to three images: one for the subject, one for the scene, and another for the style. This approach gives users the flexibility to create anything from digital plushies to enamel pins or stickers. Some early examples from Whisk include a fantastical fish, a whimsical walrus, and even a glazed doughnut reimagined as an enamel pin.
The dark side of AI: How automation is fueling identity theft
Automations empowered by artificial intelligence are reshaping the business landscape. They give companies the capability to connect with, guide, and care for customers in more efficient ways, resulting in streamlined processes that are less costly to support.
However, AI-powered automations also have a dark side. The same capabilities they provide for improving legitimate operations can also be used by criminals intent on identity theft. The rise of low-cost AI and its use in automations has empowered scammers to widen their nets and increase their effectiveness, leading to a drastic increase in identity theft scenarios.
2025 cybersecurity forecast: Preparing for the next generation of threats
As we navigate an increasingly digital landscape, the threats posed by cybercriminals are evolving at an alarming pace. The latest predictions highlight a future where AI-driven technologies, particularly deep fakes, will become more sophisticated, making it challenging for individuals and organizations to distinguish between genuine and malicious entities.
This article explores three critical predictions regarding the future of cyber threats: the rise of hyper-realistic deep fakes, the escalation of browser-based ransomware attacks targeting essential infrastructure, and the growing risk of insider threats in remote work environments. Understanding these trends is crucial for developing effective strategies to safeguard against the next wave of cybercrime.
Sophisticated AI-Driven Deepfakes Will Bypass Traditional Security Measures
Why PorteuX Linux 1.8 is a faster and lighter alternative to Microsoft’s bloated Windows 11
The lightweight Linux distribution PorteuX has launched version 1.8, delivering huge updates across multiple desktop environments and a modern alternative to Windows 11. The release introduces the newly released Xfce 4.20, a sleek and efficient desktop environment, alongside updates to Cinnamon 6.4.2, GNOME 47.2, KDE 6.2.4, and LXQt 2.1.0, offering users a customizable and resource-friendly experience without the performance trade-offs often associated with Windows 11.
PorteuX 1.8 upgrades its kernel to version 6.12.5, ensuring better hardware compatibility and security. For AMD users who encounter upstream performance regressions, the kernel from version 1.7 remains available. Unlike Windows 11, which can struggle with older hardware and system requirements, PorteuX maintains its lightweight design, running smoothly even on less powerful machines.
Easier payments, robot assistants and improved accessibility -- fintech predictions for 2025
Are UFOs, drones, and glowing orbs just Elon Musk's Starlink satellites launching for T-Mobile beta?
Could the strange lights, glowing orbs, and supposed UFO sightings in the night sky actually have a simple explanation? With the launch of the T-Mobile Starlink beta program, it’s possible that what people think are mysterious flying objects are, possibly, Starlink satellites being deployed to make mobile dead zones a thing of the past.
Elon Musk’s Starlink, operated by SpaceX, has been rapidly expanding its satellite constellation as part of its partnership with T-Mobile to bring direct-to-cell satellite coverage across the United States. These satellites, designed to function like cell towers in space, are now at the center of a beta program that promises to connect customers in areas where traditional infrastructure can’t reach.
Access tokens and service accounts next target for cyberattacks
New research shows 88 percent of security leaders believe machine identities, specifically access tokens and their connected service accounts, are the next big target for attackers.
The survey from Venafi of 800 security and IT decision-makers from large organizations across the US, UK, France and Germany, finds 56 percent have experienced a security incident related to machine identities using service accounts in the last year.
Social media deepfake scams push fraudulent investment schemes
Social media has seen a 335 percent boom in new scams using deepfake videos and company-branded posts to lure victims into fraudulent investment schemes.
The latest threat report from ESET tracks these as HTML/Nomani, the countries with the most detections being Japan, Slovakia, Canada, Spain, and Czechia.
Yes, there is a way to get a vertical taskbar in Windows 11
One of the changes in Windows 11 that continues to generate lots of complaining is the removal of a vertical taskbar option. Microsoft decided that it wanted everyone to have their taskbar anchored to the bottom of the screen, and that was the end of that.
But not anymore. Now there is a way to vertically align your taskbar in Windows 11, giving you the chance to make better use of a widescreen/ultra-widescreen monitor’s available space. It doesn’t matter whether your preference is for the left or the right -- both are possible.
Building trust in telemetry data [Q&A]
With the increasing importance of observability in digital operations, businesses need to ensure the reliability and relevance of their telemetry data in order to maintain system and application performance, debug, troubleshoot, respond to incidents and keep their systems secure.
We spoke to Tucker Callaway, CEO of Mezmo, to discuss the strategic considerations and concerns enterprises face in managing and optimizing their telemetry data.
Xfce 4.20 Linux desktop environment gets lit with experimental Wayland support and new features
The Xfce team has officially dropped version 4.20 after nearly two years of development, bringing a host of updates and experimental Wayland support to the popular lightweight desktop environment. It’s clear a lot of work went into this release, but the version number might also make you wonder -- did the developers celebrate a little too hard when naming it?
One of the headline features is experimental support for Wayland. Thanks to the new “libxfce4windowing” library, many Xfce components can now run natively on Wayland without relying on XWayland. However, this feature is far from perfect. Critical elements like workspace support and components such as Xfwm4 and Xfce4-screensaver still lack full Wayland functionality. If you’re feeling adventurous -- or maybe a bit “chill” -- you can give Wayland a try, but the team advises caution. Bugs and missing features are part of the deal for now.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.