The top enterprise cloud threats of 2024

A new report from IBM X-Force looks at the biggest risks enterprises are facing and highlights how attackers know that credentials are the keys to cloud environments, making them highly sought-after on dark web marketplaces.

Attackers are using phishing, keylogging, watering hole and brute force attacks to harvest credentials. Also dark web research highlights the popularity of infostealers, used to steal cloud platform and service-specific credentials.

Continue reading

Sonos promises to fix its poorly designed new app

Sonos is admitting that its May app release was a disaster, but the company says it is committed to fixing the situation. In response to heavy criticism, Sonos has announced several new commitments aimed at addressing the issues with its app and restoring customer trust.

Sonos CEO Patrick Spence acknowledged the missteps, stating, “Our priority since its release has been -- and continues to be -- fixing the app.” The company has unveiled seven key commitments, which include improving pre-launch testing, extending warranties for existing products, and updating its app regularly every 2-4 weeks.

Continue reading

Free calendar app offers quantum-safe encryption

Quantum computing presents a substantial problem for securing systems because of its potential to crack existing encryption protocols.

However, the industry is beginning to gear up to face the threat. Tuta, the email provider with the world's first quantum-safe encryption for email, is now launching its new stand-alone encrypted calendar app.

Continue reading

Windows 11 users hit with yet another update so problematic that Microsoft has been forced to withdraw it

Windows 11 on convertible laptop

Updates for Windows, at least the ones that are released on a monthly basis, are not as eagerly anticipated by users as they used to be. This could be because they are rarely packed with new and exciting features, but a more likely reason for the decreased interest is the astonishing number of problematic updates Microsoft has released.

The KB5043145 update for Windows 11 released this week is a case in point. Reports of blue screens, green screens, reboot loops and more has forced Microsoft to withdraw the update while it works out what is going wrong.

Continue reading

World of Warcraft’s Warchief Thrall now available as a voice guide on Waze

World of Warcraft enthusiasts can now add a touch of their favorite game to their daily commutes, thanks to a new collaboration between Waze and the popular gaming franchise. Warchief Thrall, one of the most recognizable characters from the Warcraft universe, is now available as a voice guide within the Waze navigation app.

Thrall offers practical guidance during your drive, providing directions with phrases inspired by his character. For instance, when you encounter heavy traffic, Thrall suggests, "breathe -- this is not the end of the world." Even a simple U-turn becomes more immersive with his Warcraft-flavored directions: "a clever strategy to fool any pursuers on our tail."

Continue reading

ZipRecruiter launches new resume database as Kamala Harris and Donald Trump prepare for 2024 election

ZipRecruiter has introduced the next generation of its Resume Database, designed to help employers streamline hiring with enhanced search features, real-time resume alerts, and instant access to candidate contact information. As the 2024 presidential election between Kamala Harris and Donald Trump approaches, businesses may face job market uncertainties, making efficient hiring tools more critical.

The updated Resume Database offers employers greater control in finding qualified candidates quickly. With over 350,000 resumes added to the platform monthly, businesses can access new resumes from active job seekers.

Continue reading

Non-human identities present a major security risk

Compromised non-human identities have led to successful cyberattacks at that 66 percent of enterprises.

A new report from AppViewX, based on a survey of almost 370 IT, cybersecurity, and DevOps professionals by Enterprise Strategy Group (ESG), also shows 57 percent of the episodes where organizations suffered a successful attack tied to NHI compromises got the board of directors attention.

Continue reading

49 percent of global businesses targeted by deepfakes

A new report from Regula reveals that 49 percent of businesses globally have experienced deepfake scams involving either audio or video -- almost doubling the number of incidents since 2022.

The survey, of 575 business decision makers, shows a significant rise in the prevalence of video deepfakes, with a 20 percent increase in companies reporting incidents compared to 2022.

Continue reading

NIS2 could prevent cybersecurity incidents but many businesses aren't ready

The EU's latest Network and Information Security Directive (NIS2) comes into effect on October 18, but new research finds that although nearly 80 percent of businesses are confident in their ability to eventually comply with NIS2 guidelines, up to two-thirds say they will miss this imminent deadline.

The survey from Veeam Software, of over 500 IT decision-makers from Belgium, France, Germany, the Netherlands and the UK, shows 90 percent of respondents reporting at least one security incident that the NIS2 directive could have prevented in the past 12 months.

Continue reading

Why finance teams need 'ambient intelligence' [Q&A]

The world is changing faster than ever, putting pressure on CFOs to create more value and be more strategic and collaborative.

Finance leaders are not only expected to understand the entire business, but they are also bogged down by the administrative work of backward-looking reporting and controls.

Continue reading

qBittorrent 5.0.0 now available

BitTorrent

The latest version of qBittorrent, version 5.0.0, has been released, featuring new capabilities and improvements. A full list of changes can be found here.

This release introduces the ability to create .torrent files with larger piece sizes and has upgraded the handling of tracker entries. Users also gain the option to segregate unwanted files into a separate folder, which helps in managing downloads more efficiently.

Continue reading

Sony and Raspberry Pi launch powerful new AI camera for developers

Sony Semiconductor Solutions (SSS) and Raspberry Pi Ltd have teamed up to introduce a new product for AI enthusiasts. The Raspberry Pi AI Camera, compatible with all Raspberry Pi single-board computers, is designed to streamline the development of AI solutions by processing visual data directly at the edge. The AI Camera is available today for $70.

This collaboration is a result of SSS’s minority investment in Raspberry Pi Ltd back in April 2023. Since then, the companies have worked together to create an edge AI platform tailored to Raspberry Pi’s developer community. The key feature of the AI Camera is its use of SSS’s IMX500 intelligent vision sensor. This innovative sensor allows AI processing to happen directly on the chip, eliminating the need for additional hardware like GPUs or accelerators, which are traditionally required for handling large-scale visual data.

Continue reading

A technical overview of Cisco IoT part 5: Exploring Cisco's competition in the expanding IoT landscape

The fifth and final article in the Cisco IoT series explores how Cisco’s competitors are navigating the rapidly expanding Internet of Things (IoT) landscape. Building on the previous installment, which covered Cisco Meraki, training resources, and certification pathways, this article shifts focus to examine how other key players in the networking industry are positioning themselves to capitalize on the IoT revolution.

IoT is transforming industries, with use cases expanding across healthcare, retail, manufacturing and beyond. It’s reshaping how organizations operate, offering enhanced security, cost savings and new capabilities through advanced sensor technologies. As this sector evolves, Cisco and its competitors are racing to offer innovative solutions. But how do Cisco’s competitors stack up when it comes to IoT? This article takes a closer look at Juniper, Aruba, Arista and other vendors to assess differing IoT strategies and where each stands in comparison.

Continue reading

KT and Microsoft announce five-year AI partnership aimed at transforming Korean industries

KT Corporation and Microsoft have entered into a five-year partnership focusing on artificial intelligence (AI), cloud technologies, and IT business development. The collaboration includes both a financial investment from KT and resource support from Microsoft, with the aim of advancing AI services and innovation in South Korea.

As part of the partnership, the two companies will focus on five key areas, including the development of customized AI solutions for Korea. This effort will involve creating tailored versions of Microsoft’s GPT-4 and small language models using KT’s data. These AI models will be used in a variety of applications, including customer service chatbots and industry-specific solutions for businesses.

Continue reading

SIEM is the shortcut for implementing threat detection best practices

The recent release of “Best Practices for Event Logging and Threat Detection” by CISA and its international partners is a testament to the growing importance of effective event logging in today’s cybersecurity landscape. With the increasing sophistication and proliferation of cyber attacks, organizations must constantly adapt their security strategies to address these advanced threats. CISA’s best practices underscore how a modern SIEM (Security Information and Event Management) solution, especially one equipped with UEBA (User and Entity Behavior Analytics) capabilities, is critical for organizations trying to adopt the best practices in this domain.

A modern SIEM with UEBA can help organizations streamline their event logging policies. It automates the collection and standardization of logs across diverse environments, from cloud to on-premise systems, ensuring that relevant events are captured consistently. This aligns with CISA’s recommendation for a consistent, enterprise-wide logging policy, which enhances visibility and early detection of threats. We've seen a rise in detection and response technologies, from Cloud Detection and Response (CDR) to Extended Detection and Response (XDR) being positioned as alternatives to SIEM. However, when it comes to consistently capturing and utilizing events across diverse environments, SIEM remains the preferred solution for large organizations facing these complex challenges.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.