Regulation and its role in protecting critical infrastructure [Q&A]


Protecting critical national infrastructure (CNI) against attack is a huge undertaking for governments and for those organizations that deliver CNI services.
New regulation in Europe -- the NIS2 Directive -- includes an increased focus on resilience for CNI, covering traditional critical services like banking, utilities, transport and public safety as well as new provisions for digital service providers. In 2025, the Digital Operational Resilience Act (DORA) will enforce more stringent resilience and security requirements on the financial sector. And in the UK, the forthcoming Cyber Security and Resilience Bill will demand more investment in security too.
Fax in 2025: How cloudification is revolutionizing financial services


Digital transformation is causing the financial services industry major problems when it comes to how highly sensitive, time-critical information in transmitted. Adding to these challenges are the radical changes in customer expectations in recent years, as digital communications have taken hold in nearly every aspect of consumers’ lives.
To remain viable, outdated communication structures -- particularly those relying on servers and distributed systems -- need to be consolidated and standardized. Few industries are more prepared for this transformation than financial services, where significant investments are already being made to improve operational efficiencies and competitiveness. As some of the world’s largest financial institutions invest in modern technologies like cloud migration and AI, attention is turning to some of their oldest tools that are still in use. Fax is a prime example.
Microsoft is killing off the Remote Desktop app and replacing it with something with known limitations


Microsoft has announced that it is pulling the plug on the Remote Desktop app. In just 6 weeks, the app will not only no longer be supported, it will also not be available to download from the Microsoft Store.
But Microsoft is not completely abandoning people who need to be able to remotely access systems -- it is replacing the Remote Desktop app with the Windows App. While the company is quick to point out the extra things Windows App can do when compared to the Remote Desktop app, it concedes that it is not a replacement tool and there are limitations.
CrossOver 25 makes gaming on macOS and Linux even better -- could it help gamers ditch Windows 11?


CodeWeavers has just released CrossOver 25 for macOS and Linux, and it’s packed with some seriously awesome improvements. Thanks to Wine 10.0 bringing over 5,000 changes, this update should make running both Windows games and apps on non-Windows systems smoother than ever. Could this finally convince gamers to dump Microsoft's OS?
Let’s be honest, Windows 11 hasn’t exactly won over everyone. Between forced updates, hardware restrictions, and Microsoft’s annoying obsession with AI features (that most people don’t even want), it has left many gamers looking for alternatives. That’s where CrossOver 25 comes in.
Data integrity and complexity are seen as top challenge for DBAs


A new survey looking at the challenges faced by database administrators (DBAs) shows 35 percent of organizations cite data integration as a top challenge.
Additionally, the study from Quest Software shows 42 percent of organizations report that data migrations are a significant obstacle to overcome, with complications in ensuring database reliability and performance.
70 percent of leaked credentials remain active two years on


A new report shows 70 percent of secrets leaked in 2022 remain active today, creating an expanding attack surface that grows more dangerous with each passing day.
The study from GitGuardian also reveals a 25 percent increase in leaked secrets year-on-year, with 23.8 million new credentials detected on public GitHub in 2024 alone.
New cybersecurity product seeks to safeguard executives and their families


You might not often feel sorry for executives and entrepreneurs but research from Deloitte shows that their 'family offices' are prime targets for cybercriminals looking to exploit their personal networks, private data, and home devices which represent a weak security link.
This is why BlackCloak is launching Digital Executive Protection, an enhanced family office cybersecurity bundle designed to protect high-net-worth individuals, and corporate leaders.
Plugable launches USBC-E5000 5Gbps USB-C Ethernet adapter and TBT5-240W1M Thunderbolt 5 cable


Today, Plugable launches two new super-cool products that should be useful in a laptop bag or collection of tech-tools. There is the USBC-E5000 5Gbps USB-C Ethernet Adapter and the TBT5-240W1M Thunderbolt 5 Cable.
The USBC-E5000 is a USB-C dongle that offers speeds up to 5Gbps. Of course, you will be limited by the maximum speed of the network to which you connect. In other words, you won’t magically get 5Gbps when connecting to a gigabit network.
Most ransomware incidents start with compromised perimeter security


A new report from cyber insurance provider Coalition shows 58 percent of ransomware claims in 2024 started with threat actors compromising perimeter security appliances like virtual private networks (VPNs) or firewalls.
Remote desktop products are the second-most exploited for ransomware attacks at 18 percent. The most common initial access vectors (IAVs) being stolen credentials (47 percent) and software exploits (29 percent). Vendors including Fortinet, Cisco, SonicWall, Palo Alto Networks, and Microsoft build the most commonly compromised products.
False confidence leaves businesses at risk of phishing scams


While 86 percent of employees believe they can confidently identify phishing emails, nearly half have fallen for scams according to new research from security awareness training company KnowBe4.
The study, which surveyed professionals across the UK, USA, Germany, France, Netherlands, and South Africa, reveals a growing gap between confidence and competence in identifying cyber threats.
Microsoft recommends using Word as an alternative to Publisher despite admitting it’s not up to the task


In around a year and a half, the beloved DTP app Microsoft Publisher is reaching the end of its life. When October 1, 2026 rolls around, Microsoft will no offer the software or provide support for it. The company has some advice about what to do next.
If you were planning to just continue using it regardless, you may have to think again. Unless you’re using a very old copy of Publisher, the app will simple stop working. Microsoft warns that paying “Microsoft 365 subscribers will no longer be able to open or edit Publisher files in Publisher”. The solutions and alternative options suggested by the company are, frankly, laughable.
Firefox add-ons will stop working on March 14 if you don’t update


Firefox users running older versions of the web browser could be in for a really nasty surprise. On March 14, 2025, a critical root certificate will expire. And, if your browser isn’t updated to at least Firefox 128 (or ESR 115.13+ for those using the long-term support version) your add-ons will be disabled. Additionally, streaming services that require DRM may even stop working!
For anyone still using an outdated version on Windows, macOS, Linux, or Android, time is running out to avoid these annoyances. Even those sticking with older operating systems (such as Windows 7, 8, and 8.1, or macOS 10.12–10.14) need to at least update to ESR 115.13+ if they want to keep their add-ons and media playback working.
Businesses are interested in using AI to hit sustainability goals


A new report shows 76 percent of companies across Asia, Europe and the Middle East are intrigued by the potential of digital technologies, including AI and cloud computing, in driving sustainable development.
But the study from Alibaba Cloud also reveals that 59 percent of businesses acknowledge a gap in understanding how digital technology can assist in achieving sustainability goals.
The risks and rewards of shadow AI [Q&A]


As with other forms of 'off the books' shadow tech, used by employees without company approval, shadow AI is a double-edged sword.
Cyberhaven Labs recently reported a sharp 485 percent increase in corporate data flowing to AI systems, with much of it going to risky shadow AI apps.
Attackers can use undocumented commands to hijack Chinese-made Bluetooth chips


Security researchers have shared details of newly discovered, undocumented commands in ESP32 Bluetooth firmware that can be exploited by an attacker. The Chinese-made chip is found in millions of devices, meaning the findings are significant.
Speaking at RootedCON in Madrid, researchers from Tarlogic Security, Miguel Tarascó Acuña and Antonio Vázquez Blanco, described the “hidden functionality” they have unearthed as a backdoor, but later conceded that this may be a misleading description. They warn that exploitation could allow “hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls”.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.