Credential phishing attacks up over 700 percent


Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.
The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.
What will attackers target in 2025? CNI, CNI, and more CNI!


Critical national infrastructure (CNI) has had a rough 2024 in the UK when it comes to cybercrime. From the chaos caused by a teenager who hacked into TfL to the dangerous impact on the NHS after the Synnovis breach. And let us not forget the ongoing fallout from the Sellafield breach in December 2023.
These are just a few of the notable cases of a much wider problem, with Bridewell finding that 60 percent of UK CNI organizations experiencing at least one ransomware attack over the past 12 months.
More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025

Data breach trends -- progress, challenges, and what's next [Q&A]


Despite organizations putting in place better security controls the pace of data breaches shows no signs of slowing down.
We spoke to Jon Fielding, managing director, EMEA at Apricorn, to discuss the latest data breach trends, the progress that's been made and where more work is needed to address security threats.
System76 Pangolin Linux laptop gets aluminum body and 2K display upgrade


System76 has launched the latest version of its Pangolin Linux laptop, now featuring an all-aluminum body and a 16-inch 2K display. Known for catering to Linux users, the updated Pangolin combines premium build quality with powerful AMD hardware, making it suitable for a variety of workflows.
The new aluminum chassis offers improved durability and a sleek, smooth feel while maintaining the laptop’s lightweight design. System76’s focus on aesthetics and functionality shines through, giving the Pangolin a more polished look and a rigid build that alleviates concerns about flex.
Fedora Asahi Remix 41 brings Fedora Linux to Apple Silicon Macs with Vulkan 1.4 and x86 emulation


Fedora Asahi Remix 41 is now available, delivering Fedora Linux 41 to Apple Silicon Macs. This release is the result of ongoing collaboration between the Fedora Asahi SIG and the Asahi Linux project. Fedora Asahi Remix was first introduced at Flock 2023 and made its debut later in December with Fedora Asahi Remix 39.
A major highlight of this release is support for x86 and x86-64 emulation, opening the door for AAA games on Apple Silicon hardware. This is made possible with the inclusion of the new Vulkan 1.4 driver, which brings improved compatibility and performance for gaming. Beyond that, Fedora Asahi Remix 41 delivers solid device support, including high-quality audio that works right out of the box.
More complexity, more non-human IDs and shifting strategies -- identity predictions for 2025


Identity is at the root of most cyberattacks, but although we're seeing greater adoption of things like biometrics we still rely heavily on passwords.
There's added complication in the form of soaring numbers of machine identities too. Here's what some industry leaders think the identity landscape has in store for 2025.
Enterprises struggle to deliver AI agents but new tool could help


Businesses are often under pressure to deliver AI agents, but development teams are struggling with siloed tools, fragmented governance and limited functionality that makes promising prototypes unfeasible in production.
According to a survey of over 1,000 enterprise technology leaders released today by Tray.ai, 42 percent of respondents need access to eight or more data sources to deploy AI agents successfully -- which is impossible when SaaS app agents are restricted in scope by the integrations to which their host applications have access.
Get 'Java Essentials For Dummies' for FREE and save $9.99


Java Essentials For Dummies is a reliable and succinct reference on the core components of Java -- the multifaceted general-purpose language used for desktop, mobile, and web applications.
This straightforward book gets right to the point -- eliminating review material and wordy explanations -- so you get what you need, fast.
Newly launched APIs found by attackers in under 30 seconds


Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and less secure. New research from Wallarm shows the average time for a new API to be found by attackers is just 29 seconds.
The research used a honeypot to look at API activity and in its first 20 days in November the lngest time taken for a new API to be discovered was 34 seconds.
Experts call for proactivity to combat state-sponsored cyber threats in 2025


In 2024, opposing nation-states have utilized cyberattacks to project power and disruption from within their own borders. This shift has been epitomized by the rise of the “Axis of Upheaval,” dominated by the CRINKs nations -- China, Russia, Iran, North Korea -- who share a common reliance on using cyberattacks to wreak havoc in an affordable manner.
Whether it’s North Korea using ransomware to generate revenue for its isolated regime, or Russia focusing on disrupting and eroding public trust in democratic institutions, each state is finding its niche to cause harm. Despite these varied goals and techniques, it’s the same sectors again and again in the crosshairs. Whether it’s CNI, healthcare, or finance, these organizations now must protect against a wide range of attack styles and techniques.
Elon Musk seems to confirm some details of his Gmail rival X Mail


There have been rumors circulating for some time that creating an email service to compete against Gmail was on Elon Musk’s to-do list. While concrete details about what it might look like and when it might appear have been elusive, Musk has started to give something of an idea of his vision.
The billionaire has said on multiple occasions, including in the last few days, that X Mail is on the cards, but now he has given a clearer indication of what it might involve. The question is -- are people ready for it?
Netflix expands Moments feature from iOS to Android, so you can share your favorite clips from shows


There are so many classic scenes from shows and movies and, just like music fans like to share amazing drum solos, guitar riffs and lyrics with friends, there is something joyous about connecting over a shared video clip.
YouTube has long made it possible to share snippets of a videos, and earlier this year, Netflix introduced a feature called Moments to iOS. This provides a way to share a meaningful, impactful, funny or beautiful scene from a Netflix show or movie, and now the same feature is available globally on Android.
Google launches Whisk for creative AI image remixing


Google has introduced Whisk, a new generative AI tool designed to make image creation more interactive and creative. Unlike traditional AI tools that rely heavily on lengthy text prompts, Whisk allows users to start with images. Simply drag and drop images into the interface, and Whisk lets you generate unique creations by combining these visuals in novel ways.
Whisk enables users to input up to three images: one for the subject, one for the scene, and another for the style. This approach gives users the flexibility to create anything from digital plushies to enamel pins or stickers. Some early examples from Whisk include a fantastical fish, a whimsical walrus, and even a glazed doughnut reimagined as an enamel pin.
The dark side of AI: How automation is fueling identity theft


Automations empowered by artificial intelligence are reshaping the business landscape. They give companies the capability to connect with, guide, and care for customers in more efficient ways, resulting in streamlined processes that are less costly to support.
However, AI-powered automations also have a dark side. The same capabilities they provide for improving legitimate operations can also be used by criminals intent on identity theft. The rise of low-cost AI and its use in automations has empowered scammers to widen their nets and increase their effectiveness, leading to a drastic increase in identity theft scenarios.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.