Growing complexity means legacy security systems miss one in every 14 threats


Traditional detection methods are being outpaced, with a 127 percent rise in malware complexity and one in 14 files initially deemed ‘safe’ by legacy systems proving to be malicious.
A new report from OPSWAT uncovers layered threats designed to evade analysis, including obfuscated loaders such as NetReactor and evasive behaviors missed by traditional tools. These results show that modern malware intends to confuse rather than flood defenses.
New agentic AI platform helps teams fix cloud security problems faster


Security teams are often hampered by having to identify and fix issues while weeding out false positives. This is an area where AI can help and Sysdig has launched a new agentic platform designed to analyze cloud environments end-to-end and uncover hidden business risk so organizations can remediate crucial threats fast and deliver measurable improvements in their security posture.
Sysdig Sage, the company’s AI cloud security analyst, ultimately understands context from the entire business and provides clear, contextual remediation recommendations, reducing an organization’s exposure time to critical vulnerabilities.
WhatsApp launches new tools to stop scammers


WhatsApp is now an essential communication tool for both personal and business use, and its popularity means that it is also a prime target for scammers. As such, the company has just announced the rollout of a new series of tools designed to help keep users informed and protected.
Among these new tools is a safety warning for group chats that warns about being added to new chat groups by unknown contacts. There are also tools and advice for individual chats, which are also targets for scams.
Microsoft says that it will make WinUI ‘truly’ open source


Microsoft has announced that it has plans to “truly open sourcing” WinUI, the user interface framework that is embedded in Windows. Although no specific timeframe has been mentioned, the company is “actively working toward it”.
Pointing out that making the WinUI repository open source is not just a “flip-the-switch moment” but a “deliberate process”, Microsoft lead software engineer Beth Pan says that the process is a complicated one. This is part of the reason for not being willing to commit to a specific end date for any particular milestone.
The rise of vishing and why enterprises need to be ready [Q&A]


Vishing (voice phishing) attacks have surged by over 1,600 percent so far this year, partly driven by a rise in AI-driven deepfake voice scams.
This is yet another way cybercriminals are seeking to impersonate those with access to company systems to disrupt organizations and hold data for ransom. We spoke to Anthony Cusimano, solutions director at Object First, to discover more about this trend and how businesses are at risk.
Could the UK government really ban VPNs?


As we’ve been reporting over the past week interest in VPN use in the UK has spiked following concerns about the Online Safety Act and its age verification rules.
Inevitably the government has noticed the surge in VPN use and while it insists it has no plans to ban their use the science secretary, Peter Kyle, says it will be looking “very closely” at how they’re being employed.
Cybersecurity budget growth hits a five-year low


Average security budget growth has slowed to just four percent year-on-year, the lowest rate in five years and a sharp decline from eight percent in 2024.
The slowdown comes in the face of continued global market volatility, driven by geopolitical tensions, uncertain tariff policies, and fluctuating inflation and interest rates, says a new report from IANS Research and Artico Search.
Cloud accounts come under attack as identity threats rise


The latest Threat Detection Report update from Red Canary shows a rise of almost 500 percent in detections associated with cloud accounts during the first half of 2025.
This significant rise stems primarily from Red Canary’s expanded identity detection coverage and the implementation of AI agents designed to identify unusual login patterns and suspicious user behaviors. This includes identifying logins from unusual devices, IP addresses, and virtual private networks (VPNs), which significantly increases the detection of risky behaviors.
Microsoft to disable features in outdated Office apps


Microsoft is always keen for people to use the latest versions of its software, and things are no different with Office. The company has just announced that if users of Microsoft 365 Office apps will need to be fully updated or they will lose access to some key features.
The announcement indicates that Microsoft is upgrading backend services that power some features and that as a result of this, older versions of apps will no longer be supported. But just what does this mean and when will users be affected?
Spotify is raising its prices yet again


Spotify has announced an increase in subscription prices for users around the world. For now, the US does not get a mention, but with fees being raised in pretty much every region, it is hard to imagine that the same will not happen stateside as well.
The new pricing is due to kick in for existing subscribers in September, but sooner for new subscribers.
75 percent of cybersecurity leaders don’t trust their own data


A disconnect between cybersecurity confidence and data reality is leaving organizations exposed, according to a new report released today by Axonius.
The study, based on a survey of 500 US director-level and above cybersecurity and IT leaders, reveals that while 90 percent of cybersecurity leaders say their organization is prepared to take immediate action on a vulnerability, only 25 percent trust all the data in their own security tools.
Attackers exploit old vulnerabilities as zero-day exploits surge


New analysis from Forescout of more than 23,000 vulnerabilities and 885 threat actors across 159 countries worldwide during the first half of 2025 finds 47 percent of newly exploited vulnerabilities were originally published before 2025, and zero-day exploitation has increased 46 percent.
The report also shows ransomware attacks are averaging 20 incidents per day, zero-day exploits increased 46 percent, and attackers are increasingly targeting non-traditional equipment, such as edge devices, IP cameras and BSD servers. These footholds are often used for lateral movement across IT, OT, and IoT environments, allowing threat actors to get deeper into networks and compromise critical systems.
Hackers weaponize GenAI to boost cyberattacks


Adversaries are weaponizing GenAI to scale operations and accelerate cyberattacks -- as well as increasingly targeting the autonomous AI agents reshaping enterprise operations. This is among the findings of CrowdStrike’s 2025 Threat Hunting Report.
The report reveals how threat actors are targeting tools used to build AI agents -- gaining access, stealing credentials, and deploying malware -- a clear sign that autonomous systems and machine identities have become a key part of the enterprise attack surface.
Microsoft Recall is bad at filtering sensitive information


Whenever there are privacy concerns voiced about software, they are almost always downplayed. But fears about Microsoft Recall appear to be well justified.
Announced and previewed last year, Microsoft Recall is a feature of Windows 11 which Microsoft says enables users to retrace their steps. It does this by capturing screenshots of computing activity, which can then be analyzed and searched using AI to home in on data, return to a project, and much more. But there have been lots of vocal protests about the potential for invasions of privacy.
Why an adaptive learning model is the way forward in AIOps [Q&A]


Modern IT environments are massively distributed, cloud-native, and constantly shifting. But traditional monitoring and AIOps tools rely heavily on fixed rules or siloed models -- they can flag anomalies or correlate alerts, but they don’t understand why something is happening or what to do next.
We spoke to Casey Kindiger, founder and CEO of Grokstream, to discuss new solutions that blend predictive, causal, and generative AI to offer innovative self-healing capabilities to enterprises.
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.