Big prey, big payouts: Big game cyber hunting will return in 2024


2023 has been another wild year for cybercrime. In October, Boeing’s systems were breached through a zero-day vulnerability, with hacking group LockBit threatening to publicly release sensitive files if the ransom wasn’t paid in a week. One month prior, MGM Resorts was hit by a ALPHV/BlackCat social engineering attack estimated to impact the company’s third-quarter financial results by about $100 million. That same month, two major hospitals serving thousands of New York patients struggled to recover from a LockBit cyberattack that forced them to reschedule appointments and divert ambulances to other hospitals.
But what is in store for 2024? Let's look at some of these trends from 2023 in more detail to better understand what will be facing us next year.
AI governance: Five essential design principles to keep businesses ahead of the curve


In 2023, we witnessed the beginnings of a global AI-driven revolution. With recent studies revealing that one in six UK organizations have already embraced artificial intelligence (AI), these technologies have solidified their position in driving the next wave of digital innovation.
However, until now, organizations have been largely focused on AI experimentation, which has limited the benefits they’ve unlocked. They are now seeking to mature their strategies and embrace AI in a more transformational manner, by embedding these technologies into their core business processes. The launch of solutions like the Open AI GPT Store towards the end of 2023 is set to accelerate this drive for AI maturity, making it easier for organizations to embed ready-built use cases into their operations.
Manjaro Linux 23.1.0 'Vulcan' now available to download -- choose from GNOME, Plasma, and XFCE editions


After months of diligent development, the Manjaro team has finally launched version 23.1.0. Code-named “Vulcan,” this version of the Linux-based operating system is chock full of enhancements and security improvements. Most notably, this release addresses critical security vulnerabilities in the xorg-stack and refines the overall package offerings.
Key highlights of the update include extensive kernel updates. A notable wifi regression issue in kernel 18 has been resolved. The ASUS ROG ALLY 13 now boasts robust support across linux65, linux66, and linux67 kernels. The linux-firmware has been upgraded to its latest December iteration, ensuring up-to-date hardware compatibility.
Patriot Memory and ASUS unveil joint venture -- Viper Elite 5 TUF Gaming Alliance RGB DDR5 RAM


Patriot Memory has announced a collaboration with ASUS' gaming division, TUF Gaming. This partnership marks the debut of the Viper Elite 5 TUF Gaming Alliance RGB DDR5 series, a new addition to Patriot's Viper Gaming portfolio.
The new Viper Elite 5 TUF Gaming Alliance RGB DDR5 series is an advanced version of the previously released Viper Elite 5 performance memory series. It is officially certified by ASUS' TUF Gaming Alliance, ensuring compatibility and reliability for users.
Web application security -- five ways to improve your approach


Web applications remain one of the most targeted areas for threat actors. According to Verizon’s Data Breach Investigations Report, web application attacks were behind 26 percent of all successful attacks during the twelve months covered. Yet while the methods for attacking web applications are well known and understood, as evidenced by the work that the Open Web Application Security Project (OWASP) has done on their Top Ten list over the years, many companies still find hardening their applications challenging.
Authorization and access control describe the biggest set of challenges identified by OWASP in their most recent Top 10 list (2021) -- three out of the top five issues were around broken authorization, while broken authentication and improper access to resources were also common problems. The OWASP Top 10 for 2021 also includes attacks that work on unrestricted access to sensitive business flows, which covers areas like creating fake accounts, and server side request forgery where APIs can send resources to the wrong locations.
Open to attack: The risks of open-source software attacks


Open-source software (OSS) is now so widely used that it is incredibly difficult to find an organization that doesn’t incorporate OSS in some form or another -- whether that be in a standalone open-source product, or more commonly, in the form of OSS packages. Though its usefulness cannot be doubted, the prevalence of this software is exactly what makes it a major target for cyber-attacks.
A prime example of this is Log4j, a popular logging utility used by scores of organizations for recording events such as status reports and errors. In a situation which came to be known as 'Log4shell', a zero-day vulnerability allowed threat actors to compromise systems using malicious code and take control all while remaining undetected. At the time, its impact was described as "enormous" and the implications of its implementation into countless commercial products underlined the inherent vulnerabilities of some open-source technologies when weak points are exposed.
Get 'Marketing 5.0: Technology for Humanity' (worth $17) for FREE


In Marketing 5.0, the celebrated promoter of the "Four P’s of Marketing," Philip Kotler, explains how marketers can use technology to address customers’ needs and make a difference in the world.
In a new age when marketers are struggling with the digital transformation of business and the changing behavior of customers, this book provides marketers with a way to integrate technological and business model evolution with the dramatic shifts in consumer behavior that have happened in the last decade.
Pink Corvette crashes into Max as Barbie arrives


In 1959, a doll came onto the market that was saturated with them. It shouldn’t have been a big deal; a ho-hum moment. Something about it caught on, though, and it became bigger perhaps any toy and things went forward from there. Barbie had every occupation from doctor to architect and even met a boyfriend, Ken.
Dolls had been around forever, but Barbie caught on for some reason. Inventor Rauth Hadler had noticed something with her daughter, who played with paper dolls -- she gave them adult personas. It’s amazing where ideas can come from. Hadler ran with it and went to Mattel with the idea. The rest we all know.
Majority of cyberattacks delivered over encrypted channels


In total, 86 percent of all cyber threats, including malware, ransomware, and phishing attacks, are delivered over encrypted channels, according to a new report.
The study from Zscaler also shows threats over HTTPS grew by 24 percent from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels.
Best Windows apps this week


Five-hundred-and-seventy-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Windows Copilot is now also available for Windows 10. Microsoft released cumulative update KB5033372 this week that introduces the AI-powered tool on Windows 10 systems.
Mobile app developers turn to AI for testing


The use of AI tools for mobile app development and testing is growing, and developers and testers are keen to further expand the use of these tools, according to a new report.
The study from Kobiton finds 60 of respondents say they are currently using generative AI tools in their QA cycles to update scripts or code, 55 percent are using these tools to analyze test results, and 47 percent are using them to generate test scripts.
How to build a successful data lakehouse strategy [Q&A]


The data lakehouse has captured the imagination of modern enterprises looking to streamline their architectures, reduce cost and assist in the governance of self-service analytics.
From data mesh support to providing a unified access layer for analytics and data modernisation for the hybrid cloud, it offers plenty of business cases, but many organizations are unsure where to start building one.
Privacy-focused Proton launches macOS and Windows Proton Mail desktop app in beta


For users concerned about privacy, Proton Mail represents a tantalizing alternative to the likes of Gmail. Previously accessible through a web browser, both Proton Mail and Proton Calendar can now be accessed through a new desktop app.
Available in beta for Windows and macOS, and with a Linux version in the pipeline, Proton Mail's desktop app sees the Swiss company beating Google to the punch. To start with, the app is only available to people with a Proton Visionary plan, but will open up to everyone in early 2024.
Apple expands Self Service Repair to iPhone 15 and M2 Mac models


In a notable update to its repair services, Apple has expanded its Self Service Repair program to include the latest iPhone 15 series and several Mac models with M2 chips. This expansion includes the 14- and 16-inch MacBook Pro, the 15-inch MacBook Air, Mac mini, Mac Pro, and Mac Studio.
Additionally, the program is now accessible in 24 more European countries, including Croatia, Denmark, Greece, Netherlands, Portugal, and Switzerland. With these new additions, Self Service Repair now covers 35 Apple products across 33 countries and is available in 24 languages.
The Deep Tech revolution -- Part 1: White papers


Artificial Intelligence, Internet of Things, Cybersecurity, Blockchain: these words have become common terms we hear everyday, dominating the news and business landscapes worldwide under what we have come to know as Deep Tech. According to recent research, in 2021 the deep tech market registered a total revenue of US$431.1 Million, and is expected to grow by 21 percent between 2022 and 2032 for a value of US$ 3,733.8.
Start-ups and companies within the Deep Tech space are all about innovation and advancing technologies, often diving into niche parts of already narrow fields. They run the business side differently, they bring revolutionary approaches to traditional dynamics in the work environment, and even create new roles and job titles not seen in other companies. Staying true to their nature where science and innovation plays an important role, these companies engage in specific activities that best compliment their primary immediate goal of research and development, whether this is about technology, sharing knowledge or growing their community.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.