Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

AI security operations SOC

AI assistance delivers gains for SOC analysts

Security Operations Centers are inundated with thousands of alerts each day, most of which are false positives or low-severity issues. This flood of noise leads to alert fatigue, forcing SOC analysts to waste valuable time on false alarms instead of focusing on genuine threats.

A new study from Dropzone AI looking at SOC analyst performance across 148 security analysts shows that AI can improve effectiveness. AI assisted investigations were 22–29 percent more accurate than those in the unassisted control group. 

By Ian Barker -
Transport Layer Security. Secure Socket Layer. TLS SSL. Cryptographic protocols provide secured communications.

Enterprises face increasing challenges with certificate management

A report released today finds that approximately 60 percent of businesses are using three
or more secure sockets layer (SSL) providers and suggests a lack of centralized processes for SSL certificate management.

The study from domain security company CSC analyzed usage trends and patterns for more than 802,000 digital certificates linked to 2.4 million domains. It finds domain validated (DV) certificates account for three-quarters (73.4 percent) of certificates while organization validation (OV) certificates represent nearly a quarter (24.6 percent). Extended validation (EV) certificates account for less than two percent (1.9 percent).

By Ian Barker -
Eightpoint-Wave Browser and 4ocean Beach Cleanup Event

Browsing the web with Wave Browser could help remove plastic from the ocean -- but you don't want to do that

Wave Browser, a web browser developed by Eightpoint, is introducing a new way for users to contribute to ocean conservation without changing their daily habits (beyond, you know, changing their browser).

Through a partnership with ocean cleanup company 4ocean, Eightpoint says it will fund the removal of 100,000 pounds of plastic and trash from oceans and coastlines over the next year.

By Wayne Williams -
Search Seo Online Internet Browsing Web

Only 11 percent of US consumers trust their first search result

According to a survey of over 1,000 US consumers conducted on behalf of brand visibility platform Yext, just 11 percent trust the first tool they use when searching online, meaning nearly nine out of 10 double-check or expand their results elsewhere.

The research suggests the age of one-stop search and shop is ending and Americans are increasingly blending traditional search engines with AI tools, social media, and review sites to make purchase decisions.

By Ian Barker -
Ashampoo Photo Commander 19

Ashampoo Photo Commander 19 arrives with improved security and format support

Ashampoo has launched Photo Commander 19, the newest version of its photo management and editing software. The update focuses on data protection, compatibility with a greater range of modern formats, and improved reliability.

Photo Commander 19 adds automatic encryption for databases, backups, and registry entries to help protect stored information. There’s also an optional screenshot protection feature to prevent unauthorized capture by external software.

By Wayne Williams -
Steam logo

Microsoft and Valve issue warning to gamers about Unity vulnerability

Both Microsoft and Valve have issued warnings about flaws in the Unity engine that could expose gamers to attack. A new version of Steam has been released to plug the security hole as well.

Tracked as CVE-2025-59489, the Unity Gaming Engine Editor vulnerability has a severity rating of 8.4. The nature of Unity is such that the flaw affects multiple platforms – Windows, Linux, macOS and Android. There is good news for some, however; Xbox consoles, Xbox Cloud Gaming, iOS and HoloLens all remain unaffected.

By Sofia Elizabella Wyciślik-Wilson -
Recovery Backup Restoration Data Storage Security Concept

IT leaders struggle with the complexity of recovering from cyberattacks

A new global study of over 800 senior IT leaders reveals the concerns of IT leaders as they struggle with the rising complexity of recovery planning to cope with the aftermath of cyberattacks.

The survey from infrastructure specialist 11:11 Systems finds that 82 percent of respondents have experienced at least one significant cyberattack, while 57 percent endured two or more attacks within the past year.

By Ian Barker -
Facebook logo on mobile

Get ready to see more targeted ads on Facebook

Advertising is how Meta makes money, hence Facebook users being bombarded with ads and “recommended content”. Starting today you may receive a notification that things are about to change. Unsurprisingly, they are not changing for the better.

Meta says that it is going to “start personalizing content and ad recommendations on our platforms based on people’s interactions with our generative AI features”. What does this mean? Targeted ads, essentially.

By Sofia Elizabella Wyciślik-Wilson -
Red hat isolated white background

The Red Hat data breach is worse than first thought

The situation regarding Red Hat’s recent data breach is worsening – both for the company and for its customers. With GitLab instances belonging to the company having been breached by the Crimson Collective, hundreds of gigabytes of data were stolen.

Now the data breach has transformed into a demand for ransom – perhaps predictably. Interestingly, though, the extortion is not being perpetrated by the Crimson Collective, but by ShinyHunters.

By Sofia Elizabella Wyciślik-Wilson -
Windows 11 laptop

Windows 11 installation no longer lets you skip creating a Microsoft Account

With just a week to go until Windows 10 reaches the end of mainstream support, attention is increasingly turning to Windows 11. And with the release of the latest Dev build of the operating system, Microsoft is making changes to the OOBE.

The Out Of Box Experience is what Microsoft calls what most people refer to as the installation and setup process. With the latest changes, Microsoft is closing loopholes used to create local accounts, thereby forcing the use of a Microsoft Account.

By Sofia Elizabella Wyciślik-Wilson -
Risk report

Most big US companies now flag AI use in their public risk disclosures

A new report from The Conference Board and ESGAUGE finds that 72 percent of S&P 500 companies now flag AI as a material risk in their public disclosures. That’s up from just 12 percent in 2023, underscoring how rapidly AI has moved from experimental pilots to business-critical system.

Reputational risk tops the list, cited by 38 percent of companies. Firms warn that failed AI projects, missteps in consumer-facing tools, or breakdowns in service could quickly erode brand trust. Cybersecurity risks follow, disclosed by 20 percent of firms.

By Ian Barker -
Futuristic robot artificial intelligence huminoid AI programming coding

Google builds new AI agent to improve code security

Google has released information on a new AI-powered agent that automatically improves code security by fixing critical software vulnerabilities.

CodeMender has been built over the past six months and the company has already upstreamed 72 security fixes to open source projects, including some as large as 4.5 million lines of code.

By Ian Barker -
Insurance spotlight

Premium target -- why insurance companies are so attractive to hackers [Q&A]

The Scattered Spider group seems to have switched from high-profile attacks on UK retailers to new campaigns targeting the insurance sector. The group has recently been linked to ransomware incidents affecting US-based Philadelphia Insurance and Erie Insurance, which operates in both the UK and the US.

We spoke to Danny Howett, technical director at global cybersecurity consultancy CyXcel, to discuss why insurance is such an attractive target and some practical steps insurers can take to shore up their defences against increasingly organised cybercriminals.

By Ian Barker -
Meta logo on phone next to Facebook, Whatsapp and Instagram icons

Meta could be forced to make massive changes to timelines in its social media apps

A ruling by a Dutch court could ultimately force Meta to make sweeping changes to timeline appearance in the likes of Facebook and Instagram. While it is possible to switch form an algorithm-controlled timeline to a chronological one, the court says that this should be made more accessible.

What could this mean? Right now, it is difficult to say for sure, but it could be the case that – in some jurisdictions, at least – Meta could be required to make a chronological timeline the default.

By Sofia Elizabella Wyciślik-Wilson -
Oracle logo on building

Oracle releases emergency patch to address Cl0p data theft attacks in E-Business Suite

Oracle has released an emergency patch and an urgent security warning about a 0-day vulnerability in Oracle E-Business Suite.

Tracked as CVE-2025-61882, the security flaw has a severity rating of 9.8 and is described as an “easily exploitable vulnerability”. Oracle warns that the vulnerability is “remotely exploitable without authentication”, going some way to explaining why it is seen as being so serious an issue.

By Sofia Elizabella Wyciślik-Wilson -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

© 1998-2025 BetaNews, Inc. All Rights Reserved.