Latest Technology News

Number of ransomware victims increases by 25 percent

ransomware laptop

A new report based on publicly available resources finds a 25 percent increase in ransomware victims from Q4 2022 and a 27 percent increase compared to Q1 of the same year.

The study from GuidePoint Security's Research and Intelligence Team (GRIT) tracked 849 total publicly posted ransomware victims claimed by 29 different threat groups in the first quarter of this year.

Continue reading

Twitter quietly updates Hateful Conduct policy to remove protections for transgender users

Transgender flag

Twitter has undergone some huge changes since Elon Musk took over at the social media platform, many of which have been very public. But others, like a recent update to its Hateful Content policy, have been quietly slipped out without announcement.

The policy change sees Twitter removing sections that specifically protected transgender users. This means that a long-standing ban on the purposeful deadnaming or misgendering of trans users has been lifted, leading to condemnation from LGBTQIA+ groups and angering the trans community.

Continue reading

Windows 11 Build 23440 lets you hide the date and time in the system tray

Windows 11 laptop

Microsoft today rolled out a new Windows 11 build to Insiders in the Canary Channel that brings Content Adaptive Brightness Control (CABC) to plugged in devices.

Insiders on the Dev Channel aren’t missing out though, as Windows 11 Build 23440 arrives today, with a decent amount of new features and fixes for testers in that channel.

Continue reading

Experimental Windows 11 build brings Content Adaptive Brightness Control (CABC) to plugged in devices

Two weeks ago, Microsoft released a Windows 11 build to the Dev Channel which came with Content Adaptive Brightness Control (CABC) -- an energy-saving feature that works by dimming areas of the screen depending on the content that is being viewed. It was supposed to be something that would benefit all, including desktop users.

Shortly afterwards, Microsoft backtracked, and said the feature wouldn’t be available to desktops after all. From today, Canary Channel Build 25346 introduces CABC support for laptops and 2-in-1’s that are plugged into a charger.

Continue reading

Get 'Cybersecurity and Privacy Law Handbook' (worth $41.99) for FREE

Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards.

If you’re looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered.

Continue reading

Record number of software security flaws uncovered in 2022

A record 26,448 software security flaws were reported by CISA last year, with the number of critical vulnerabilities (CVEs) up 59 percent from 2021 at 4,135.

The 2023 Annual Threat Intelligence Report, from the Deepwatch Adversary Tactics and Intelligence (ATI) team, also shows that the conflict between Ukraine and Russia has unleashed a flurry of amateur and state-sponsored attacks and breaches on organizations and critical infrastructure.

Continue reading

Microsoft and Talon launch enterprise-grade ChatGPT

Workplace

Enterprise browser specialist Talon Cyber Security has announced that it has integrated its secure enterprise browser with the Microsoft Azure OpenAI Service to provide enterprise-grade ChatGPT access to customers.

This allows organizations to maintain data protection, keeping data put into ChatGPT within their perimeter and preventing it from transferring to third-party services. When using ChatGPT in Azure OpenAI Service, the organization uses its own Azure resources, so sensitive data is not delivered to other locations, improving data security and reducing risk.

Continue reading

New tool makes it easier to manage machine identities

Thanks to increased cloud and container use there's a growing demand for machine identities, but delivering and managing those identities can present problems.

Machine ID specialist Venafi is launching a new tool called Firefly that enables security teams to easily and securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally and quickly across any environment.

Continue reading

Misconfigurations leave internet-facing servers open to attack

Business database

Issues with server configuration remain a major problem. Researchers at Censys have identified over 8,000 hosts on the internet misconfigured to expose open directories.

These directories contain potentially sensitive data, such as database information, backup files, passwords, Excel worksheets, environment variables, and even some SSL and SSH private keys. Exposure of these types of data in such an accessible manner can offer threat actors an easy way into an organization's network.

Continue reading

What if cloud data was stored on floppy disks?

In 2020 alone, 61 percent of businesses migrated their workloads to the cloud, with 48 percent actively choosing to store their most important data in the cloud.

But because cloud storage is out of sight it can sometimes be difficult to understand just how much data there is stored out there.

Continue reading

Databases on Kubernetes -- Support your cloud native strategy with open source Kubernetes operators

Today, developers are used to running applications in the cloud. They are accustomed to using software containers and building applications using microservices components connected by APIs. Gartner estimates that more than 90 percent of global organizations will be running containerized applications in production by 2027, up from less than 40 percent in 2021. Similarly, the company has predicted that 70 percent of organizations will complement continuous delivery for their applications with continuous infrastructure automation to improve business agility by 2025.

From an infrastructure perspective, this means Kubernetes. However, Kubernetes was initially built to manage stateless application components rather than the rest of the infrastructure that goes to make up IT systems. For the other elements involved, such as databases, containerization had to be made to fit.

Continue reading

How enterprises can stay ahead of risks, threats and potential attacks [Q&A]

Risk dial

Businesses are engaged in a constant cat-and-mouse game with hackers, attackers, and bad actors in order to stay secure.

Dominic Lombardi, VP of security and trust at Kandji believes that in order to stay ahead it's necessary to master basic IT and security hygiene, update and communicate your risk register, and work steadily toward a zero-trust security model. We spoke to him to discover more.

Continue reading

Vivaldi 6 offers Workspaces for better tab organization, adds custom icons to Themes

Vivaldi Technologies has unveiled Vivaldi 6.0 for Windows, Mac, Linux and Android, a major new release of its customizable web browser.

Version 6.0 lands with two heavyweight new features: an additional layer of tab organization called Workspaces, and support for custom icons on the browser toolbar.

Continue reading

Ransomware attacks can cost enterprises up to 30 percent of operating income

The financial impact of a ransomware attack can cost businesses up to 30 percent of their operating income, with smaller enterprises hit proportionally harder.

A new report from ThreatConnect looks at the financial impact of ransomware attacks on small ($500M), medium ($1.5B) and large ($15B) organizations within healthcare, manufacturing, and utilities.

Continue reading

Enterprises plan to increase cloud service investment as part of network transformation

Cloud money

In a drive for network transformation, 98 percent of enterprise IT leaders say they plan to increase their dependence and investment in cloud services.

The latest Enterprise Network Transformation report from SASE solutions company Aryaka finds that although an uncertain economy is impacting network and security team investments CIOs, CISOs and IT leaders are doubling down on investment in the cloud.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.