Latest Technology News

94 percent of companies have had security incidents with production APIs

api

According to a new report 94 percent of companies have experienced security problems in production APIs in the past year, with 20 percent saying the organization suffered a data breach as a result.

The latest State of API Security Report from Salt Security also finds that found that API attack traffic has more than doubled in the past 12 months with a 117 percent increase. In the same period overall API traffic grew 168 percent, highlighting the continued explosion of enterprise API usage.

Continue reading

Industrial systems under threat from wipers and IoT botnets

Industrial computer system

The latest OT/IoT security report from Nozomi Networks shows that wiper malware and IoT botnets dominate threats to industrial control systems.

Researchers have observed the robust usage of wiper malware, and seen the emergence of an Industroyer variant, dubbed Industroyer2, developed to misuse the IEC-104 protocol, which is commonly used in industrial environments.

Continue reading

Ransomware contained in typosquat Python scripts

controlling hacker

Researchers at Sonatype have identified multiple malicious Python packages that contain ransomware scripts.

The packages are named after a legitimate, widely known library called 'Requests', with names like 'requesys', 'requesrs' and 'requesr', in order to trick developers into installing the wrong version.

Continue reading

Microsoft beefs up Defender security with new Threat Intelligence and External Attack Surface Management tools

Microsoft Defender External Attack Surface Management

Microsoft has launched two new security products, bolstering the capabilities of Microsoft Defender. The company says that the aim of the two tools is to help organizations lock down their infrastructure and reduce their overall attack surface.

The tools, Microsoft says, also provide "deeper context into threat actor activity" making it easier to predict malicious activity and secure resources. Microsoft Defender Threat Intelligence works by mapping the internet every day, so that security teams have the data needed to understand current attack techniques, while with Microsoft Defender External Attack Surface Management lets security teams see their system as attackers do.

Continue reading

Plugable USBC-VAMETER3 is an upgraded USB-C voltage and amperage meter

Last year, we told you about Plugable's second generation USBC-VAMETER -- a dongle with an OLED screen that can monitor USB-C voltage and amperage. The second gen variant was similar to the original, but it added a rotatable screen orientation -- a very welcome addition.

Today, Plugable launches the third generation of its useful dongle. Called "USBC-VAMETER3," it has the same rotatable screen technology found on gen 2, but it gets some power upgrades. The third gen model now supports 48V (4.5V-50V) compared to 20V (4V-20V) on the gen 2 model. The third generation variant also supports 240W compared to just 100W on its predecessor.

Continue reading

ADATA launches LEGEND 960 PCIe Gen4 x4 M.2 2280 SSD for PC and Sony PlayStation 5

M.2 solid state drives are great options for both laptops and desktop PCS. Hell, if you add such a drive to a compatible enclosure (such as this one), you can transform it into a portable SSD too. But did you know you can upgrade the storage of your PlayStation 5 video game console by adding an M.2 drive?

Today, ADATA launches a new M.2 SSD that is designed for both PCs and the PlayStation 5. Called "LEGEND 960," this PCIe Gen4 x4 M.2 2280 SSD offers impressive speeds and will be initially offered in your choice of two capacities -- 1TB and 2TB. ADATA promises a 4TB variant will be available at the end of August.

Continue reading

IObit Software Updater 5 keeps your apps updated to boost system security

It is very easy to keep Windows up to date -- so easy, in fact, that you hardly need to do anything. Just make sure that the Automatic Updates feature of Windows Update is enabled, and everything will happen in the background. IObit Software Updater does much the same for the apps you have installed as well.

While there are some apps that will update automatically -- including, but not limited to, those installed from the Microsoft Store -- it is certainly not the case for all software. And this is where IObit Software Updater can help, ensuring that all of the software you have installed is up to date, so you not only benefit from the latest features and options, but also the highest level of security. IObit Software Updater 5.0 is now here, complete with support for scores of additional applications.

Continue reading

Ransomware uses malicious macros to infect target systems

ransomware laptop

A new study reveals that 87 percent of the ransomware found on the dark web can be delivered via malicious macros in order to infect targeted systems.

The research from Venafi, in partnership with criminal intelligence provider, Forensic Pathways, looked at 35 million dark web URLs and forums to uncover a thriving ransomware community with highly damaging macro-enabled strains readily available.

Continue reading

How to use SIGKILL to rapidly terminate containers in Kubernetes

Originating from Linux, which uses a Unix operating system, SIGKILL is a common command that developers use to terminate absolutely any process. Most commonly, if anything needs to be shut down immediately as it's causing damage to the system itself, then SIGKILL is the go-to signal to use.

Alongside Linux, SIGKILL has also found itself into any developer platform that manages container systems, with the most popular example of this being Kubernetes. As one of the most drastic signals that you can execute, SIGKILL will instantly terminate a process, without giving the system the opportunity to block or ignore the signal. With this, absolutely any processes that are connected to the process you’ve killed will also terminate.

Continue reading

Cyber insurance may be cyberficial, but…

Insurance might be one of the least liked, but most valued purchases within a business when you need to use it.  In previous decades, it was needed against fire, theft, and other tangible threats to a business, yet as cyber-attacks are becoming an inevitable, frequent occurrence, the demand for cyber insurance is at an all-time high.

However, qualifying for cyber insurance coverage is easier said than done. Businesses not only have to manage the soaring cost of premiums, but also meet a long list of complex criteria that deems their current security strategy and implementation eligible for financial protection. 

Continue reading

Over 65s feel excluded by online brands

New research from customer engagement platform Twilio shows older consumers are being left behind when businesses digitize their customer facing operations.

Although consumers over 65 hold significant digital shopping power, with 76 percent relying on online shopping in the UK, only 12 percent say they feel understood by brands they interact with digitally.

Continue reading

Microsoft releases PowerToys v0.61.0 with numerous 'quality of life improvements'

PowerToys

It is time for a new build of everyone's favorite Windows utility collection, PowerToys. Microsoft has just released version 0.61.0 of the tools, with the company saying that the v0.61 release cycle is focused on stability and improvements.

But don't let this somewhat self-deprecating description put you off -- there's actually quite a lot to this update. Key changes include updates to the ever-popular FancyZones, as well as Always on Top and PowerToys Run, and updates to the Windows 11 context menu.

Continue reading

Spotify has an intriguing new incentive to become a Premium subscriber

Spotify play and shuffle controls

A lack of ads and unlimited track skipping are both pretty good reasons to cough up for a Spotify Premium subscription, but for some people it is not enough.

The streaming audio service apparently agrees that paying subscribers do not currently get enough for their outlay and is adding features to increase value for money. So, what does Spotify think will entice would-be subscribers into taking the plunge? New control buttons; buttons most people would reasonably expect to be included in an audio app as standard, rather than as a premium feature.

Continue reading

Identifying cybersecurity issues in your business

cybersecurity

Threats to your business come in many forms. For most organizations, the biggest threats to their survival are related to cybersecurity. An Allianz survey found this to be true, as "cyber incidents" ranked as the biggest risk to organizations, overtaking "business interruption". Whether those threats are external or internal, they are continuous and evolving because of the ever-increasing shift towards digital.

Over 98 percent of UK security professionals have reported an increase in cyber-attacks against their businesses in the past year. A further 96 percent say those attacks have become more sophisticated. This shows the need for constantly-evolving UK cybersecurity.

Continue reading

Key things you didn't know about phishing

Phishing is one of the most common forms of cyberattack, fooling people into thinking they're dealing with a trusted organization in order to get them to part with credentials.

But what are the hallmarks of a phishing attack? Atlas VPN has collected some phishy statistics to find out.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.