Microsoft beefs up Defender security with new Threat Intelligence and External Attack Surface Management tools
Microsoft has launched two new security products, bolstering the capabilities of Microsoft Defender. The company says that the aim of the two tools is to help organizations lock down their infrastructure and reduce their overall attack surface.
The tools, Microsoft says, also provide "deeper context into threat actor activity" making it easier to predict malicious activity and secure resources. Microsoft Defender Threat Intelligence works by mapping the internet every day, so that security teams have the data needed to understand current attack techniques, while with Microsoft Defender External Attack Surface Management lets security teams see their system as attackers do.
Plugable USBC-VAMETER3 is an upgraded USB-C voltage and amperage meter
Last year, we told you about Plugable's second generation USBC-VAMETER -- a dongle with an OLED screen that can monitor USB-C voltage and amperage. The second gen variant was similar to the original, but it added a rotatable screen orientation -- a very welcome addition.
Today, Plugable launches the third generation of its useful dongle. Called "USBC-VAMETER3," it has the same rotatable screen technology found on gen 2, but it gets some power upgrades. The third gen model now supports 48V (4.5V-50V) compared to 20V (4V-20V) on the gen 2 model. The third generation variant also supports 240W compared to just 100W on its predecessor.
ADATA launches LEGEND 960 PCIe Gen4 x4 M.2 2280 SSD for PC and Sony PlayStation 5
M.2 solid state drives are great options for both laptops and desktop PCS. Hell, if you add such a drive to a compatible enclosure (such as this one), you can transform it into a portable SSD too. But did you know you can upgrade the storage of your PlayStation 5 video game console by adding an M.2 drive?
Today, ADATA launches a new M.2 SSD that is designed for both PCs and the PlayStation 5. Called "LEGEND 960," this PCIe Gen4 x4 M.2 2280 SSD offers impressive speeds and will be initially offered in your choice of two capacities -- 1TB and 2TB. ADATA promises a 4TB variant will be available at the end of August.
IObit Software Updater 5 keeps your apps updated to boost system security
It is very easy to keep Windows up to date -- so easy, in fact, that you hardly need to do anything. Just make sure that the Automatic Updates feature of Windows Update is enabled, and everything will happen in the background. IObit Software Updater does much the same for the apps you have installed as well.
While there are some apps that will update automatically -- including, but not limited to, those installed from the Microsoft Store -- it is certainly not the case for all software. And this is where IObit Software Updater can help, ensuring that all of the software you have installed is up to date, so you not only benefit from the latest features and options, but also the highest level of security. IObit Software Updater 5.0 is now here, complete with support for scores of additional applications.
Ransomware uses malicious macros to infect target systems
A new study reveals that 87 percent of the ransomware found on the dark web can be delivered via malicious macros in order to infect targeted systems.
The research from Venafi, in partnership with criminal intelligence provider, Forensic Pathways, looked at 35 million dark web URLs and forums to uncover a thriving ransomware community with highly damaging macro-enabled strains readily available.
How to use SIGKILL to rapidly terminate containers in Kubernetes
Originating from Linux, which uses a Unix operating system, SIGKILL is a common command that developers use to terminate absolutely any process. Most commonly, if anything needs to be shut down immediately as it's causing damage to the system itself, then SIGKILL is the go-to signal to use.
Alongside Linux, SIGKILL has also found itself into any developer platform that manages container systems, with the most popular example of this being Kubernetes. As one of the most drastic signals that you can execute, SIGKILL will instantly terminate a process, without giving the system the opportunity to block or ignore the signal. With this, absolutely any processes that are connected to the process you’ve killed will also terminate.
Cyber insurance may be cyberficial, but…
Insurance might be one of the least liked, but most valued purchases within a business when you need to use it. In previous decades, it was needed against fire, theft, and other tangible threats to a business, yet as cyber-attacks are becoming an inevitable, frequent occurrence, the demand for cyber insurance is at an all-time high.
However, qualifying for cyber insurance coverage is easier said than done. Businesses not only have to manage the soaring cost of premiums, but also meet a long list of complex criteria that deems their current security strategy and implementation eligible for financial protection.
Over 65s feel excluded by online brands
New research from customer engagement platform Twilio shows older consumers are being left behind when businesses digitize their customer facing operations.
Although consumers over 65 hold significant digital shopping power, with 76 percent relying on online shopping in the UK, only 12 percent say they feel understood by brands they interact with digitally.
Microsoft releases PowerToys v0.61.0 with numerous 'quality of life improvements'
It is time for a new build of everyone's favorite Windows utility collection, PowerToys. Microsoft has just released version 0.61.0 of the tools, with the company saying that the v0.61 release cycle is focused on stability and improvements.
But don't let this somewhat self-deprecating description put you off -- there's actually quite a lot to this update. Key changes include updates to the ever-popular FancyZones, as well as Always on Top and PowerToys Run, and updates to the Windows 11 context menu.
Spotify has an intriguing new incentive to become a Premium subscriber
A lack of ads and unlimited track skipping are both pretty good reasons to cough up for a Spotify Premium subscription, but for some people it is not enough.
The streaming audio service apparently agrees that paying subscribers do not currently get enough for their outlay and is adding features to increase value for money. So, what does Spotify think will entice would-be subscribers into taking the plunge? New control buttons; buttons most people would reasonably expect to be included in an audio app as standard, rather than as a premium feature.
Identifying cybersecurity issues in your business
Threats to your business come in many forms. For most organizations, the biggest threats to their survival are related to cybersecurity. An Allianz survey found this to be true, as "cyber incidents" ranked as the biggest risk to organizations, overtaking "business interruption". Whether those threats are external or internal, they are continuous and evolving because of the ever-increasing shift towards digital.
Over 98 percent of UK security professionals have reported an increase in cyber-attacks against their businesses in the past year. A further 96 percent say those attacks have become more sophisticated. This shows the need for constantly-evolving UK cybersecurity.
Key things you didn't know about phishing
Phishing is one of the most common forms of cyberattack, fooling people into thinking they're dealing with a trusted organization in order to get them to part with credentials.
But what are the hallmarks of a phishing attack? Atlas VPN has collected some phishy statistics to find out.
Why security teams should prepare to slay the three-headed dragon [Q&A]
Governments, utilities and other key industries are prime targets for attack including from nation state actors and cybercriminals seeking to extract a ransom.
But David Anteliz, technical director at Skybox, believes that given the increase in tensions across the world threat actors will evolve their tactics with the use of a 'three-headed dragon approach' that goes beyond the probing we have seen so far.
Composability is key to a successful hyper-automation strategy
The past two years have been filled with business uncertainty and risk. But for anyone hoping that a post-COVID era would herald a return to business-as-usual, recent months have been a rude awakening. Economic uncertainty is sweeping the Western world, impacting both businesses and consumers. This in turn is driving boardrooms to focus relentlessly on driving greater cost savings and productivity increases across their operations.
Automation is an obvious candidate for achieving both, but existing technology stacks are limiting the speed at which IT teams can harness those capabilities to meet the demands of the business. IT leaders must lead the charge in finding and adopting new strategies to overcome these barriers.
Ubuntu-based Linux Mint 21 'Vanessa' now available for download
Just yesterday, we told you 4MLinux 40 was available for download. We also stated 4MLinux was an operating system that simply didn't need to exist. Another such distribution that isn't necessary anymore is Linux Mint. While Mint is a very solid OS, the brutal truth is, users would be wise to just use the operating system on which it is based -- Ubuntu.
But OK, many people have been using Linux Mint for years and they are not interested in changing their ways. Fair enough. If you are such a person that is prepared to "ride or die" with Linux Mint, today, the latest version of the operating system is officially released. Code-named "Vanessa," Linux Mint 21 can be downloaded immediately.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.