Threat actors spoof email security providers
A new report from phishing defense company Cofense highlights increasingly sophisticated phishing attacks that are exploiting trusted email security companies such as Proofpoint, Mimecast and Virtru to trick users into disclosing sensitive credentials.
The attacks make use of fake email attachments, phishing links and credential-harvesting tactics to compromise sensitive data. By mimicking well-known brands, threat actors boost the likelihood that the recipients will trust the emails and engage with harmful content, leading to them exposing critical information.
Get 'The Data Science Handbook, 2nd Edition' for FREE and save $60!
Becoming a data scientist is hard. The job focuses on mathematical tools, but also demands fluency with software engineering, understanding of a business situation, and deep understanding of the data itself. This book provides a crash course in data science, combining all the necessary skills into a unified discipline.
The focus of The Data Science Handbook is on practical applications and the ability to solve real problems, rather than theoretical formalisms that are rarely needed in practice.
Credential phishing attacks up over 700 percent
Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.
The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.
What will attackers target in 2025? CNI, CNI, and more CNI!
Critical national infrastructure (CNI) has had a rough 2024 in the UK when it comes to cybercrime. From the chaos caused by a teenager who hacked into TfL to the dangerous impact on the NHS after the Synnovis breach. And let us not forget the ongoing fallout from the Sellafield breach in December 2023.
These are just a few of the notable cases of a much wider problem, with Bridewell finding that 60 percent of UK CNI organizations experiencing at least one ransomware attack over the past 12 months.
More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025
Data breach trends -- progress, challenges, and what's next [Q&A]
Despite organizations putting in place better security controls the pace of data breaches shows no signs of slowing down.
We spoke to Jon Fielding, managing director, EMEA at Apricorn, to discuss the latest data breach trends, the progress that's been made and where more work is needed to address security threats.
System76 Pangolin Linux laptop gets aluminum body and 2K display upgrade
System76 has launched the latest version of its Pangolin Linux laptop, now featuring an all-aluminum body and a 16-inch 2K display. Known for catering to Linux users, the updated Pangolin combines premium build quality with powerful AMD hardware, making it suitable for a variety of workflows.
The new aluminum chassis offers improved durability and a sleek, smooth feel while maintaining the laptop’s lightweight design. System76’s focus on aesthetics and functionality shines through, giving the Pangolin a more polished look and a rigid build that alleviates concerns about flex.
Fedora Asahi Remix 41 brings Fedora Linux to Apple Silicon Macs with Vulkan 1.4 and x86 emulation
Fedora Asahi Remix 41 is now available, delivering Fedora Linux 41 to Apple Silicon Macs. This release is the result of ongoing collaboration between the Fedora Asahi SIG and the Asahi Linux project. Fedora Asahi Remix was first introduced at Flock 2023 and made its debut later in December with Fedora Asahi Remix 39.
A major highlight of this release is support for x86 and x86-64 emulation, opening the door for AAA games on Apple Silicon hardware. This is made possible with the inclusion of the new Vulkan 1.4 driver, which brings improved compatibility and performance for gaming. Beyond that, Fedora Asahi Remix 41 delivers solid device support, including high-quality audio that works right out of the box.
More complexity, more non-human IDs and shifting strategies -- identity predictions for 2025
Identity is at the root of most cyberattacks, but although we're seeing greater adoption of things like biometrics we still rely heavily on passwords.
There's added complication in the form of soaring numbers of machine identities too. Here's what some industry leaders think the identity landscape has in store for 2025.
Enterprises struggle to deliver AI agents but new tool could help
Businesses are often under pressure to deliver AI agents, but development teams are struggling with siloed tools, fragmented governance and limited functionality that makes promising prototypes unfeasible in production.
According to a survey of over 1,000 enterprise technology leaders released today by Tray.ai, 42 percent of respondents need access to eight or more data sources to deploy AI agents successfully -- which is impossible when SaaS app agents are restricted in scope by the integrations to which their host applications have access.
Get 'Java Essentials For Dummies' for FREE and save $9.99
Java Essentials For Dummies is a reliable and succinct reference on the core components of Java -- the multifaceted general-purpose language used for desktop, mobile, and web applications.
This straightforward book gets right to the point -- eliminating review material and wordy explanations -- so you get what you need, fast.
Newly launched APIs found by attackers in under 30 seconds
Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and less secure. New research from Wallarm shows the average time for a new API to be found by attackers is just 29 seconds.
The research used a honeypot to look at API activity and in its first 20 days in November the lngest time taken for a new API to be discovered was 34 seconds.
Experts call for proactivity to combat state-sponsored cyber threats in 2025
In 2024, opposing nation-states have utilized cyberattacks to project power and disruption from within their own borders. This shift has been epitomized by the rise of the “Axis of Upheaval,” dominated by the CRINKs nations -- China, Russia, Iran, North Korea -- who share a common reliance on using cyberattacks to wreak havoc in an affordable manner.
Whether it’s North Korea using ransomware to generate revenue for its isolated regime, or Russia focusing on disrupting and eroding public trust in democratic institutions, each state is finding its niche to cause harm. Despite these varied goals and techniques, it’s the same sectors again and again in the crosshairs. Whether it’s CNI, healthcare, or finance, these organizations now must protect against a wide range of attack styles and techniques.
Elon Musk seems to confirm some details of his Gmail rival X Mail
There have been rumors circulating for some time that creating an email service to compete against Gmail was on Elon Musk’s to-do list. While concrete details about what it might look like and when it might appear have been elusive, Musk has started to give something of an idea of his vision.
The billionaire has said on multiple occasions, including in the last few days, that X Mail is on the cards, but now he has given a clearer indication of what it might involve. The question is -- are people ready for it?
Netflix expands Moments feature from iOS to Android, so you can share your favorite clips from shows
There are so many classic scenes from shows and movies and, just like music fans like to share amazing drum solos, guitar riffs and lyrics with friends, there is something joyous about connecting over a shared video clip.
YouTube has long made it possible to share snippets of a videos, and earlier this year, Netflix introduced a feature called Moments to iOS. This provides a way to share a meaningful, impactful, funny or beautiful scene from a Netflix show or movie, and now the same feature is available globally on Android.
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.