New malware uses Windows Subsystem for Linux as an attack vector


Security researchers have discovered a new type of malware that makes use of Windows Subsystem for Linux as a way to stealthily attack systems.
Attacks can be carried out using malicious Linux binaries using a technique that was previously just a theoretical proof-of-concept. The new attack vector was discovered by researchers from Black Lotus Labs who describe it as "the first instance of an actor abusing WSL to install subsequent payloads".
Microsoft even requires TPM 2.0 for Windows 11 virtual machines


If you were hoping to get around Windows 11’s TPM 2.0 requirement by running the operating system in a virtual machine, you're out of luck. People attempting to update to Windows 11 Insider Preview Build 22000.194 in a virtual machine will have noticed a message warning them that "this PC does not currently meet Windows 11 system requirements".
More specifically, the message goes on to explain that "the PC must support TPM 2.0". But, as have been the case on more than one occasion with Windows 11 system requirements, confusion abound thanks to Microsoft's mixed messaging.
PowerToys is now available to download from the Microsoft Store for Windows 11


Microsoft recently started the process of giving PowerToys a Windows 11 makeover ahead of the launch of the operating system next month.
Now the company has released the latest version of the essential collection of utilities to the Windows 11 Microsoft Store. This means that PowerToys is now likely to gain a much bigger following as until now it has only been available to download from GitHub.
Overcoming the challenges of IPv4 exhaustion


As hundreds of regional communications service providers rush to deploy broadband and add thousands of new subscribers to their networks, they face a long list of tasks and budget items to be addressed. Most of the budget and buildout schedule will focus on the physical deployment of the fiber (FTTH) or wireless access. However, back in the core network, one of the important decisions -- and one that needs to be made early in the planning process for a network buildout or expansion -- is how to approach IP connectivity.
Given the exhaustion of IPv4 addresses, and the cost and complexity of migrating from IPv4 to IPv6, operators need to think carefully about how they will provide an IP address for every customer. After all, a network won’t run without IP connectivity.
Office workers understand cyber risk but still don't change their behavior


Nearly a quarter (24 percent) of office workers have experienced a data breach, yet 12 percent say nothing will make them take cyber security more seriously, and a third won't take extra precautions.
A survey of over 2,000 UK office staff from BlueFort Security finds 34 percent believe cybersecurity awareness is the biggest issue when it comes to hybrid working, and 33 percent cite personal use of company devices as another significant risk.
If cloud technology is the need of the hour, then why do organizations resist adoption?


As we continue our journey through the extended new normal of the pandemic, it is crystal clear that to survive and thrive, companies will have to adapt to be able to respond to the ever-evolving needs of today’s digital consumers. It is not an exaggeration to say that today a successful business needs to be responsive, scalable, secure, and resilient. In this context, one of the most vital strategic decisions that can be made by most organizations is the accelerated shift of their legacy IT infrastructure to 'Cloud Technology'.
According to an IDC report, it is expected that by the end of 2021, approximately 80 percent of the enterprises will put a mechanism in place to shift to cloud-centric infrastructure and applications at a rate double or more of what it was before the pandemic. However, in this race of cloud adoption, many organizations do not have a clear picture of what they want and often underestimate the challenges involved in cloud migration. Lack of appropriate research, the correct approach and the right service provider leads to organizations ending up getting their hands burnt, leading them to put their plans on the backburner.
Best Windows apps this week


Four-hundred-fifty-six in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Microsoft released a passwordless sign-in option for Microsoft account this week. The feature requires Microsoft's Authenticator app for account verification during sign-ins, but removes the password from any sign-in that supports it (including Windows).
Why SaaS security needs to have a higher profile [Q&A]


Increasing numbers of apps are moving to an SaaS model and containers, but the security of these applications doesn't always get much attention.
We spoke to BetterCloud CEO, David Politis who believes that SaaS security is an area that businesses need to take much more seriously.
Avast One is a comprehensive privacy and security suite that includes a free VPN


Released at the same time as the company undergoes a redesign involving a new logo, Avast One is here to help keep you protected online. This is more than just an antivirus tool -- although an AV component is present -- this is a comprehensive suite of protective tools covering various aspects of security and privacy.
Things start off with Avast One Essentials, which is the free version of the security suite. For anyone with concerns about privacy, even this free version includes a powerful VPN with a generous weekly allowance. There is also protection against spyware, password theft and identity theft. And there is even more to explore in the paid-for editions.
Microsoft releases Windows 11 Build 22000.194, plus new Snipping Tool, Clock with Focus Sessions, and Calculator apps


Yesterday, Microsoft rolled out a new Windows 11 build for Insiders on the Dev Channel that offered new Start menu sign-in options.
Today, the software giant releases a new build to Insiders in the Beta Channel. Updates here are more representative of the version of Windows 11 set to start rolling out to non-Insiders next month. This build comes with a large number of fixes, and you can now enjoy playing around with some of apps that will be included in the new OS too.
Get 'Hunting Cyber Criminals' ($24 value) FREE for a limited time


The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers.
This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques.
Cybersecurity is not a one-stop-shop


Since the start of the pandemic, the way business is conducted has changed permanently, with many workforces continuing to work remotely as restrictions have eased. As companies relax and rules have eased, life is expected to return to a form of 'new normal.' But, the issues around cybersecurity are here to stay, and the gas pedal must not be eased -- especially with the increased risks associated with continued remote working.
If anything, security should be more reinforced now than ever before to ensure all aspects of a business are secure. But this isn’t the case.
Manufacturing data at risk from over exposure


Data security company Varonis has released research based on an analysis of four billion files across 50 organisations in the manufacturing industry and finds that there’s a huge problem of overexposure of data in the sector.
Every employee can access, on average, six million files on their first day on the job and four out of every 10 organizations have 1,000+ sensitive files open to every employee.
Organizations talk a good security game but fail to deliver


Organizations are prioritizing strategic security programs but are missing the capabilities they need to make meaningful changes to their security posture according to a new report.
The study by ReliaQuest, in partnership with Ponemon Research shows that 48 percent of organizations are prioritizing implementing zero trust principles as part of their security strategy.
AMD releases Radeon and Ryzen drivers for Windows 11 with new overclocking options


As computer users prepare for the launch of Windows 11 next month, so are hardware manufacturers. We are starting to see growing numbers of Windows 11 drivers being released, and the latest company to do so is AMD.
The company has released Windows 11 drivers for Ryzen processors and Radeon graphics. In addition to Windows 11 support, the new software also brings a new auto overclocking feature for some graphics cards and processors.
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.