Enterprises at risk from malware delivered by cloud apps


New research shows that the majority of all malware is now delivered via cloud applications, showing how attackers increasingly abuse popular cloud services to evade legacy security defenses, putting enterprise data at risk.
The report from Netskope reveals that 61 percent of all malware was delivered via a cloud app, up from 48 percent year-over-year.
How cybercrime has adapted to the pandemic


A new report from BlackBerry shows that as our digital habits have changed over the past year cybercriminals have become increasingly successful at finding and targeting vulnerable organizations.
The greater adoption of digital offerings has exposed companies to inadequate protections for employees and customers amongst an ever-growing and under-secured attack surface.
A quarter of people use work emails or passwords to login to other sites


Employees working from home on a company-provided computer are putting businesses at risk with one in four consumers admitting to using their work email or password to log in to consumer websites and apps such as food delivery, online shopping and even dating apps.
A new study from automation platform Ivanti surveyed 1,000 Americans working from home during the pandemic on a company-provided computer to examine how consumer and enterprise cybersecurity habits have changed.
How startups can formulate data-driven marketing strategies using AI


You have successfully launched your startup. Great. But don't make the mistake of thinking there is nothing left for you to do. There are many things still needed to run and grow your startup.
Regardless of how good your product is, you have to create an audience and awareness about it. This is where the role of digital marketing comes into play. And Artificial Intelligence (AI) is creating new possibilities in the digital marketing space.
Pandemic sees organizations of all sizes and industries invest in cyber threat intelligence (CTI)


After a year full of unknowns and new normals, knowledge is power. The spike in cyber breaches in the past year, compounded by COVID-related attacks, has only increased the importance of cyber threat intelligence (CTI) in the past year. The 2021 SANS Cyber Threat Intelligence survey, sponsored by ThreatQuotient, explores the state of play in the global use of CTI and outlines why the difficulties of the past year have contributed to the continued growth and maturity of CTI.
The 2021 survey saw the number of respondents reporting they produce or consume intelligence rise by 7 percent, more notably, this was the first time the number of respondents without plans to consume or produce intelligence was 0 percent, down from 5.5 percent in 2020. Analyzed CTI helps organizations understand the capabilities, opportunities, and intent of adversaries conducting malicious cyber activities. In turn, this paints a picture about how threat actors are targeting an organization’s systems, information, and people. It is this contextual information that helps organizations and individuals respond to threats, understand risks, design better cyber defenses, and protect their organization.
5 ways to talk about cybersecurity with anyone


Ever tried explaining cybersecurity to someone who isn’t tech-savvy? Just last year, my 67-year-old mother came to me in a fluster because her laptop was hijacked by a full-screen pop-up that looked like ransomware.
Thank goodness I figured out the problem before it got worse. But when you can’t be there 24/7, how do you help those around you understand basic cybersecurity principles so they can stay safe online?
Firefox 86 boosts user privacy with Total Cookie Protection feature


Mozilla has rolled out its now-customary four-weekly update with the release of Firefox 86 for Windows, Mac and Linux. This latest release contains several notable new features as well as a handful of fixes and improvements.
Users gain support for watching multiple picture-in-picture videos simultaneously, there’s improvement to the app’s Print tool, but most noteworthy of all, a new Total Cookie Protection is offered that isolates website cookies so they can’t track users across multiple sites.
New breed of cybercriminal breaches organizations then sells access


Entrepreneurial cybercriminals are operating as middlemen by breaching as many companies as possible and then selling on access to the highest bidder rather than infiltrating systems themselves.
New research from Digital Shadows reveals that these 'Initial Access Brokers' are flourishing during the pandemic as employees increasingly log in to systems remotely.
MSI MEG Aegis Ti5 gaming desktop has hardcore specs and futuristic chassis


PC gamers usually come to a fork in the road when needing a new gaming rig -- build one or buy one. While building a PC can be rewarding, sometimes there are pre-built machines that are worth considering instead -- particularly when they are beyond what you can reasonably do yourself.
As an example, today, MSI launches the MEG Aegis Ti5 gaming desktop and it takes things to another level. It is powered by either an Intel Core i7-10700K or i9-10900K CPU and either a GeForce RTX 3070 or 3080 graphics card. What makes this computer unique, however, is its gorgeous chassis -- it looks futuristic. The case even has a special LED dial on the front for quick and easy tweaks.
Cloud misconfigurations take an average 25 days to fix


On average it takes 25 days for companies to fix cloud infrastructure misconfigurations, according to a new report from cyber resilience specialist Accurics.
The research highlights security risks identified in cloud native environments. It shows that even organizations that establish a secure baseline when infrastructure is provisioned will experience 'drift' over time, when configuration changes occur in runtime, and these take an average of eight days to fix.
Final quarter of 2020 sees massive spike in ransomware


The last quarter of 2020 saw a 10,000 percent increase in ransomware activity according to a new report from managed security services provider Nuspire.
The company's latest Year in Review Threat Landscape Report -- sourced from its 90 billion traffic logs -- outlines new cybercriminal activity and tactics, techniques and procedures.
This amazing iPadOS 15 design shows how Apple could revolutionize the iPad


Two years ago, Apple took the decision to create a slightly different version of iOS for its tablet range. iPadOS makes decent use of the additional real estate, with a new home screen and features that allow for multi-tasking and more ways to use Apple Pencil.
If you've ever wished that Apple would go a step further and really make full use of the iPad's larger screen and powerful internals, then take a look at this designer’s incredible vision for iPadOS 15.
Debian-based Netrunner 21.01 'XOXO' is the perfect Linux alternative to Windows 10


Here at BetaNews, we report on many Linux distribution releases, because, well, there are a lot of them. Not all of these operating systems are great, and only a handful are legitimate replacements for Windows 10. With that said, Microsoft's operating system is very good, so if you are happy with Windows, you should probably just stick with it. Don't switch for the sake of change, folks.
Unfortunately, some people strongly dislike Windows 10, and they are eager to move onto a Linux-based alternative. If that is you, I have some great news. One of the best Windows alternatives, Netrunner, has a new version. The Debian-based operating system, which uses the excellent KDE Plasma desktop environment, now sits at version 21.01 and carries the moniker "XOXO."
Linux Mint users are surprisingly irresponsible regarding updates


Linux users are more knowledgeable regarding computer maintenance than Windows users, right? Maybe. That is certainty up for debate. With that said, Linux user may not be very responsible computer users. Well, Linux Mint users, at least.
You see, in a stunning development, it turns out Linux Mint users are often very behind in installing both operating system and application updates. In other words, Linux Mint users are often running outdated software, which could be no longer supported, or even worse, it could contain exploitable vulnerabilities. For example, a surprisingly high number of these users are running Linux Mint 17.x, which is unsupported since 2019!
Microsoft is shortening the support period for Windows 10 Enterprise LTSC


Anyone who has invested in Windows 10 LTSC (Long Term Servicing Channel) has had the comfort of knowing that Microsoft offered 10 years of support. But this is changing.
The company has announced that the support period for Windows 10 Enterprise LTSC is being halved to just five years, bringing the operating system in line with the recently announced changes to Office support. However, support for Windows 10 IoT Enterprise LTSC will remain at 10 years.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.