Articles about cybersecurity

The role of encryption in the cybersecurity landscape [Q&A]

Despite being an effective tool for safeguarding sensitive information, encryption remains underutilized by many organizations, leaving them vulnerable to cyber threats.

Many companies still rely on perimeter security measures, viewing encryption as optional rather than essential. Misconceptions about the complexity and cost of encryption further hinder its adoption, leading to a reactive approach that often waits for a data breach before taking action.

Continue reading

Over 195 million records breached in ransomware attacks last year

Ransomware Malware Cyber Attack

In 2024, ransomware groups claimed responsibility for 5,461 successful ransomware attacks on organizations worldwide. Of these 1,204 were confirmed by the targeted organizations, according to analysis by Comparitech.

Across the 1,204 confirmed attacks, 195.4 million records have been breached. These figures for 2024 are lower than those recorded in 2023 (1,474 attacks affecting 261.5 million records), though they are expected to rise as reports often come in months later.

Continue reading

Clever PayPal attack dodges phishing checks to take over accounts

Research by Fortinet has uncovered what it terms a 'phish-free' PayPal phishing attack that seeks to trick the unwary into giving up control of their account.

It starts with an email request for payment that appears to come from a valid email address. Click the link and you're taken to a PayPal login page showing a request for payment. This is where it gets clever because if you do login your account gets linked to the address the email was sent to -- not the one you received it on.

Continue reading

Security platform adopts Open API standards

Exabeam's cloud-native, New-Scale Security Operations Platform has become the first security operations platform compatible with the Open-API Standard (OAS).

This gives SOC teams the power to quickly create automations and playbooks with their best-of-breed portfolios and ditch disjointed, monolithic systems that provide merely 'good enough' security.

Continue reading

94 percent of organizations now use GenAI apps

New research from Netskope Threat Labs has found that 94 percent of organizations are now using GenAI apps, but interestingly more than 99 percent have controls in place to mitigate the risks that they pose.

Organizational use of GenAI has grown from 81 percent of companies using the apps in 2023. ChatGPT continues to be the most popular genAI app, being used in 84 percent of organizations.

Continue reading

Almost half Gen Z and Millennials have had their social media passwords hacked

New research from hardware authentication security key provider Yubico shows nearly half of Gen Z (47 percent) and Millennials (46 percent) have had their social media account passwords hacked.

It's no surprise then that these generations are keen to adopt hardware security keys, reflecting a growing mistrust of traditional passwords and a shift toward more secure, physical authentication methods.

Continue reading

The importance of modernizing cyber defenses [Q&A]

The state of high-profile cyber incidents in recent years has highlighted the fact that defenses need to be kept up to date to provide adequate protection.

AI and machine learning have the potential to transform security operations to enhance protection against emerging threats. We spoke to Gurucul CEO Saryu Nayyar to get her view on how protection technologies are evolving and why this is so crucial.

Continue reading

Operational tech under attack, deepfake phishing and learning to use passkeys -- cybersecurity predictions for 2025

With a constant power struggle between attackers and defenders cybersecurity is a fast-moving area. That makes it notoriously hard to predict what might happen, but that doesn't stop us trying. Here are what some industry experts think the cybersecurity world has in store for 2025.

Sasha Gohman, VP, research at Cymulate, thinks ransomware will become obsolete. "Ransomware may become obsolete due to the fact that decrypting your important files may become a feasible task with quantum computing. On the other hand, ransomware operators may then choose to encrypt your important files with quantum-resilient encryption."

Continue reading

Europe's move toward cybersecurity sovereignty [Q&A]

Governments around the world are increasingly legislating for cybersecurity and privacy. But regions often have differing views on how this should be achieved.

We spoke to Christian Have, CTO of Logpoint, to get insight into how US surveillance laws could serve as a catalyst for Europe to take greater control over its data, pushing forward the concept of digital sovereignty.

Continue reading

Get 'Resilient Cybersecurity' for FREE and save $39.99!

Building a comprehensive cybersecurity program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively.

With Resilient Cybersecurity readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed today. This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry.

Continue reading

Threat actors spoof email security providers

A new report from phishing defense company Cofense highlights increasingly sophisticated phishing attacks that are exploiting trusted email security companies such as Proofpoint, Mimecast and Virtru to trick users into disclosing sensitive credentials.

The attacks make use of fake email attachments, phishing links and credential-harvesting tactics to compromise sensitive data. By mimicking well-known brands, threat actors boost the likelihood that the recipients will trust the emails and engage with harmful content, leading to them exposing critical information.

Continue reading

Credential phishing attacks up over 700 percent

Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.

The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.

Continue reading

More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025

Artificial intelligence has been one of the fastest growing areas in the tech sector over the past few years.

As AI becomes more commonly adopted what changes can we expect to see happening in 2025? Here are some expert views.

Continue reading

Data breach trends -- progress, challenges, and what's next [Q&A]

Despite organizations putting in place better security controls the pace of data breaches shows no signs of slowing down.

We spoke to Jon Fielding, managing director, EMEA at Apricorn, to discuss the latest data breach trends, the progress that's been made and where more work is needed to address security threats.

Continue reading

More complexity, more non-human IDs and shifting strategies -- identity predictions for 2025

Identity is at the root of most cyberattacks, but although we're seeing greater adoption of things like biometrics we still rely heavily on passwords.

There's added complication in the form of soaring numbers of machine identities too. Here's what some industry leaders think the identity landscape has in store for 2025.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.