Articles about cybersecurity

Ransomware on the rise with mid-size companies a prime target

ransomware cash

A new report from Delinea shows that, while still not back to 2021 levels, ransomware attacks are increasing.

What's more, mid-sized companies appeared to be in cybercriminals’ sights the most, with 65 percent saying they've been a ransomware victim over the past 12 months. Organizations are also paying ransoms more frequently, up to 76 percent from 68 percent the prior year.

Continue reading

Free link checker helps identify malicious websites

Cybersecurity company NordVPN is launching a new, free tool to allow users to check the safety of a website before visiting it.

Link Checker scans a site for different types of malware and delivers a notification about whether it's fake or infected with phishing scams.

Continue reading

Why identity security could be the Achilles heel of your business [Q&A]

Most successful cyberattacks rely on compromised identity or social engineering. Yet this can be a major blindspot for enterprises with basic awareness of the problem lacking and a growing number of personal devices used for work.

We spoke to Jim Taylor, chief product officer of identity platform RSA, -- which recently published a report on the issue -- to learn more about the problem and how it can be addressed.

Continue reading

Breaking the cybersecurity automation logjam won’t break the bank

Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back office processes, approaches like Robotic Process Automation (RPA), for example, are now increasingly standard and are expected to be a $20bn-plus market by 2030. In parallel, enterprises are looking to ChatGPT and Generative AI to help them speed up everything from creating marketing brochures to drug discovery.

However, where automation is trailing behind is in how organizations go about optimizing cybersecurity. Given that attacks tend to occur at scale, or involve complexity beyond even the smartest average security professional to cope with, this core area of vulnerability should be precisely where the CISO and the SOC (security operations center) seek assistance from automation.

Continue reading

Making cybersecurity elementary [Q&A]

There are so many terms and acronyms used in the cybersecurity sector that it can be a little overwhelming at times, even for people who work in the industry.

Paul Baird, director of cyber security operations and engineering at Advanced Software and fellow at the Chartered Institute of Information Security (CIISec) has produced a round up of all the terms that you might ever need to know in the security space in a format based on the periodic table of elements.

Continue reading

Demand for cyber insurance increases as attacks get more sophisticated

insurance key

A new report shows that as the severity and sophistication of cyberattacks has increased along with the financial consequences, many companies have been prompted to invest in or review their cybersecurity insurance.

The study of over 600 IT security professionals, conducted by the Ponemon Institute for Recast Software, shows 41 percent say their organization has experienced an increase in the number of cybersecurity incidents in 2023, 61 percent say the total cost of these attacks had averaged $21 million, and 75 percent say their cybersecurity exposure would increase or at best stay the same in the coming year.

Continue reading

Interest in AI and security surges among developers

The latest Technology Trends Report from O'Reilly shows interest in generative AI among developers has surged.

The report looks at the most popular technology topics consumed by the 2.8 million users on O'Reilly’s online learning platform and finds that topic engagement in GPTs has grown 2,600 percent year-on-year.

Continue reading

2023 marked an 80 percent increase in ransomware activity

ransomware laptop

The latest annual report from the GuidePoint Research and Intelligence Team (GRIT) observed 63 distinct ransomware groups using encryption, data exfiltration, data extortion, and other novel tactics to compromise and publicly post 4,519 victims across all 30 of GRIT's tracked industries, and in 120 countries, across 2023.

Most impacts affected a limited subset of industries. 62 percent of all observed victims belong to one of the top ten most-impacted industries, with manufacturing and technology remaining the two most-impacted.

Continue reading

Majority of companies not prepared for insider threats

insider threat

An overwhelming majority of global organizations admit they are ill-prepared to handle the steady increase in insider threat activity, according to new research conducted by Cybersecurity Insiders and announced today by Securonix.

While 76 percent of organizations have detected increased insider threat activity over the past five years, less than 30 percent believe they are equipped with the right tools to handle them.

Continue reading

Bugcrowd sees 30 percent increase in web vulnerability submissions

Crowdsourced security platform Bugcrowd’s latest Vulnerability Trends Report finds that the hacker community recorded a 30 percent increase in web vulnerability submissions on the platform compared to 2022.

In addition it has recorded an 18 percent increase in API submissions, a 21 percent increase in Android submissions, and a 17 percent increase in iOS submissions.

Continue reading

New unified SASE gateway boosts performance for enterprises

SASE, Secure Access Service Edge

Secure Access Service Edge (SASE) technology has become increasingly popular as it combines the delivery of wide area networks and security controls in a single platform.

As enterprises look to support new digital requirements including accelerated cloud adoption, edge computing, increased use of collaboration tools, and a hybrid workforce SASE is likely to become still more popular. Versa Networks is launching a new line of Unified SASE gateways delivering 100+ Gbps throughput to meet the growing demand for increased convergence of networking and security.

Continue reading

Organizations face devastating financial consequences from cyberattacks

A new report from Barracuda Networks and the Ponemon Institute looks at 'cybernomics' -- the financial forces that are driving cyberattacks.

Based on a survey of over 1,900 IT security practitioners it finds the average annual cost to respond to compromises is a startling $5.34 million.

Continue reading

Verified randomness -- what is it and why does it matter? [Q&A]

Much of the online world relies on things being random. Gamers trust that their players re-spawn at completely random locations, similarly, gamblers trust that online slot machines are giving them random outcomes.

Ensuring things are properly random is also important for things like decentralized finance and blockchain transactions. But how can you be sure that something is properly random?

Continue reading

New resource helps enterprises prepare for post-quantum security

Cybersecurity company Thales is launching a first-of-its-kind Post Quantum Cryptography (PQC) Starter Kit in collaboration with Quantinuum, aimed at supporting enterprises in their transition to a post-quantum era and helping them understand the implications that quantum computing will have on the security of their infrastructure.

While 73 percent of organizations recognize quantum computing poses a threat to traditional cryptography, 61 percent have yet to define a strategy for a post-quantum world.

Continue reading

How your voice could be used by phone scammers

We've all become used to scam phone calls of various kinds, but it seems AI is allowing them to become more sophisticated.

According to NordVPN, scammers are now able to create realistic voice clones from samples collected online and use them to extort money and data from victims' friends, relatives, or colleagues.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.