Free online tool shines a light on the global threat landscape
Cyber threats are becoming more complex and it can be difficult for defenders to see the big picture and make decisions accordingly.
Now though help is at hand as ImmuniWeb is launching a free online tool making historical data on the security of internet-accessible resources available to the global cybersecurity community, educational institutions, government agencies, and even individual researchers.
Three-quarters of most visited websites not compliant with privacy regs
A new report finds that 75 percent of the 100 most visited websites in the US and Europe are not compliant with current privacy regulations.
The study from privacy solution provider Privado.ai shows despite stricter privacy enforcement in Europe a surprising 74 percent of top websites do not honor opt-in consent as required by Europe's General Data Protection Regulation (GDPR).
Enterprises vulnerable to look-alike domains
According to a new report, 80 percent of registered web domains that resemble a Global 2000 brand do not actually belong to that brand.
The report from enterprise-class domain registrar CSC shows that of the homoglyph (look-alike fake) domains owned by third parties other than the Global 2000 brand owners, 42 percent have MX records (email exchange records) compared with 40 percent in 2023. These MX records can be used to send phishing emails or to intercept email.
Are we starting to give up on cyber hygiene?
A new survey of over 7,000 individuals suggests a growing wave of pessimism among workers regarding cybersecurity practices.
The study from CybSafe and the National Cybersecurity Alliance shows 53 percent believe staying safe online is possible, down by five percent from last year, while only 60 percent think online safety is worth the effort, marking a nine percent drop.
Hanging on the telephone set to be replaced by messaging services
It was 175 years ago that Italian inventor Antonio Meucci came up with the technology that would later be improved and popularized by Alexander Graham Bell to become the telephone.
New research from cloud communications company Sinch finds that newer technologies are starting to change how we communicate -- particularly with businesses -- offering richer, more interactive, and personalized experiences.
Social media could be good for your mental health
It's a pretty fair bet that if you asked most people they would skeptical about the effects of social media on well-being. However, new research from the Saïd Business School at the University of Oxford suggests there are positive benefits of social media usage on adults' mental health.
Academics conducted a six-month study of 1029 adults, with participants' daily time using social platforms on their Android mobile device unobtrusively tracked and their well-being measured every two weeks.
Organizations vulnerable to software supply chain attacks
According to Gartner, 60 percent of organizations work with over 1,000 third parties, and a new report shows many of these supply misconfigured or vulnerable hardware and software, putting customers at risk.
The study from CyCognito finds web server environments, including platforms like Apache, NGINX, Microsoft IIS, and Google Web Server, were the host of 34 percent of all severe issues across surveyed assets. They accounted for more severe issues than 54 other environments combined (out of 60 environments surveyed),
95 percent of website bot attacks go undetected
More than 65 percent of websites are unprotected against simple bot attacks and 95 percent of advanced bot attacks go undetected on websites.
A new report from DataDome reveals that eCommerce and luxury goods sites are at greatest risk. Just five percent of luxury brand websites and 10 percent of eCommerce websites are fully protected against bad bots.
Stealth mode browser helps spot sneaky phishing attempts
A new zero-trust stealth mode browser is being launched by SlashNext, designed to see through obfuscation techniques commonly used by threat actors, and deliver enhanced protection against phishing and malware.
In recent years, well-intentioned companies offering free services such as CAPTCHA solutions and content delivery networks have inadvertently aided threat actors. For example, Cloudflare's Turnstile Services and similar CAPTCHA solutions are commonly exploited as obfuscation techniques. CAPTCHAs are used to block the crawlers employed by security services from accessing and analyzing phishing sites.
Switching broadband in the UK is about to get easier
Changing your broadband service provider has always been a hassle. Usually it takes around 10 days, not to mention that you have to put up with phone calls and emails from your old supplier offering you better deals and pleading with you not to go.
For people in the UK, however, things are about to get a whole lot simpler. The One Touch Switching Company (TOTSCo) is a non-profit organization that has set up a messaging platform called the TOTSCo Hub.
Thousands of industrial control devices exposed online
Recent attacks have highlighted the vulnerability of industrial control systems to attack and a new report has found 18,000 exposed devices that are likely used to control industrial systems.
The report, from internet intelligence platform Censys, focuses on ICS devices in the US and UK and also finds that almost 50 percent of the human-machine interfaces associated with water and wastewater systems (WWS) identified could be manipulated without any authentication required.
Consumer sites drive growth in passkey adoption
Take up of passkeys as a more secure means of accessing websites has been a little disappointing to date, but new research from Dashlane shows that passkeys are starting to gain traction with consumers.
It finds that early passkey adoption is largely being driven by the consumer space, with 'sticky' apps (those used frequently on a daily basis -- including Facebook and X) leading the way.
URL protection services used to mask phishing attacks
Cybercriminals are abusing legitimate URL protection services to hide malicious URLs in phishing emails, according to a new Threat Spotlight from Barracuda Networks.
Researchers have observed phishing attacks taking advantage of three different URL protection services to mask their phishing URLs. The services are provided by trusted, legitimate brands. To date, these attacks have targeted hundreds of companies.
The critical role of load balancing [Q&A]
When the internet first emerged, the need for load balancers was mainly to optimize the growing use of PC servers and to support the surge in Web traffic. Their basic functionality was designed to pool server resources to meet this demand.
Load balancers have come a long way since, becoming broadly accepted as essential for evolving IT infrastructure and the exponential growth of apps.
Tens of thousands of websites vulnerable to data breaches
Over 58,000 unique websites from around the world are vulnerable to data breaches and even complete takeovers according to new research.
The Cybernews research team has investigated publicly exposed environment files (.env) that should be kept private and protected at all costs. These files hold passwords, API keys, and other secrets that websites need to access databases, mail servers, payment processors, content management systems, and various other services.
