Trustwave launches advanced threat detection for Azure


As increasing numbers of businesses shift to cloud and multi-cloud environments, securing systems becomes a much more complex task.
For Microsoft Azure users Trustwave is launching new services to bolster threat monitoring, detection and response natively on the platform.
New system helps defend critical infrastructure from attack


Critical infrastructure such as water and power supplies is a prime target for hackers, but is often run using aging systems that weren't designed for the internet era.
Remote access specialist Dispel is launching a new Secure Remote Access platform that helps to protect these systems while at the same time allowing remote access for authorized users to carry out essential maintenance.
Insecure file transfers leave organizations at risk


According to a new survey, 78 percent of respondents are still using unencrypted protocols to transfer some of their files, and only 44 percent are using two-factor authentication when connecting to their file transfer server.
The study for VanDyke Software, conducted by Amplitude Research, interviewed 450 professionals involved in data protection and file transfers and finds that 48 percent of companies are transferring files at least multiple times per day and sometimes 'continuously'.
One in five IT workers doesn't know what a cyberattack is


A survey of over 1,000 IT workers, carried out by technology services provider Probrand reveals that more than one in five (21 percent) don't actually know what constitutes a 'cyberattack'.
Used as a catch-all term, cyberattack can cover everything from a simple phishing email, right across to a large-scale server attack, however, many IT workers have never seen, or don't understand, what the real detail of an attack actually looks like.
Google pushes out urgent Chrome update to patch actively exploited zero-day vulnerabilities


Users of Chrome are being urged to update their browsers as Google is rolling out a patch for two serious zero-day vulnerabilities, one of which is already being actively exploited.
The Chrome security team says that both vulnerabilities are use-after-free security issues which can be used to exploit arbitrary code. One vulnerability exists in an audio component of the browser, while the other can be found in the PDFium library. The Windows, macOS and Linux versions of Chrome are all affected.
How automation can contribute to cloud security [Q&A]

Hackers breach security at Web.com, Network Solutions and Register.com, accessing private customer info


Domain name registrar Web.com has revealed that it fell victim to a data breach earlier in the year. Two of the company's subsidiaries, Network Solutions and Register.com were also attacked by the hackers at the same time.
The incidents took place back in late August, but were only discovered a couple of weeks ago. The attackers were able to access personal details of customers, but Web.com does not say how many people are affected -- although it is likely to run into the millions.
Automated solution helps speed up response to phishing emails


As cybercriminals become more sophisticated, spotting phishing emails is increasingly difficult. Even if a user reports something suspicious to the IT security team it can take time to analyze it before others can be warned.
Security automation specialist LogicHub is launching its Autonomous Phishing Triage, which automatically and accurately analyzes and classifies emails with 97 percent accuracy, reducing the number of alerts requiring human analysis by 75 percent or more.
GDPR is changing consumer trust and data security across Europe


According to the results of a new survey, 74 percent of organizations say that since GDPR was introduced in 2018 it has had a beneficial impact on consumer trust, and 73 percent claim it has boosted their data security.
The study from Check Point questioned 1,000 CTOs, CIOs, IT and security managers from organizations in the UK, France, Germany, Italy and Spain. It shows that GDPR is delivering a strong positive effect overall for European businesses.
Cybercriminals use enterprise-grade tools to mount phishing attacks


We know that cybercrime is increasingly a very serious business and a new report from Akamai Technologies reveals that enterprise-based development and deployment strategies are being used to create phishing attacks.
Tools such as phishing as a service (PaaS) are being used to leverage some of the world's largest tech brands, with 42.63 percent of domains observed targeting Microsoft, PayPal, DHL, and Dropbox.
The state of stolen credentials on the Dark Web


Every time there's a major data breach it adds to the pool of stolen details available on the Dark Web, but exactly what is out there?
To find out, ImmuniWeb has been analyzing the quality and quantity of stolen credentials accessible on the Dark Web originating from Fortune 500 companies in 10 different industries around the world.
Keeping the DevOps balance between security and speed [Q&A]


With DevOps gaining in popularity at many companies, the tension between speed and security is an ongoing issue. This tension exists because the common perception is that security slows down agile development and the CI/CD pipeline.
We spoke to Manish Gupta CEO of continuous application security platform ShiftLeft to discuss the dynamics within DevOps that create this tension and how IT organizations can achieve both speed and security.
Retailers turn to crowdsourced security to protect their systems


As the holiday season approaches and there's a consequent spike in the amount of money spent online, retail cybersecurity comes under the spotlight.
Bugcrowd is releasing its State of Retail Cybersecurity report that explores the vulnerabilities found among retailers over the last year. Among the key findings is that crowdsourced security adoption increased by 137 percent year on year.
Ransomware sees a revival in 2019's worst cybersecurity threats


Cybersecurity company Webroot has released its third annual Nastiest Malware list which shows ransomware making a comeback in addition to other threats.
Phishing and botnets are still popular attack methods and threats across the board are also becoming more sophisticated and harder to detect.
DoH! Google tries to clear up DNS-over-HTTPS confusion


Google has already revealed plans for Chrome which it says will increase privacy and security. DNS-over-HTTPS (DoH) was announced back in September, and the company is already worried that people are confused about the implementation.
The company has published a defensive blog post in which it says that "there has been some misinformation and confusion about the goals of our approach and whether DoH will impact existing content controls offered by ISPs". It goes on to try to dispel the incorrect beliefs it says have built up.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.