Almost 90 percent of cyberattacks in March targeted against Russia and Ukraine


We're used to a high volume of cyberattacks originating from Russia, but in an interesting turnaround following the invasion of Ukraine, 70 percent of cyberattacks in March have been targeted at Russia.
Research from Atlas VPN shows a further 19 percent of attacks targeting Ukraine. The USA is the third biggest target but attacks targeting the country accounted for only five percent of the total.
New Microsoft Defender preview now available for Windows, Android and iOS


Microsoft has been working on a new security tool for a while now and today announces a preview build for Windows Insiders to try out, although there are some restrictions to be aware of.
The Microsoft Defender app, which is available for Windows, Android, and iOS, helps protect you and your family’s data and devices against online threats, such as malware and phishing attacks.
Beware the three percent -- tiny proportion of users account for most malware incidents


A new report and infographic released today by Elevate Security shows that a mere three percent of a company's internal users are to blame for 92 percent of malware incidents, while just four percent are responsible for 80 percent of phishing incidents.
The research, carried out for Elevate by the Cyentia Institute, also shows 12 percent of users are responsible for 71 percent of browsing incidents with one percent triggering 200 events every week.
Don't panic! Knowledge, skill and judgment are key to cybersecurity responses


Humans are often the weak link in the cybersecurity chain, but it's human capabilities that are also key to dealing with attacks and their aftermath, according to a new report from Immersive Labs.
The inaugural Cyber Workforce Benchmark report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations run by more than 2,100 organizations over the last 18 months.
Majority of attacks on SaaS platforms come from Russia and China


Analysis of security events across more than 120,000 user accounts last year shows that the vast majority of attacks on top SaaS platforms such as Microsoft 365, Google Workspace, Slack and Dropbox are coming from Russia and China.
The latest SaaS Application Security Insights (SASI) Report from SaaS Alerts also suggests these countries may be coordinating attack efforts. Attack trend lines that compare Russia and China show almost exactly the same pattern.
Bitdefender launches new password manager for consumers


We all know that we should use complex passwords and different ones for each account but managing them is undoubtedly a chore. It's no surprise then that Bitdefender research shows 50 percent of people use a single password for all online accounts and 32 percent reuse just a few passwords across multiple accounts.
To simplify the creation and management of secure passwords for online accounts across multiple platforms, including mobile, Bitdefender is today launching its own Password Manager.
Passwordless technology is key to reducing risk and improving user experience


Frustrated by poor user experience and weak security, enterprises are moving towards adopting passwordless, continuous authentication, according to a new report.
The research from Enterprise Strategy Group, sponsored by SecureAuth also shows that multi-factor authentication (MFA) fatigue can result in more friction, loss of productivity and higher IT costs.
Supply chain vulnerabilities hit medical and IoT devices


Researchers at Forescout's Vedere Labs have discovered a set of vulnerabilities targeting the PTC Axeda agent which is commonly used in medical and IoT devices.
The Axeda agent enables device manufacturers to remotely access and manage connected devices, making these vulnerabilities reminiscent of the Kaseya hack and the SolarWinds Orion compromise.
Organizations take two months to patch critical vulnerabilities


Organizations are taking nearly two months to remediate critical risk vulnerabilities, with an average mean time to remediate (MTTR) across of 60 days.
A new report from smart vulnerability management firm Edgescan, based on analysis of over 40,000 web application and API assessments, three million network endpoint assessments, and circa 1000 penetration tests, finds high rates of known, patchable vulnerabilities that have working exploits in the wild.
How to keep customers safe with the correct print security strategy


Today’s Wi-Fi printers possess an array of features that make printing easy, which are especially useful in a world where remote working is commonplace and employees use a range of different devices for producing documents. Despite their advantages, there remain some serious security gaps that hackers can easily exploit if an organization doesn’t have a robust print security strategy in place.
While most businesses do well when it comes to protecting core IT infrastructure including computers, servers and applications, they do often fall short when it comes to secondary assets such as multifunction printers (MFPs). With cybercriminals constantly circling and searching for different ways to infiltrate a company’s network, unsecured connected printers can be a key point of weakness leading to a major breach.
Lapsus$ hackers leak Samsung source code and massive data dump from security breach


Samsung appears to have fallen victim to a serious security breach if the leaks from data extortion group Lapsus$ are anything to go by.
Amounting to a colossal 190GB of data, the group says it has in its possession Samsung source code and other confidential company data. It is just days since the Lapsus$ claimed responsibility for a hack that resulted in data being stolen and leaked from data stolen from GPU chipmaker NVIDIA.
The 'human firewall' and the burden of securing your organization


Whether you regard your colleagues as Layer 8 "issues" in your own OSI stack, or as a human firewall which should be able to recognize and act on inbound threats, like everything else in organizations that execute well, getting your general employee population on-board with your information security goals is ultimately a matter of culture.
And the strongest security cultures are those where each and every employee fully understands that they are on the front lines. They are extended members, and the early warning system, for your core team in the security operations center (SOC).
Surfshark launches free plug-in to help spot fake news


Fake news and disinformation has long been a problem on the internet and no more so than at present as both sides in the Ukraine conflict engage in an information war.
It's timely then for Surfshark to launch a free extension for Chrome and Firefox that detects and highlights website links from various media and other websites that are known to spread fake news and misinformation.
Why we shouldn't try to kick Russia off the internet


The Russian invasion of Ukraine has sparked condemnation around the world and led to the imposition of a range of sanctions from the economic to the sporting and the cultural.
There have been calls to censor media linked to the Russian state too, with the European Union taking the step of banning the distribution of content from outlets like Russia Today.
Why Kubernetes deployment needs a security first mindset [Q&A]


Kubernetes has been at the forefront of container deployment, allowing the automation of development, scaling and management, and supported on a wide range of public cloud platforms.
But as with any cloud deployment there are potential risks from mis-configuration, poorly managed access privileges and more. It's important therefore that when deploying Kubernetes security is given top priority.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.