Articles about Security

43 percent of cloud identities are abandoned and unused

Cloud Access bin

A new analysis of platforms including AWS, Google and Salesforce, involving 200,000 identities and hundreds of millions of cloud assets reveals that 43 percent of all cloud identities sit abandoned and unused.

The report from Varonis points out that this also means they are exposed and vulnerable, making an organization a target for account takeovers.

Continue reading

How security teams can manage data protection post Brexit

brexit-puzzle

EU and UK data-driven businesses no doubt breathed a sigh of relief with the EU recently approving the continued flow of data between the EU and UK.

But the news is just one hurdle as Cyber Security Officers (CSOs) and information security teams both in mainland Europe and the UK consider challenges that lie ahead and prepare to flex as necessary in a new era in data management. Now more than ever, it is the security leaders that work collaboratively with legal and data counterparts who will conquer.

Continue reading

API attack traffic grows more than 300 percent

API

In the past six months overall API traffic has increased 141 percent but in the same time period, API attack traffic has grown by a startling 348 percent.

A new report from Salt Security reveals significant challenges in addressing API security, with all Salt customers experiencing API attacks, security topping the list of API program concerns, and very few respondents feeling confident they can identify and stop API attacks.

Continue reading

Cybersecurity skills crisis impacts more than half of organizations

Vacant chair

The cybersecurity skills crisis has impacted 57 percent of organizations, according to the fifth annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and industry analyst firm Enterprise Strategy Group (ESG).

The survey of almost 500 security professionals finds the top effects of the skills shortage include an increasing workload for the cybersecurity team (62 percent), unfilled open job vacancies (38 percent), and high burnout among staff (38 percent).

Continue reading

Cybercriminals work together to drive greater profits

Hackers working at their desks

Cybercrime is getting more organized than ever, as threat actors increase collaboration and adapt methods to drive greater monetization, selling access to breached systems to organized criminal groups and ransomware gangs.

The latest HP Wolf Security Threat Insights Report, reveals a 65 percent rise in the use of hacking tools downloaded from underground forums and file sharing websites between the second half of 2020 and the first half of 2021.

Continue reading

Businesses continue to struggle with app security

mobile-security

Threats to web, mobile and API-based apps are developing rapidly and the average time taken to fix them isn't improving, with critical vulnerabilities remaining open on average for 202 days.

NTT Application Security has released its latest AppSec Stats Flash report looking at the current state of application security and the wider threat landscape. It finds the utilities sector the worst, with with 66 percent of applications in the industry having at least one serious exploitable vulnerability throughout the year.

Continue reading

IT leaders think remote workers are more at risk but struggle to protect them

home working security

A new survey of enterprise IT security leaders shows almost 80 percent believe remote workers are at more risk from phishing attacks now because they're isolated from their organizations' security teams.

The study from Egress also reveals that more than 59 percent of respondents feel solutions such as video training (27 percent), email reminders (20 percent), and VPNs (12 percent), are sufficient by themselves to keep organizations safe from the biggest security breach fears: damage to brand and reputation, and legal jeopardy.

Continue reading

What to do after a ransomware attack [Q&A]

Ransomware

Ransomware is a major problem and ideally while you'd like to avoid being attacked, the chances are that at some point you're going to be a target.

So, what happens following an attack and what should organizations be doing immediately afterwards to lessen the impact? We spoke to Ed Williams, EMEA director of SpiderLabs at Trustwave, to find out and to get some tips on how to proactively secure against ransomware attacks in future.

Continue reading

Kaspersky warns about the potential dangers of downloading Windows 11

Windows 11 laptop

As with any big-name software that is yet to be officially released, there is not only great enthusiasm about Windows 11, but also a rush to get hold of it by any means possible. While there are formal channels through which to obtain Windows 11 legitimately in order to test it out, scammers are taking advantage of the excitement surrounding the new operating system.

Security firm Kaspersky has issued a warning for anyone thinking about downloading Windows 11. The company urges caution lest users find their system infected with malware and adware, particularly in the light of a 1.75GB file that is currentlyu in circulation called 86307_windows 11 build 21996.1 x64 + activator.exe.

Continue reading

Security: 2FA adoption is incredibly low with Twitter users

Twitter logo through a magnifying glass

In a recently published transparency report, Twitter has revealed figures that show a disappointing adoption of 2FA (two-factor authentication) by users.

While the number of users choosing to secure their account with 2FA is on the increase, it "remains relatively low", says Twitter. And we are talking low numbers here -- a mere 2.3 percent of the Twitter userbase is concerned enough about security to enable two-factor authentication.

Continue reading

Enterprise endpoint protection needs to move to zero trust

As enterprise boundaries have become more flexible, older authentication models of security have begun to look increasingly outmoded.

A new survey of 150 IT security decision makers carried out by ThycoticCentrify finds that 71 percent of contributors agree that a distributed workforce makes a zero trust security strategy even more critical.

Continue reading

Cyber attacks on council workers increase over 200 percent

Town Hall Sign, England

Local councils have faced the same pressure as commercial businesses to have people working at home during the pandemic. But a new report shows attacks on UK councils' remote workers rose by 213 percent from March 2020 compared to the previous year.

Freedom of Information (FOI) requests made by technology solutions provider Insight, show that on average councils switched 74 percent of their employees -- more than double the UK average -- to remote working during the pandemic.

Continue reading

Universal decryptor now available for REvil ransomware

REvil ransomware

It is now almost three weeks since the gigantic ransomware attack that exploited a vulnerability in Kaseya VSA remote management software. The attack affected millions of devices and the group behind it, REvil, had been demanding a $70 million ransom.

There had been great concern about the fall out from the attack due to the apparent disappearance of REvil which made it impossible for anyone willing to pay the ransom to do so. Now a universal decryption key has been obtained from a "trusted third party", giving victims the chance to regain access to their data without the need to part with any money.

Continue reading

Why have we failed and what do we need to do?

Fail

In watching the most recent high profile, and very costly breaches, I’ve begun to ask the question "Why have we failed and what do we need to do?" We’ve failed. As I enter the twilight of my career in our industry, we haven’t gotten better -- breaches are more expensive, they’re more difficult to remediate, the economic destruction is real, and people get hurt or die as a result of cybersecurity breaches. Why? Where did we go wrong, and what do we need to do to fix it?

The first question I asked myself is, "What do we do well?" We’re an industry of incredibly talented people. Over the years, we’ve learned to collaborate and share information (which, we didn’t start off doing), and we have no shortage of tools. Our tool chest is loaded to the gills with capability. We also have boards and executives who are more cyber savvy than ever before. When I started in our industry over two decades ago, I couldn’t explain to a board what cybersecurity was with a PowerPoint presentation. Now, they’re all concerned about the issue and paying attention.

Continue reading

36 percent of organizations have suffered a serious cloud breach in the last year

cloud lock

A new survey of 300 cloud professionals finds that 36 percent of organizations have suffered a serious cloud security data leak or a breach in the past 12 months.

The study conducted by security and compliance automation firm Fugue and developer tools company Sonatype finds eight out of ten are worried that they're vulnerable to a major data breach related to cloud misconfiguration.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.