Ian Barker

Log4Shell still being exploited six months on

Six months after the Log4Shell vulnerability was made known, vulnerable instances remain accessible on the internet and people attempting to exploit them according to the latest Trustwave SpiderLabs Telemetry report.

Using data gathered from the Shodan device search engine, the report shows that as of June 9, 2022, 1,467 instances were vulnerable to Log4Shell. These vulnerable instances are from the Russian Federation, United States, and Germany with 266 (18 percent), 215 (15 percent), and 205 (15 percent) hosts, respectively.

Continue reading

A third of cybersecurity professionals are kept awake by stress

A new survey of over 300 UK security professionals shows 32 percent of respondents say they are kept awake by job stress, 25 percent by lack of opportunity, but only 22 percent by their organization suffering a cyberattack.

The study from The Chartered Institute of Information Security (CIISec) says organizations have been slow to adopt industry standards. Almost half (49 percent) don't follow the UK Government's Cyber Essentials practices, which provide basic best practice; and just 20 percent have formally adopted the NCSC's 'Ten steps to cyber security' guidance.

Continue reading

Phishing attacks bounce back after pandemic slowdown

After a tailing off during the pandemic, phishing is back, with more attacks spotted in the second quarter of this year than for the whole of 2021.

The latest phishing and malware report from Vade also shows that malware emails decreased 48 percent month-on-month -- down from 32.9 million in March to 17 million in April -- but rebounded 31 percent May, with 22.4 million malware-weaponized emails detected. June saw even higher malware volumes (28.9 million), a 29 percent increase from the previous month.

Continue reading

Two thirds of companies think they may have been targets of a nation-state cyberattack

hand on world map

New research from Venafi into the rise of nation-state cyberattacks and their links to geopolitics has revealed that two-thirds (64 percent) of security decision-makers suspect that their organization has been directly targeted or impacted by a nation state attack.

In addition, 77 percent believe we're in a perpetual state of cyberwar, while 66 percent of companies say they have changed their security strategy as a direct response to the war in Ukraine.

Continue reading

Healthcare attackers switch to smaller targets

While large healthcare providers have lots of juicy data to tempt cybercriminals, they are also likely to have strong defenses.

It's not too surprising then that a new report from managed detection and response provider Critical Insight shows that in the first half of this year attackers have shifted their attentions to smaller hospital systems and specialty clinics that lack the same level of security preparedness, staff size, or budget.

Continue reading

Security drives DevOps platform adoption

DevOps

Nearly three-quarters of respondents to a new survey have adopted -- or plan to adopt within a year -- a DevOps platform in order to meet rising industry expectations around security, compliance, toolchain consolidation, and faster software delivery.

The study from GitLab shows security has overtaken even cloud computing as the number one investment area across DevOps teams at global organizations.

Continue reading

Consumers absorb cybersecurity tips from popular culture

According to a new study 59 percent US and UK consumers are now more cautious about trusting others online thanks to having watched fraud documentaries.

The report from Onfido looks at the impact of popular shows like Inventing Anna and The Tinder Swindler and finds that 67 percent of consumers admit they have changed their outlook on fraud.

Continue reading

IT leaders look to switch from legacy systems to data warehouses

According to a new study more than 59 percent of data and technology leaders plan to switch their data warehousing solutions and 46 percent say a legacy system is motivating them to do so.

The research carried out by Propeller Insights for Ocient surveyed 500 people who are managing active data workloads of 150 terabytes or more. It finds 97 percent of respondents say the volume of data managed by their organization is set to grow fast or very fast over the next one to five years.

Continue reading

Organizations plagued by identity sprawl

A new study reveals that identity sprawl is a major problem for organizations, with 60 percent reporting as many as 21 separate identities per user.

The report from Radiant Logic and Gartner Peer Insights looks at the rapid growth of enterprise identity silos, and the explosion of user information, attributes, and credentials that accompanies it.

Continue reading

Dealing with the risks of online collaboration tools [Q&A]

Collaboration

The shift to working remotely has led to businesses relying increasingly on collaboration tools like Slack and Teams. But while these undoubtedly increase productivity they also introduce some extra risks.

We spoke to Brian Mannion, chief legal and data privacy officer at Aware, to find out about these risks and how enterprises can address them.

Continue reading

Why we need to make data integration obsolete [Q&A]

folder stack

Nowadays there are apps for almost everything. As users they clutter up our phones and tablets, but they present problems for businesses too, in particular the storing and analysis of the data they create.

Data is often tied to a specific app and each app needs its own copy, so enterprises can end up with lots of copies of the same information leading to issues with control, compliance and more.

Continue reading

Ransomware variants almost double in six months

ransomware laptop

In the past six months, FortiGuard Labs has seen a total of 10,666 ransomware variants, compared to just 5,400 in the previous half year.

In addition ransomware-as-a-service (RaaS), with its popularity on the dark web, continues to fuel an industry of criminals forcing organizations to consider ransomware settlements.

Continue reading

Pssstt... Wanna buy an identity? The price of data on the dark web

identity theft hacker

We all know that stolen information is traded on the dark web, and new research by Trustwave looks at what is available and how much it costs. It also uncovers the additional services that are being offered to make it easier to commit fraud.

Details of a stolen credit card can be bought for as little as $8. Much more valuable though is a card with 'fullz' -- extra information on the victim that makes the card more usable. These can cost up to $70.

Continue reading

Real time data is a must-have for enterprises

real-time data

Real-time data is a 'must-have' not just a 'nice-to have' according to 78 percent of respondents to a new survey into the data strategies of more than 500 IT leaders.

The study from DataStax finds real-time data pays off in two ways: it leads to increased revenue growth and improved developer productivity. For example, 71 percent of all respondents say that they can tie their revenue growth directly to having real-time data.

Continue reading

Almost half of businesses are struggling with cloud costs

cloud dollars

A new report published today by business monitoring firm Anodot reveals 49 percent of businesses find it difficult to get cloud costs under control, and 54 percent believe their primary source of cloud waste is a lack of visibility into cloud usage.

The report, based on a survey of over 130 US-based IT directors and executives, shows 91 percent of respondents report they currently have IT infrastructure in the cloud, while 60 percent say that migrating more workloads to the cloud is their top cloud initiative in the coming year.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.