Log4Shell still being exploited six months on


Six months after the Log4Shell vulnerability was made known, vulnerable instances remain accessible on the internet and people attempting to exploit them according to the latest Trustwave SpiderLabs Telemetry report.
Using data gathered from the Shodan device search engine, the report shows that as of June 9, 2022, 1,467 instances were vulnerable to Log4Shell. These vulnerable instances are from the Russian Federation, United States, and Germany with 266 (18 percent), 215 (15 percent), and 205 (15 percent) hosts, respectively.
A third of cybersecurity professionals are kept awake by stress


A new survey of over 300 UK security professionals shows 32 percent of respondents say they are kept awake by job stress, 25 percent by lack of opportunity, but only 22 percent by their organization suffering a cyberattack.
The study from The Chartered Institute of Information Security (CIISec) says organizations have been slow to adopt industry standards. Almost half (49 percent) don't follow the UK Government's Cyber Essentials practices, which provide basic best practice; and just 20 percent have formally adopted the NCSC's 'Ten steps to cyber security' guidance.
Phishing attacks bounce back after pandemic slowdown


After a tailing off during the pandemic, phishing is back, with more attacks spotted in the second quarter of this year than for the whole of 2021.
The latest phishing and malware report from Vade also shows that malware emails decreased 48 percent month-on-month -- down from 32.9 million in March to 17 million in April -- but rebounded 31 percent May, with 22.4 million malware-weaponized emails detected. June saw even higher malware volumes (28.9 million), a 29 percent increase from the previous month.
Two thirds of companies think they may have been targets of a nation-state cyberattack


New research from Venafi into the rise of nation-state cyberattacks and their links to geopolitics has revealed that two-thirds (64 percent) of security decision-makers suspect that their organization has been directly targeted or impacted by a nation state attack.
In addition, 77 percent believe we're in a perpetual state of cyberwar, while 66 percent of companies say they have changed their security strategy as a direct response to the war in Ukraine.
Healthcare attackers switch to smaller targets


While large healthcare providers have lots of juicy data to tempt cybercriminals, they are also likely to have strong defenses.
It's not too surprising then that a new report from managed detection and response provider Critical Insight shows that in the first half of this year attackers have shifted their attentions to smaller hospital systems and specialty clinics that lack the same level of security preparedness, staff size, or budget.
Security drives DevOps platform adoption


Nearly three-quarters of respondents to a new survey have adopted -- or plan to adopt within a year -- a DevOps platform in order to meet rising industry expectations around security, compliance, toolchain consolidation, and faster software delivery.
The study from GitLab shows security has overtaken even cloud computing as the number one investment area across DevOps teams at global organizations.
Consumers absorb cybersecurity tips from popular culture


According to a new study 59 percent US and UK consumers are now more cautious about trusting others online thanks to having watched fraud documentaries.
The report from Onfido looks at the impact of popular shows like Inventing Anna and The Tinder Swindler and finds that 67 percent of consumers admit they have changed their outlook on fraud.
IT leaders look to switch from legacy systems to data warehouses


According to a new study more than 59 percent of data and technology leaders plan to switch their data warehousing solutions and 46 percent say a legacy system is motivating them to do so.
The research carried out by Propeller Insights for Ocient surveyed 500 people who are managing active data workloads of 150 terabytes or more. It finds 97 percent of respondents say the volume of data managed by their organization is set to grow fast or very fast over the next one to five years.
Organizations plagued by identity sprawl


A new study reveals that identity sprawl is a major problem for organizations, with 60 percent reporting as many as 21 separate identities per user.
The report from Radiant Logic and Gartner Peer Insights looks at the rapid growth of enterprise identity silos, and the explosion of user information, attributes, and credentials that accompanies it.
Dealing with the risks of online collaboration tools [Q&A]


The shift to working remotely has led to businesses relying increasingly on collaboration tools like Slack and Teams. But while these undoubtedly increase productivity they also introduce some extra risks.
We spoke to Brian Mannion, chief legal and data privacy officer at Aware, to find out about these risks and how enterprises can address them.
Why we need to make data integration obsolete [Q&A]


Nowadays there are apps for almost everything. As users they clutter up our phones and tablets, but they present problems for businesses too, in particular the storing and analysis of the data they create.
Data is often tied to a specific app and each app needs its own copy, so enterprises can end up with lots of copies of the same information leading to issues with control, compliance and more.
Ransomware variants almost double in six months


In the past six months, FortiGuard Labs has seen a total of 10,666 ransomware variants, compared to just 5,400 in the previous half year.
In addition ransomware-as-a-service (RaaS), with its popularity on the dark web, continues to fuel an industry of criminals forcing organizations to consider ransomware settlements.
Pssstt... Wanna buy an identity? The price of data on the dark web


We all know that stolen information is traded on the dark web, and new research by Trustwave looks at what is available and how much it costs. It also uncovers the additional services that are being offered to make it easier to commit fraud.
Details of a stolen credit card can be bought for as little as $8. Much more valuable though is a card with 'fullz' -- extra information on the victim that makes the card more usable. These can cost up to $70.
Real time data is a must-have for enterprises


Real-time data is a 'must-have' not just a 'nice-to have' according to 78 percent of respondents to a new survey into the data strategies of more than 500 IT leaders.
The study from DataStax finds real-time data pays off in two ways: it leads to increased revenue growth and improved developer productivity. For example, 71 percent of all respondents say that they can tie their revenue growth directly to having real-time data.
Almost half of businesses are struggling with cloud costs


A new report published today by business monitoring firm Anodot reveals 49 percent of businesses find it difficult to get cloud costs under control, and 54 percent believe their primary source of cloud waste is a lack of visibility into cloud usage.
The report, based on a survey of over 130 US-based IT directors and executives, shows 91 percent of respondents report they currently have IT infrastructure in the cloud, while 60 percent say that migrating more workloads to the cloud is their top cloud initiative in the coming year.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.