Cybercriminals move fast to exploit zero day flaws


The final quarter of 2021 saw a 356 percent growth in the number of attacks where the infection vectors were CVE or zero day vulnerabilities compared to Q3.
The latest Threat Landscape report from Kroll shows CVE/zero day exploitation accounted for 26.9 percent of initial access cases over the period, indicating that attackers are becoming more adept at exploiting vulnerabilities, in some cases leveraging them on the same day that the proof-of-concept exploit appears.
The impact of supply chain data breaches [Q&A]


Digital supply chain breaches are becoming more common, as supply chains increase in complexity so the attack surface grows and even smaller businesses can have complex webs of connections.
But how do supply chain breaches impact businesses? And what can they do to cut the risk? We spoke to Jeremy Hendy, CEO of digital risk protection specialist Skurio, to find out.
Investors get excited about 5G technology


We all know that 5G is set to shake up the technology world by offering faster, more reliable mobile data connections. But what aspects of the 5G world are proving attractive to investors?
New research commissioned by World Wide Technology (WWT) looks at the categories of 5G tech that are attracting venture capitalists and investors across the US and UK. Cloud computing comes out ahead, identified as the top category for investment by 72 percent of respondents.
When is the best time to buy a new smartphone?


The trouble with buying any technology is that whatever you lay down your hard-earned cash for today you can guarantee that something faster, cheaper and with more features is going to be along soon.
But the longer you wait the more you risk being left behind. UK-based reseller Buymobiles is looking to help break this vicious circle by doing some research into when is the best time to take the plunge and get a new handset.
Over 80 percent of employees admit accessing a previous employer's data


New research from multi-factor authentication specialist Beyond Identity finds that 83 percent of employees admit to maintaining continued access to accounts from a previous employer.
More worrying is that over half of these employees (56 percent) say they have used this continued digital access with the specific intent of harming their former employer. This figure jumps to 70 percent among those who had been dismissed.
Internet Society members' data exposed in breach


The Internet Society (ISOC) is one of the oldest and most important international non-profit organizations related to the internet, but that doesn't make it immune to problems and it's revealed today that ISOC members' details have been exposed in a data security breach
Independent cybersecurity researcher Bob Diachenko, in collaboration with cybersecurity company Clario, discovered an open and unprotected Microsoft Azure blob repository containing millions of files with personal and login details of ISOC members.
New adversaries add to already crowded threat landscape


The 2021 threat landscape has become more crowded as new adversaries emerge according to the 2022 Global Threat Report released today by CrowdStrike.
CrowdStrike Intelligence is now tracking more than 170 adversaries in total with 21 added last year. Financially motivated eCrime activity continues to dominate with intrusions attributed to eCrime accounting for 49 percent of all observed activity.
IBM helps enterprises move mainframe apps to the cloud


Many large enterprises have legacy systems running on IBM Z-series mainframe platforms. In order to help digital transformation efforts and modernize apps across hybrid environments, Big Blue is announcing a series of new capabilities.
Plans include delivering IBM Z as-a-service on IBM Cloud for development and test, as well as introducing additional tools for developing hybrid applications.
Companies are only aware of 17 percent of their open source components


A new report based on data from more than 100 open source audit projects conducted in 2021 finds that companies are only aware of 17 percent of the open source components they use, an increase of just four percent in the past year.
The 2022 State of the Software Supply Chain Report from Revenera also shows that risks are increasing.
Record number of vulnerabilities disclosed in 2021


Risk Based Security (RBS) has today released its 2021 Year End Vulnerability QuickView Report showing that a total of 28,695 vulnerabilities were disclosed last year.
This the highest number recorded to date. Now that the vulnerability disclosure landscape has moved past the COVID-19 pandemic, RBS predicts that the number of vulnerabilities disclosed will continue to rise year-on-year in future.
Controlling the costs of cloud deployment [Q&A]


Enterprises often turn to the cloud as a way of reducing their IT costs. But using the cloud by itself doesn't necessarily lead to savings, especially if there are no adequate controls in place.
We talked to Lenley Hensarling, chief strategy officer at real-time data platform Aerospike, to discover how the right management strategies can help rein in costs for public, private, hybrid, and multi-cloud deployments.
The challenge of managing and securing IoT devices in the enterprise [Q&A]


Internet of Things devices are making their way into more and more areas of our lives. But while they offer many benefits they also present businesses with a problem when it comes to managing and securing them.
An ever widening range of devices now have connectivity that may be off the radar of company IT and cybersecurity teams. We spoke to Roy Dagan, CEO of SecuriThings, to discuss the issue and how enterprises can tackle it.
Employees are working fewer hours and are more productive but still risk burnout


Employees now work fewer hours per day with greater efficiency, yielding a 40 percent jump in productivity, according to a new digital workplace report from ActivTrak Productivity Lab.
However, the findings also show that 34 percent of employees continue to be 'overutilized' at work, spending more than 75 percent of their time in this state. Only 62 percent of employees maintain a healthy balance of productivity to work hours, falling significantly short of the 80 percent goal the Productivity Lab recommends.
Increase in API use leads to security concerns


We increasingly rely on APIs to deliver the smooth sharing of information between applications. But their very functionality and ease of use is also a gift to attackers.
A recent report from Cequence Security shows that 80 percent, or 1.8 billion, blocked attacks between June and December 2021 were found to be API-based. At the same time APIs exposing sensitive data like payment (PCI) or personally identifiable information (PII) have increased by 87 percent.
Shortage of developers is major challenge to the software industry


The biggest challenge to the software industry this year will be recruiting developers with the right skills, according to 53 percent of developers and IT professionals responding to a new survey.
The study by business intelligence platform Reveal identifies other problems including struggles maintaining current talent (46 percent) and not enough time to get work done (31 percent). More than a third (40 percent) of software industry professionals are facing increased customer demands and 39 percent are working with limited resources including lack of budget.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.