API attack traffic grows more than 300 percent


In the past six months overall API traffic has increased 141 percent but in the same time period, API attack traffic has grown by a startling 348 percent.
A new report from Salt Security reveals significant challenges in addressing API security, with all Salt customers experiencing API attacks, security topping the list of API program concerns, and very few respondents feeling confident they can identify and stop API attacks.
Cybersecurity skills crisis impacts more than half of organizations


The cybersecurity skills crisis has impacted 57 percent of organizations, according to the fifth annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and industry analyst firm Enterprise Strategy Group (ESG).
The survey of almost 500 security professionals finds the top effects of the skills shortage include an increasing workload for the cybersecurity team (62 percent), unfilled open job vacancies (38 percent), and high burnout among staff (38 percent).
Cloud migration shows no signs of slowing down


According to a new study 31 percent of companies have moved workloads to the cloud within the last six months compared to only 18 percent six months ago.
Based on a survey of almost 1,000 IT decision makers, the report from cloud migration specialist Next Pathway shows 36 percent are migrating to the cloud to prevent customers from leaving for more personalized solutions offered by competitors that are using the cloud to enable a superior digital experience.
Mainframe applications still key to business strategy


According to a new study from the IBM Institute for Business Value, 71 percent of executives surveyed say mainframe-based applications are central to their business strategy.
Also, in three years, the percentage of organizations using mainframe assets in a hybrid cloud environment is expected to increase by more than two times.
Cybercriminals work together to drive greater profits


Cybercrime is getting more organized than ever, as threat actors increase collaboration and adapt methods to drive greater monetization, selling access to breached systems to organized criminal groups and ransomware gangs.
The latest HP Wolf Security Threat Insights Report, reveals a 65 percent rise in the use of hacking tools downloaded from underground forums and file sharing websites between the second half of 2020 and the first half of 2021.
Businesses continue to struggle with app security


Threats to web, mobile and API-based apps are developing rapidly and the average time taken to fix them isn't improving, with critical vulnerabilities remaining open on average for 202 days.
NTT Application Security has released its latest AppSec Stats Flash report looking at the current state of application security and the wider threat landscape. It finds the utilities sector the worst, with with 66 percent of applications in the industry having at least one serious exploitable vulnerability throughout the year.
IT leaders think remote workers are more at risk but struggle to protect them


A new survey of enterprise IT security leaders shows almost 80 percent believe remote workers are at more risk from phishing attacks now because they're isolated from their organizations' security teams.
The study from Egress also reveals that more than 59 percent of respondents feel solutions such as video training (27 percent), email reminders (20 percent), and VPNs (12 percent), are sufficient by themselves to keep organizations safe from the biggest security breach fears: damage to brand and reputation, and legal jeopardy.
What to do after a ransomware attack [Q&A]


Ransomware is a major problem and ideally while you'd like to avoid being attacked, the chances are that at some point you're going to be a target.
So, what happens following an attack and what should organizations be doing immediately afterwards to lessen the impact? We spoke to Ed Williams, EMEA director of SpiderLabs at Trustwave, to find out and to get some tips on how to proactively secure against ransomware attacks in future.
Enterprise endpoint protection needs to move to zero trust


As enterprise boundaries have become more flexible, older authentication models of security have begun to look increasingly outmoded.
A new survey of 150 IT security decision makers carried out by ThycoticCentrify finds that 71 percent of contributors agree that a distributed workforce makes a zero trust security strategy even more critical.
Cyber attacks on council workers increase over 200 percent


Local councils have faced the same pressure as commercial businesses to have people working at home during the pandemic. But a new report shows attacks on UK councils' remote workers rose by 213 percent from March 2020 compared to the previous year.
Freedom of Information (FOI) requests made by technology solutions provider Insight, show that on average councils switched 74 percent of their employees -- more than double the UK average -- to remote working during the pandemic.
How streaming can help developers improve their handling of data [Q&A]


Data is increasingly important to companies, but making effective use of it presents a number of challenges.
NoSQL database company DataStax has recently launched its new Astra Streaming service. Based on Apache Pulsar this aims to make it easier for developers who want to run their application streaming alongside their database instances like Cassandra.
36 percent of organizations have suffered a serious cloud breach in the last year


A new survey of 300 cloud professionals finds that 36 percent of organizations have suffered a serious cloud security data leak or a breach in the past 12 months.
The study conducted by security and compliance automation firm Fugue and developer tools company Sonatype finds eight out of ten are worried that they're vulnerable to a major data breach related to cloud misconfiguration.
97 percent don't recognize the security limitations of containers


A new study finds that only three percent of respondents recognize that a container, in and of itself, is not a security boundary, suggesting that the default security capabilities of containers are overestimated.
The survey, from cloud security company Aqua Security of 150 cloud native security practitioners and executives from IT, Security and DevOps teams, across sectors and geographies, also shows that only 24 percent of respondents have plans in place to deploy the necessary building blocks for runtime security.
Over half of exploits sold on underground forums are for Microsoft products


A new study from Atlas VPN shows that 51 percent of exploits sold on underground cybercriminal forums are for Microsoft products.
Microsoft Office exploits make up 23 percent while Windows accounts for 12 percent of exploits sold on hacker forums. Remote Desktop Protocol (RDP) exploits make up 10 percent, with Internet Explorer and Share Point taking three percent each.
Stability is key to success of mobile apps


Stability is key to the success of mobile apps according to a new report from Bugsnag which shows that a drop of just one percent in stability can lead to a loss of a star in app store ratings.
Users rate apps on the Google Play and Apple App Stores based on their overall experience with factors like usefulness, design, engagement and stability. While the median stability across analyzed apps within the report is 99.8 percent, more stable apps are found to have a competitive advantage, resulting in higher ratings.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.