article thumbnail

More than one-third of cloud environments are critically exposed, says Tenable

Network World

In the first half of this year, 38% of organizations had at least one cloud workload that was critically vulnerable, highly privileged, and publicly exposed, according to a study of telemetry from customers of cloud security vendor Tenable released this week. The cloud is a tool like any other; how you use it is what matters,” he said.

Cloud 505
article thumbnail

Threats delivered over encrypted channels continue to rise

Network World

Attackers are using encrypted channels to bypass traditional defenses, concealing malware, phishing campaigns, cryptomining/cryptojacking, and data theft within encrypted traffic. Malware dominates the landscape: Malware remains the most prevalent encrypted threat, representing 86.5% Case study: Learn how Wipro blocked 8.2M

Malware 366
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global cybersecurity talent gap widens

Network World

According to data in the 2024 Cybersecurity Workforce Study from ISC2 Research, the cybersecurity skills gap is continuing to widen globally. The security skill shortage isn’t unique to the U.S.

article thumbnail

DeepSeek and AI-Generated Malware Pose New Danger for Cybersecurity

SecureWorld News

A recent report from Tenable highlights how DeepSeek R1, an open-source AI model, can generate rudimentary malware, including keyloggers and ransomware. While the AI-generated malware required manual debugging to function properly, its mere existence signals an urgent need for security teams to adapt their defenses.

Malware 112
article thumbnail

IT downtime cuts enterprise profit by 9%, says study

CIO Business Intelligence

Downtime cost large enterprises an average of $200 million annually, cutting 9% from yearly profits, according to a study commissioned by Splunk. For the study, titled “The Hidden Costs of Downtime,” Oxford Economics quizzed executives from Global 2000 companies about the causes and costs of downtime in IT systems.

Study 298
article thumbnail

IDG Contributor Network: Major cloud is infested with malware, researchers say

Network World

Cloud repositories are actively supplying malware, according to computer experts. Hundreds of buckets have been undermined, says Xiaojing Liao, a graduate student at Georgia Tech who’s the lead author on a study that’s looking into the problem. And problematically, it’s insidious and hard to find.

Malware 283
article thumbnail

IDG Contributor Network: Network analysis can find malware before it strikes

Network World

Network traffic analysis should be used more in the fight against malware. The researchers, who have been studying historic network traffic patterns, say the latest malware tracking should take advantage of inherent network-supplied barometers and stop simply focusing on trying to identify malware code already on networks and machines.

Malware 236