A new draft of the UN Cybercrime Convention is set to face a key vote, and the Biden administration is reportedly set to support the treaty, despite criticism from digital rights organizations and human rights campaigners.
The convention is the first piece of legally binding legislation from the UN regarding cybersecurity, and its supporters hope to use it to establish a global framework for states to use to investigate and prevent cybercrime.
However, not only does Cisco think the treaty falls short of sufficiently protecting basic human rights, but some campaigners have said this convention will actually make it easier for authoritarian regimes to abuse their power and expand policing and surveillance.
Extensive deliberationUS officials confirmed there had been consultations with allied states and reviewed hundreds of written submissions from non-government organizations, and ultimately ‘decided to remain with consensus’.
A contributing factor to the support from the US was the need to influence later amendments and updates to the treaty, which would be made easier by support from the early stages.
A group of Democratic senators recently wrote the treaty could “legitimize efforts by authoritarian countries” to censor and surveil internet users and political activists.
“While the executive branch’s efforts to steer this treaty in a less-harmful direction are commendable, more must be done to keep the convention from being used to justify such actions,” the senators said in a joint letter to the Secretary of State, Attorney General, and others.
A primary concern for digital rights groups is that the treaty doesn’t focus on crimes committed against computer systems, such as ransomware. Instead, the legislation focuses on digital communication systems, and could be used as an extension of police surveillance powers rather than protecting internet users and companies from cybercrime.
Via Politico
You might also likeThe Falco Prime A2 is a high-performance, budget-friendly mini PC currently seeking funding on Kickstarter.
Designed for content creators, media enthusiasts and gamers, this compact powerhouse is equipped with an AMD Ryzen 9 7940HX processor, optional NVIDIA GeForce RTX 4060 or 4070 mobile graphics, up to 64GB DDR5 RAM, and dual NVMe SSDs for the operating system.
The main selling point of the Falco Prime A2 is the 8x M.2 SSD bay that supports up to 64TB storage with read speeds up to 10,000 MB/s, allowing users to handle massive media libraries and high-speed data access. It also supports up to three monitors for a customizable multi-screen setup suited for different tasks, and network support comes in the form of Wi-Fi 7 and dual 10Gb Ethernet.
RAIDThe mini PC offers two USB 3.2 Gen 2 Type-A ports (one front, one back), two USB 3.2 Gen 2 Type-C ports (one front, one back), and four USB 4 ports in the back for high-speed data transfer, along with a 3.5mm combo audio jack, and SD card and microSD slots for additional storage flexibility.
Users can configure RAID setups and choose between performance-boosting or redundancy options for the dual OS drives. The DDR5 RAM enhances data transfer rates and power efficiency, while a convection cooling system keeps the system running quietly and efficiently.
Early supporters on Kickstarter can secure the Super Early Bird price of $799 (a $500 discount from the $1,299 retail price), which includes the Ryzen 9 processor, RTX 4060M graphics, 32GB DDR5 RAM, and a 1TB SSD with the 8-slot SSD bay. Additional SSDs can be added to expand storage capacity further.
At the time of writing, the project has received $133,928 in pledges from 125 backers, well over the $5,000 goal, with 19 days to go. As with any crowdfunding project, backers should be aware that delays or changes to the final product can occur, and there's always a risk that the project may face challenges in production or fulfillment, so be warned.
You might also likeIn what would appear to be the beginning of the implementation of VPN-restricting legislation in Pakistan, many residents have reported issues accessing their VPN services. On Sunday, November 9, 2024, people in Pakistan lamented issues using the best VPN apps. After the initial silence, authorities later confirmed to local publications that this wave of restrictions was due to a "brief technical glitch" – VPNs returned working as usual by the end of the day – while reiterating the need for VPN providers to register their services in the country to avoid further disruptions.
The Pakistan Telecommunication Authority (PTA) announced plans to regulate the use of VPNs in August. The new legislation would aim to curb VPN misuse and security risks. Authorities deemed unregistered VPNs a "security risk" for Pakistan as they can be used to access "sensitive data."
Data from Proton VPN shows a huge spike in usage of the VPN service after other providers began experiencing issues. (Image credit: Proton)Proton VPN has since confirmed to TechRadar a spike in usage of over 350% above normal traffic following the reported VPN outages and connectivity issues (see graph above).
Virtual private network (VPN) services have become a crucial resource for day-to-day activities for many Pakistanis in 2024 thanks to their IP-spoofing capabilities which grant them access to otherwise geo-restricted content.
Authorities have enforced a strict grip on the internet throughout the year. Most notably, people in Pakistan haven't been able to access X (formerly known as Twitter) without a VPN since February, with VPN usage being often a target. Experts also believe that such an increase in censorship is the main cause of the decline of the country's internet.
Are VPNs illegal in Pakistan?While Pakistan is regulating the use of VPNs, these services are not illegal or completely banned.
As Dawn reported, VPN usage is permitted in Pakistan for legitimate purposes across various sectors, such as banking, foreign missions, corporate enterprises, universities, IT companies, call centers, and freelance professionals.
Authorities are urging companies operating in the aforementioned sectors to complete the VPN registration with PTA as soon as possible. Failing to do that could mean further service interruptions in the future. At the time of writing, over 20,000 VPN IP addresses have been already registered in Pakistan since 2020, according to authorities.
(Image credit: Future)While the VPNs affected by Sunday throttling returned to work as normal by the end of the day, there's a bitter irony in considering that this "technical glitch" occurred just a few days after Pakistan's Prime Minister shared a post on X – a platform that has had disrupted access in the country since February – to congratulate US President-elected Donald Trump.
If you are based in Pakistan, or planning to visit the country soon, I recommend checking out our best free VPN page to download as many of the most secure freebies out there. Having more than a VPN app could be beneficial in these instances as you can hop between services in case one gets blocked.
Tor browser is another valid alternative. Completely free to use, Tor is supposed to be even more secure than VPNs as it encrypts your connection in at least three layers of protection. Beware that this extra encryption might slow down your performance a little.
It's been a busy month for the best streaming services: this time of year is when we start to stay in and stream more, and to cater for that there are tons of new things to watch on all the major streamers. Prime Video and Max have added loads of new stuff this month – but if like us you're saving your pennies for Black Friday deals and the holidays, subscribing to all the streamers isn't really an option. So, which service should go this month?
Amazon's streaming service has been particularly busy on the movies front, with over 200 new titles coming to Prime Video this month. Max has been busy too, but Max's November 2024 schedule is much more focused on TV shows: it's got just over two dozen new movies to Prime Video's 200. There are some crackers in there – Goodfellas, Elf, Unforgiven and three Jurassic Parks, for example – but Prime Video clearly has the movie magic this month.
Here are five Prime Video movies that more than justify this month's subscription.
Carrie (streaming now)Carrie is one of the best horror movies ever made. One of Stephen King's best books, one of Brian DePalma's best movies and one of Sissy Spacek's best performances combined in the original 1976 movie, a stone cold horror classic about a tormented girl and her terrible revenge. The 2013 remake is available to stream on Prime Video too, but the original is much better: the sequel barely cracked 51% on the Rotten Tomatoes tomatometer, whereas the original has a well deserved 94%.
As The New Yorker's legendary critic Pauline Kael put it, the film is "a terrifyingly lyrical thriller... Brian DePalma has mastered a teasing style – a perverse mixture of comedy and horror and tension, like that of Hitchcock or Polanski, but with a lulling sensuousness. He builds our apprehensions languorously, softening us for the kill."
Good Will Hunting (streaming now)Good Will Hunting stars Matt Damon as a young, headstrong kid and Robin Williams as the professor who takes him under his wing. So far so predictable. But the performances here are something special, with Williams in particular bringing a depth and a darkness that isn't always there in his other twinkly-eyed roles (and if you want to see an even darker side of him, his performance alongside Ed Norton in Death to Smoochy, is incredible too. That's a rental right now).
This film is beloved for good reasons: as RogerEbert.com put it, it's "lyrically directed, efficiently written, side-splittingly funny, quietly devastating." I love Vice's review, which says that "It's a movie that captures (in a way that perhaps an older screenwriter could not convey) the limitless possibilities of youth, a movie in which a character can tell another, without cynicism, 'You could do anything you want. You are bound by nothing.'"
Jacob's Ladder (streaming now)I've seen many terrifying things on my TV. Slasher movies. Gratuitous gore. Paw Patrol. But nothing has given me nightmares like Jacob's Ladder. Forget the remake: Prime Video has the 1990 original, where Tim Robbins delivers an incredibly unsettling performance as a veteran experiencing horrors at home. Amazon's three-word summary – "cerebral / emotional / frightening" – doesn't do it justice; this is a film that had me variously sobbing and hiding behind the sofa, and it's no less powerful today.
Here's the Seattle Times: "For hours and days after you've seen it, you'll still be putting it together in your head. While all of it is gripping, it doesn't come together until the final scene, which is jolting, transcendent, unexpected yet inevitable." There's a speech by one of the characters, Louis (Danny Aiello), that'll stay in your head for years.
The LEGO Movie (streaming now)As a parent, I'm used to enduring cynical cash-ins spun off from big-selling toy brands. But long before Barbie, The LEGO Movie showed just what you can do with a big heart as well as a big brand. In The LEGO Movie, everything really is awesome.
Writing on io9, Charlie Jane Anders explains: "The Lego Movie is both a perfect satire of noisy toy-driven summer action movies, and also an absolutely perfect summer movie in its own right." Alternative Lens called it "an instant animated classic". And as Katey Rich of Vanity Fair wrote in a pre-Barbie age, "It's one of the few movies based on a toy with no explicit story behind it. And it is, so far, the only one that's really good."
Coraline (streaming from 24 November)Writer Neil Gaiman has been credibly accused of abusive behavior, which has tarnished the work he's been involved in – even though that work has typically been the product of talented teams, not just Gaiman. Henry Selick's adaptation of his book is an absolutely beautiful and sometimes utterly terrifying classic, and it's one of the greatest stop-motion movies of all time. If you didn't catch the 15th anniversary re-release in theaters this year then this will be an absolute treat: it's visually breathtaking, utterly thrilling and surprisingly scary for what's officially a kids' movie.
As Empire says, it's a true horror movie: "Terrifying and beautiful, believable and fantastical, this is one of the best children’s films in years and Selick’s finest — better even than The Nightmare Before Christmas."
You might also likeMicrosoft's recent launch of Windows Server 2025 appears to still be causing aftershocks after many companies said they were automatically upgraded to the new software.
Multiple Windows Server 2019 and 2022 systems were reportedly unexpectedly upgraded to Windows Server 2025 overnight, and Microsoft and third-party patch management service providers are now shifting blame amongst themselves.
The bug now finally appears to be fixed, but Microsoft is yet to explain to its customers how the upgrade can be rolled back.
Procedural error"Some devices upgraded automatically to Windows Server 2025 (KB5044284). This was observed in environments that use third-party products to manage the update of clients and servers," Microsoft explained. "Please verify whether third-party update software in your environment is configured not to deploy feature updates. This scenario has been mitigated."
In other words, it’s not Microsoft - it’s you. The company also added the update had the "DeploymentAction=OptionalInstallation" tag, which patch management tools should read as being an optional, rather than recommended update.
Upgrading to a brand new operating system comes with many questions and risks, and in this case, some companies didn’t even have the necessary license.
Microsoft didn’t name any names, but BleepingComputer found many of Heimdal’s clients were affected by the issue. The company blamed the bug on a “procedural error on Microsoft’s side, both with the speed of release and the classification.” In total, 7% of its customers received the unwanted upgrade. At press time, there were no details on how to roll the update back.
KB5044284 is a cumulative update, part of Microsoft’s Patch Tuesday effort, and Windows Server 2025 was supposed to be an optional update.
This optional update is, in fact, the latest release in Microsoft's Windows Server lineup, introducing several advanced features designed to improve security, performance, and hybrid cloud capabilities. Notable features include hotpatching, enhanced storage and GPU support, and stronger AI and machine learning capabilities.
You might also likeFull spoilers follow for Arcane season 2 act 1.
Are you desperate to fill the week-long gap between the multi-episodic releases of Arcane season 2? I can't imagine you've answered anything but an emphatic "yes" to that question.
Well, as the excruciating wait for the next batch of episodes to drop on Netflix goes on, the streaming titan has delivered some new Arcane content for you to consume. An official after show, titled Afterglow, has just debuted on YouTube – indeed, episode 1 is available to stream today (November 12) on YouTube and it provides a peak behind the curtain on some of this season's most important and emotionally stunning moments, as well as season 2 act 1's explosive ending.
Clocking in at just over 12 minutes, the behind-the-scenes look at one of the best Netflix shows' second season is hosted by Hailee Steinfeld and Ella Purnell, who Arcane fans will recognize as sisters Vi and Jinx, aka the series' deuteragonists. For anyone unfamiliar with the actors or the characters they play – why would you be reading this if you weren't? – you can learn more in my Arcane season 2 cast and character guide.
But I digress. Episode 1 sees the stars joined by co-creator Christian Linke in a real-world recreation of The Last Drop, the famous drinking establishment that sits in the center of the undercity known of Zaun. As part of Afterglow's premiere, the trio run through some of episode 1 through 3's biggest moments, including discussions surrounding Jinx and Sevika's burgeoning friendship, the breakdown of Jayce and Viktor's partnership, Ambessa's motivations, and that huge season 2 scene involving Caitlyn and Vi – a scenario Link exclusively told TechRadar that the creative team "couldn't have done" in season 1.
EVERYONE SHUT UP IT'S THE CAITVI KISS pic.twitter.com/CcsESTL63mNovember 10, 2024
"The fans have been waiting for this," Steinfeld said of Caitlyn and Vi's long overdue kiss. "More importantly, [we knew] that Vi and Caitlyn were going to get this moment. We know that they see and understand each other, and they want that intimacy. But, it's very difficult for them to have, given the circumstances they're in.
"The dialog before that [kiss] says it all," Steinfeld continued. "Vi's in a place where she's lost everything she's ever been seen by, or been close to. The only way she has any of it left is through Caitlyn, and she's now asking a lot of her [Caitlyn] and to not change, given what she [Caitlyn] is now going through. I think it unlocks this newfound vulnerability [in Vi]... there's such a pay off of 'we are in that moment'. It's not just another kiss. It's a really beautiful scene that means a lot."
"So many people around her have changed," Linke added. "She's also seen Caitlyn, like, suddenly become this dogged leader, so I think Vi is really scared to commit because she's lost people so often. Is Caitlyn going to be another one for her [to lose]? So, it's a really fragile moment for Vi, because she's such a powerhouse."
Alongside other intriguing conversational points, Afterglow episode 1 also gives fans a glimpse at what's to come in season 2's next three episodes. Having seen episodes 4 through 6 – read my Arcane season 2 review for more teases about what's on the way – let me say that nobody is prepared for how epic and emotionally devastating season 2 act 2 will be. Make sure you have a box of tissues handy, everyone, because they made me cry more than once (yeah, I'm not afraid to admit it!).
With two more parts comprising three entries apiece, there'll be more Afterglow episodes coming soon, too. Another behind-the-scenes look at the League of Legends TV adaptation will be released on Tuesday, November 19, and it'll cover chapters 4 to 6. Afterglow episode 3 will debut a week later on November 26, with that installment examining what happens in the series' final three episodes.
In the meantime, read more of my coverage on Arcane season 2 below – and check back in with TechRadar this weekend (November 16 and 17) for even more from my exclusive chat with Linke and co-showrunner Alex Yee.
You might also likeTwo hacking groups have been recently observed working together to infect a victim - one to establish initial persistence and steal information, and one to encrypt the systems and demand a ransomware payment.
Researchers from Kaspersky recently investigated one such incident in Colombia, where the unnamed company first got infected by RustyStealer, an infostealing malware capable of grabbing login credentials, sensitive files, and more.
This part of the attack was likely conducted by one set of criminals who, once their part was done, handed the access over to a second group.
Single actor?The second group first made sure its encryptor doesn’t trigger any antivirus or antimalware alarms. To that end, they installed different tools, such as Process Hacker and AdvancedIP Scanner. “Eventually, after reducing system security, the adversary ran Ymir to achieve their goals,” the researchers conclude.
Ymir is the name of both the encryptor and the threat actor behind it, and is also a relatively new entrant in the ransomware space. The malware is quite unique, too, in that it operates entirely from memory, taking advantage of different functions such as ‘malloc’, ‘memove’, and ‘memcmp’ to prevent being detected.
While teamwork is not a foreign word in the world of cybercrime, there is also a slight possibility that this entire operation was done by a single actor. In that case, it would mark an entirely different approach to ransomware attacks, and possibly a notable shift in how ransomware attacks are conducted.
"If the brokers are indeed the same actors who deployed the ransomware, this could signal a new trend, creating additional hijacking options without relying on traditional Ransomware-as-a-Service (RaaS) groups," Kaspersky researcher Cristian Souza said.
In any case, it is possible that Ymir will grow into a formidable threat actor, infecting more companies in the months to come.
Via The Hacker News
You might also likeCISOs face the always challenging task of ensuring their cybersecurity investments yield maximum returns. With limited budgets, an influx of new security tools, complex third-party relationships, and ever-changing regulatory requirements, it’s essential to adopt best practices that optimize security spending while effectively mitigating risks.
To help CISOs get the most out of their cybersecurity investments, it's essential they can focus on maximizing upfront spending, prioritizing risks, and establishing clear communication with the board. Having the right security capabilities can ease this process. By putting cybersecurity at the center of business operations, CISOs can serve as the point of connection between both.
Maximize upfront security investmentsOne of the foundational steps to maximizing cybersecurity ROI is to leverage an integrated security approach by consolidating multiple security tools into an integrated framework. This not only reduces the complexity of managing disparate tools but also enhances the efficiency of security operations. For example, adopting an integrated security platform can streamline monitoring, detection, and response processes, providing a comprehensive view of the threat landscape and supporting faster mitigations and incident resolutions.
As one example, Application Security Posture Management (ASPM) platforms are a key way to maximize cybersecurity ROI across Product and Software security as they streamline security processes, providing comprehensive visibility across applications and security gaps. ASPM platforms help organizations break down security silos, facilitating a unified approach to threat detection, risk management, and compliance.
In addition, tools that help with automation play a critical role in maximizing the value of security investments. Automated systems can offer continuous monitoring and real-time threat detection, capabilities that human teams alone cannot sustain. By handling routine tasks such as log analysis, compliance reporting, and initial threat triage, automation frees up time for security teams to focus on strategic activities. This not only enhances operational efficiency but also reduces the risk of human error and fatigue. The level of automation is critical; it must optimize operations without introducing new complexities or risks.
Address the highest risks firstPrioritizing risks is crucial for achieving the highest ROI from security investments. Given the sheer volume of potential threats, organizations must focus on the most impactful vulnerabilities first. Advanced analytics and AI can provide clear, actionable insights, allowing security teams to identify and address the highest risks first.
One practical approach is to use threat intelligence to inform risk management strategies. Threat intelligence involves collecting and analyzing data on current threats, including indicators of compromise (IoCs), tactics, techniques, and procedures (TTPs) of threat actors, and profiles of cybercriminal groups. This information enables organizations to anticipate and mitigate threats proactively, reducing the likelihood of successful attacks and minimizing potential damage.
In reviewing the ideal approach to application security and ASPM, it is crucial to adopt a three-dimensional perspective on threat management. First, organizations should consider the severity of potential vulnerabilities (CVEs), ensuring to prioritize those that pose the greatest risk. Second, it is vital to assess whether these vulnerabilities are being actively exploited, which adds urgency to remediation efforts. Finally, security responses must be aligned to the unique business context of each threat and its potential damage. This nuanced understanding helps to assess and prioritize the risks that matter most to each organization while saving time and resources by avoiding taking unnecessary actions.
As a part of that final step, conducting regular security audits can also help identify and prioritize vulnerabilities. Audits involve comprehensive evaluations of an organization’s cybersecurity policies, procedures, and systems to ensure they are effective and compliant with regulatory requirements. Key elements of a security audit include risk assessments, policy reviews, penetration testing, and vulnerability scans. These activities provide a roadmap for enhancing an organization’s security posture and addressing critical risks.
Enhance communication with the boardEffective communication with the board is essential for aligning cybersecurity initiatives with broader business goals. CISOs must translate complex security data into easy-to-understand metrics and visualizations that highlight the value of a security investment. This involves identifying key performance indicators (KPIs) that resonate with board members and demonstrate how cybersecurity efforts contribute to an organization’s overall success and risk management posture.
One strategy is to present metrics that reflect the financial impact of security measures, such as more seamless product rollouts, heightened customer experiences from frictionless access, above and beyond cost savings from avoided breaches or other efficiencies gained through automation. Additionally, highlighting how security initiatives support compliance with regulatory requirements can underscore the importance of an organization’s legal and financial standing.
Using storytelling techniques can also enhance board communication. By framing security updates within the context of real-world incidents and potential business impacts, CISOs can make the information more relatable and compelling. This approach helps board members understand the significance of cybersecurity and the need for ongoing investments in this area.
Bridging future security and business goalsTo truly maximize the ROI of cybersecurity investments, organizations must adopt a forward-looking approach that anticipates future threats and business needs. This means investing in technologies that provide scalability and flexibility—comprehensive solutions that take into account cloud-based security and AI-driven threat detection systems, which can adapt to changing business environments and evolving threats.
The path to maximizing cybersecurity returns takes ongoing focus. It demands a dedication to integrating state-of-the-art technology, fine-tuning risk management strategies, and improving communication with key stakeholders. By taking these steps, organizations will feel empowered to safeguard their assets and bolster their business growth—and resilience—for the years to come. Looking ahead, it’s no mystery that the need to unify security approaches with business goals will grow even more important, placing the CISO role at the center of business success.
We've featured the best encryption software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Netflix has renewed one of my favorite docuseries America’s Sweethearts: Dallas Cowboys Cheerleaders for a second season, so BRB, just going to blast their pre-game routine song (Thunderstruck by ACDC) through my speakers right now.
America's Sweethearts: Dallas Cowboys Cheerleaders spent four weeks in the Netflix global top 10 list when it was released in June and earned a stellar 100% Rotten Tomatoes score, making it one of the best Netflix shows.
The best streaming service announced that the DC cheerleaders would be back for more sass and splits in 2025 with a video of the squad performing a cheer routine in their iconic blue and white uniforms.
DCC SEASON TWO WOO! The cheerleaders and the routine that captivated the world are coming back for Season 2! AMERICA’S SWEETHEARTS: Dallas Cowboys Cheerleaders returns in 2025. pic.twitter.com/H2DqDyn2DiNovember 11, 2024
What can we expect in America's Sweethearts: Dallas Cowboys Cheerleaders season 2?Netflix Tudum has revealed that America’s Sweethearts: Dallas Cowboys Cheerleaders season 2 "will chronicle the Dallas Cowboys Cheerleaders from nerve-wracking auditions and grueling training camp all the way through the high-energy NFL 2024–25 season".
If it's anything like season 1, we can expect high kicks and high emotions as the cheerleaders navigate their careers and personal lives while committing themselves to the cheerleading squad. It looks like we'll be seeing some of our fan-favorites return for season 2 and we could potentially see some former faces come back and audition once again to become a member of the team.
While America’s Sweethearts: Dallas Cowboys Cheerleaders delves into the competitive world of the legendary cheerleading team, it also exposes the young womens' struggles and emotional battles as they fight for their dream of securing a coveted spot on the squad.
The best Netflix documentary left me amazed at the utter dedication, physical stamina and technical skills needed to become a DC cheerleader. Having to learn 50 routines while juggling a personal and professional life is definitely something I would struggle with, but that's just a regular day for the Dallas Cowboys Cheerleaders. Bring on 2025!
You might also likeIn today's digital age, it's becoming more common to hear phrases like "Our systems are down," whether you're at a school, doctor's office, or company office. This isn't just a technical glitch, it's often a symptom of the rising wave of cyberattacks, particularly ransomware. These disruptions aren't just inconvenient. They can lead to significant financial and operational losses. Despite efforts by government regulators to address these concerns, ransomware attacks are becoming more sophisticated, especially as attackers leverage artificial intelligence to amplify their tactics.
To better gauge the fallout of these attacks, we surveyed 500 senior cybersecurity professionals across the UK and found that 83% of organizations had experienced ransomware attacks in the last year, with 46% reporting four or more incidents. Furthermore, 61% of businesses affected by ransomware reported being offline for at least 24 hours. For large enterprises, this level of downtime can translate to losses in the millions of pounds.
The data underscores the urgency of addressing these threats with more effective, comprehensive cybersecurity strategies.
ERP systems are a blind spotOne of the most concerning findings from the research is the vulnerability of enterprise resource planning (ERP) software to ransomware attacks. ERP systems are critical to modern business operations, managing everything from financial data and human resources to supply chains and customer relationships. Unfortunately, 89% of organizations that experienced ransomware attacks reported that their ERP systems were targeted. Given that ERP systems house a company’s most sensitive and essential data, this vulnerability represents a significant blind spot in many organizations' cybersecurity defenses.
The challenge is compounded by the fact that ERP systems are often managed separately from other IT infrastructure, which can lead to gaps in protection. Cybersecurity teams may focus on securing a broader network, while ERP administrators concentrate on ensuring system performance and uptime. This lack of coordination can create vulnerabilities that cybercriminals are eager to exploit
AI multiplies attack impactAs ransomware becomes more prevalent, attackers are increasingly leveraging AI to enhance the sophistication of their attacks. AI allows cybercriminals to automate and scale their operations, targeting specific systems like ERP with precision. For example, cybercriminal organizations are using AI-driven phishing tactics to target high-level government officials and businesses to bypass traditional defenses, using cloud platforms such as Dropbox and Google Drive to deliver malicious payloads.
The use of AI in cyberattacks also opens the door to more complex manipulations, including the creation of deepfakes and highly personalized phishing emails. These tactics deceive even experienced cybersecurity professionals, highlighting the need for more advanced defensive measures. The traditional approaches to cybersecurity, which often focus on perimeter defenses, access controls, and identity management, are no longer sufficient.
Businesses investing in new solutionsSurvey data indicates that just over half of companies are enhancing their security postures: 57% are investing in new solutions, 54% are prioritizing employee training, 53% have added more cybersecurity staff internally, and around 36% have hired external threat research firms. While these measures represent a positive shift, they are only part of the solution. To fully address the growing complexity of cyberattacks, companies must move beyond general cybersecurity measures and incorporate ERP-specific threat detection and response into their broader strategies.
Traditionally, many organizations have viewed ERP security as secondary to more visible components like network or endpoint security. This mindset needs to evolve. ERP systems are built on top of very complex technology, that if not managed properly can be just as vulnerable, if not more, than other components of the IT landscape, due to the sensitive nature of the data these business critical applications store. Continuous monitoring for vulnerabilities is essential, as is the use of AI-driven tools to detect suspicious behaviors before they escalate into more severe threats. A comprehensive ERP security strategy must also include advanced threat intelligence to stay informed of emerging risks and respond to them swiftly.
A critical aspect of defending ERP systems involves better alignment between cybersecurity teams and ERP administrators. These groups must collaborate closely to identify and close security gaps that attackers often exploit. Given the integral role ERP systems play in a company's overall operations, ensuring that these two teams work together to monitor and defend these systems is vital for minimizing risks and preventing potential breaches.
The path forward: Using AI to fight AIAs the threat landscape evolves, solution providers in the cybersecurity space are offering increasingly advanced AI-driven tools that can help organizations safeguard their ERP systems. These tools can automate the detection of vulnerabilities, offer real-time threat intelligence, and provide pre-emptive patching solutions. Additionally, AI-enabled security solutions can help organizations detect patterns and behaviors that indicate cyberattack, allowing them to respond more quickly and effectively. This is particularly important in ERP environments, where a delay in response could lead to massive operational downtime and data loss.
While technology will undoubtedly play a key role in defending against AI-enhanced ransomware, it’s equally important for organizations to foster a culture of cybersecurity awareness. Employees should be trained to recognize the signs of phishing and social engineering attacks, as many ransomware incidents begin with seemingly innocuous emails or links. By combining advanced technological solutions with continuous employee education, organizations can better protect themselves from evolving threats.
Looking ahead, AI will play a dual role in cybersecurity, both as a tool for cybercriminals and as a key part of the defense strategy. To protect critical systems and sensitive data, businesses must adopt advanced, multi-layered security solutions that can detect, prevent, and respond to AI-enhanced threats. By taking a proactive approach, organizations can not only safeguard their operations but also ensure long-term resilience in an increasingly hostile cyber environment.
We've featured the best business VPN.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
American debt services company Set Forth has confirmed suffering a data breach incident in which sensitive information on more than a million people was stolen.
In a data breach notification letter sent to affected customers, the company said it identified “suspicious activity” on its systems on May 21 2024.
After implementing its incident response protocols, and engaging third-party forensic experts which investigated the incidents, the company determined that some personal information from its customers, as well as their spouses, co-applicants, or dependents, was stolen.
Defending the premisesThe data stolen in the attack includes people’s names, postal addresses, birth dates, and social security numbers. In a subsequent filing with the Office of the Maine Attorney General, Set Forth confirmed that 1.5 million people were affected by this breach.
At press time, there was no information on who might have stolen the archives. No threat actors have yet assumed responsibility for the break-in.
To prevent similar incidents from happening in the future, Set Forth outlined a number of implementations, including enhanced endpoint monitoring, a global password reset, and additional security controls. Furthermore, the company is now offering identity theft protection services for affected individuals for 12 months, through Cyberscout.
“Again, at this time, there is no evidence that your information has been misused. However, we encourage you to take full advantage of this service offering,” Set Forth concluded in its letter.
In the meantime, multiple law firms have started looking into the matter, to see if there is grounds for a class-action lawsuit.
Via Cybernews
You might also likeThe European Commission – the executive arm of the European Union – has warned Apple to desist from geo-blocking activities that it calls “discriminatory”.
In a press release posted to the official European Commission website, the Commission warned Apple to discontinue its practice of blocking Apple Media Services content based on where a user lives.
Apple Media Services comprises Apple’s digital storefronts and streaming services, and includes the App Store, Apple Arcade, Music, the iTunes Store, Books, and Podcasts.
It’s no secret that Apple tailors and restricts the content delivered through these services to specific national and regional markets, but this is rarely considered a form of discrimination.
However, the European Commission and the EU’s Consumer Protection Network have now notified Apple that these actions could contravene two EU regulations.
The EU’s Geo-blocking regulation forbids “unjustified discrimination” against an EU customer based on nationality, residence, or place of establishment when providing goods or services to customers in a different member state.
The Services Directive contains similar protections that forbid discriminatory provisions based on a customer's nationality or place of residence.
Apple is, seemingly, generally loathe to cooperate with authorities if it can avoid doing so – see the company’s long history with the FBI – but the EU has managed to twist the arm of the world’s erstwhile most valuable company before.
It’s generally accepted that pressure from the EU was the main reason Apple switched to USB-C from the proprietary Lightning port. Though the rest of the mobile industry had long-since switched to USB-C, the Lightning port served as a valuable source of revenue for Apple through first-party sales and the “Made for iPhone” licensing scheme.
However, the EU announced regulation in 2022 forcing all device makers to adopt USB-C by the end of 2024, to reduce e-waste – Apple complied with the iPhone 15 lineup in 2023. Furthermore, the EU has successfully forced Apple to enable sideloading of apps and third-party App stores on iPhones sold in Europe.
We’ll probably see Apple fall in line with these regulations again, though there could be some consequences down the road – Apple Intelligence is still missing from EU iPhones, and Apple could continue to withhold features as retaliation for strong regulations. This is mostly conjecture at this point, though.
Apple has been given one month to reply to the European Commission, with suggestions on how to alleviate its own geo-blocking practices. Until then, be sure to keep up with our iPhone coverage for the latest updates.
You might also likeKonami has revealed that Metal Gear Solid Delta: Snake Eater was made for the younger generation who might be unfamiliar with the series.
Speaking in the latest Play issue (via GamesRadar), Metal Gear series producer Noriaki Okamura explained that the studio noticed that some new and younger gamers were unacquainted with the iconic series, which originally sparked the idea to remake Metal Gear Solid 3: Snake Eater.
"One of the things that really sparked us to do the remake in general is because we realized that a lot of the newer, younger generation of gamers aren’t familiar with the Metal Gear series anymore”, Okamura said.
The original game was released 20 years ago in 2004, but Okamura said that although the upcoming remake is as much for the old-time fans as new ones, Konami also wants to preserve the series for future generations.
"It was basically our mission, our duty, to kind of continue making sure that the series lives on for future generations," Okamura continued. "After all, we leave behind much more than just DNA, as Solid Snake would say - but again, who is Solid Snake?"
Metal Gear Solid Delta: Snake Eater doesn't have a release date just yet, but we know it will be launching in 2025 for PS5, Xbox Series X|S, and PC.
Konami has also confirmed that all original voices from the 2004 Metal Gear Solid 3 will be used in the remake.
You might also like...Max is the next streaming service hoping to put a stop to password sharing among subscribers. Warner Bros. Discovery (WBD) confirmed the password-sharing crackdown plans earlier this year and has since revealed when we can expect to learn more about when the new account restrictions will start to be enforced.
This news comes after a Max price hike, which saw an increase of $1 a month and $10 per year in June 2024. The streamer's proposed password-sharing crackdown is essentially another form of a price rise, and more may be on the way over the coming months.
If you're subscribed to some of the best streaming services, you'll be all too familiar with their efforts to crack down on password sharing. Netflix's password-sharing clampdown began in May 2023 and was followed by the Disney Plus password-sharing crackdown in Canada, the US, and UK (alongside Hulu in the US) in September 2024.
So, if you want to continue watching the best Max shows and best Max movies, you'll want to know when these changes might take effect and what they'll involve, which we'll go into below. We'll be updating this article as soon as we have more up to date information regarding Max's password crackdown plans.
What are the Max password sharing rules? (Image credit: Max)Max is in the early stages of implementing a password-sharing crackdown. We learned more about Max's password-sharing crackdown in November following WBD's earnings call, where the company's CEO of streaming JB Perrette said that it would start to share some "very soft messaging" later in December 2024.
We don't have a confirmed date for when the changes will officially take effect, but Perrette did say that more progress on the crack down would occur during 2025 and 2026, so we can expect to hear more about when the changes will be enforced soon.
How will Max stop password sharing? The Penguin is one of the critically acclaimed shows you can stream on Max. (Image credit: Macall Polay/HBO)Max has not yet given clear guidance, but it has previously noted how well Netflix implemented the changes with its own service, so it is likely they will adopt a similar format to ensure people from different households aren't sharing the same accounts.
Speaking at Morgan Stanley’s Technology, Media & Telecom conference in March 2024, WBD head of global streaming and games JB Perrette said: “We’re launching in a bunch of European markets as we go into the second and third quarter.
"And password sharing crack down, which, obviously, Netflix has implemented extremely successfully. We’re going to be doing that starting later this year and into ‘25, which is another growth opportunity for us.”
How much is Max charging for password sharing? Dune: Prophecy is a prequel to the epic sci-fi movie series and a Max exclusive. (Image credit: Max)Max hasn't enforced the restriction yet, but Max does have a more expensive tier called "Ultimate Ad Free", which allows you to stream on four devices at once in the same household, so provided you're living together, you'll be able to share the account with up to four other people.
The Max plan costs $20.99 per month or $209.99 per year. This is the highest of the available tiers, as the cheapest is "With Ads" for $9.99 per month or $99.99 per year or "Ad-Free" at $16.99 per month or $169.99 per year – both of which only let you stream on two devices at the same time.
As well as the ability to stream simultaneously with other household members, there are other benefits that come with the higher price tag, so it might be worth it if you use Max often.
These include the ability to stream in 4K Ultra HD video quality and Dolby Atmos immersive audio, but these are as available on selected titles so there's no guarantee every title in the library will be compatible with high definition streaming. You can also have up to 100 downloads to watch on the go if you're traveling and need to stream offline.
What if I subscribed through a bundle from another company? All eight seasons of Game of Thrones are on Max. (Image credit: HBO)We are anticipating that all Max subscribers will be affected by the change, if it will be following Netflix and Disney Plus' password crackdown models. That means that the Disney Plus, Hulu, and Max mega bundle will also be impacted by the new account restrictions when these are enforced.
What if I want to use my Max account on holiday, or if I'm travelling for work? Max can be watched on the go via the app. (Image credit: Chris Delmas)We don't know about Max's plans around this yet. At the time of writing, if you want to stream Max content while you're abroad, you can only do so if it is available in the country you're visiting.
The service is now accessible outside of the US. It's available in Europe, except the UK, Latin America and the Caribbean. It's also expected to arrive in Australia in the first half of 2025. For a full list of all the countries, visit the help page on Max's site to find where it's available.
Will Max let me use a VPN? Proton VPN is available in 110 countries. (Image credit: Proton)Max, like other streaming services does block known IP addresses associated with some VPN networks, so it is not always guaranteed that you can stream using one.
If you are considering trying one of the best VPNs, you should be aware that it's a potentially risky move, and what works today may well be blocked tomorrow.
Halliburton confirmed the ransomware attack which recently hit the company cost the business $35 million in losses.
The oil giant shared the news via a quarterly financial report, filed with the US Securities and Exchange Commission (SEC).
In late August 2024, the company reported discovering an unauthorized third party in its systems, which forced it to take certain systems offline. As a result, its operations were limited, and certain clients disconnected, causing the company to lose millions of dollars.
Stealing dataSoon after the breach was announced, a threat actor called RansomHub assumed responsibility for the attack. This group gained notoriety after the Change Healthcare breach, having been confirmed as the affiliate that forced the healthcare giant to part ways with more than $20 million in ransom.
Unfortunately for the hackers, they never saw any of that money, since the ransomware’s operators, ALPHV, took all the loot and disappeared into the digital wilderness.
Still, RansomHub said it stole sensitive data from Halliburton, something the company also confirmed in a subsequent 8-K form. However, there is no word on the type of data stolen, or its amount.
"We experienced a $0.02 per share impact to our adjusted earnings from lost or delayed revenue due to the August cybersecurity event and storms in the Gulf of Mexico," commented Jeff Miller, Chairman, President, and CEO at Halliburton.
"Our full year expectations for free cash flow and cash return to shareholders remain unchanged, and we expect both to accelerate in the fourth quarter."
Halliburton is a global American multinational corporation that provides products and services to the energy industry, especially in oil and gas exploration, development, and production. It is present in more than 70 countries, and earns more than $20 billion in revenue. It currently employs more than 45,000 people.
Via BleepingComputer
You might also likeBreach notification site Have I Been Pwned has confirmed the personal data of 56,904,909 users was found online, leaked from Hot Topic, Torrid, and Box Lunch customers.
Threat actor ‘Satanic’ claimed responsibility for the breach, which was allegedly carried out through an infostealer infection, and made possible by weak security practices.
The dataset is reportedly on sale for $20,000 (although this has since been lowered to $4,000) and the hackers are demanding a $100,000 ransom from Hot Topic to remove the listing from the forums. Apparently, no notifications have been sent to customers as of yet.
Risk of identity theftThe leak reportedly occurred on October 19, but the data spans back all the way to 2011, so if you’ve used the Hot Topic website since then, we recommend being vigilant with your information just in case.
The data is said to have included email addresses, encrypted credit card numbers, physical addresses, and email addresses.
Reports suggest an employee's device was infected with malware, which resulted in the theft of more than 240 credentials, leading to the extensive data breach.
When a person is affected by a data breach, the worry is that a threat actor may purchase their details and use them to commit identity theft. We’ve listed the best identity theft protections to help keep you safe.
Via BleepingComputer
You might also likeFujifilm has announced the development of its first-ever cinema camera, the Fujifilm GFX Eterna, which is slated for a 2025 release.
Fujifilm's official statement does not provide much information, but it does contain enough to give us a picture of what to expect and to get excited about. It even includes the very first images of the medium-format beast, which you can see below.
It'll use exactly the same 102MP medium-format CMOS II HS sensor and X-Processor 5 engine as the five-star-rated GFX100 II. This costly mirrorless camera leans more heavily toward video than the watered-down GFX100S II. However, the new GFX Eterna will go one further than the hybrid GFX100 II – which, in addition to 8K video skills, is also an excellent stills camera – as a fully-fledged filmmaking tool.
Its name, Eterna, is an obvious nod to one of Fujifilm's most popular Film Simulations, a color profile that Fujifilm describes as "Based on ETERNA, a film designed for motion pictures, this Film Simulation mode minimises saturation to ensure that none of the colors stand out. It provides an extremely soft tonal gradation in highlights and deep shadows to prevent clipping, to reproduce a cinematic look."
Alongside announcing the GFX Eterna, Fujifilm is developing a 32-90mm power-zoom cinema lens and a GF to PL mount adapter – the latter is an industry-standard lens mount. We don't know the GFX Eterna's list price yet, nor that of the lens, although to give you a rough ballpark, the GFX100 II was launched at $7,499 / £6,999 / AU$12,599.
(Image credit: Fujifilm ) A filmmaking industry shake-up?Like Nikon with its RED camera takeover, Fujifilm is looking to disrupt the indie filmmaking market with an altogether different offering. Its larger medium-format sensor is a clear selling point over industry staples such as the RED Digital Camera Komodo and the Blackmagic Ursa-series. However, its infancy in the market could leave filmmaking stalwarts unconvinced.
On the other hand, Nikon is surely leveraging the RED name and the filmmaking tech it has owned since acquiring RED for its future video-focused cameras, including coveted color profiles developed by RED. Fujifilm is coming in new, utilizing its own sensor tech, which could be enough to tempt pros to give it a whirl. While its widely recognized Film Simulations could eventually win acclaim in this part of the industry that's historically closed off to newcomers.
To be one of the best video cameras in this professional realm, Fujifilm needs to develop the Eterna hardware wisely. It will, of course, need the inputs demanded by pros, including an XLR input for serious audio equipment and built-in ND filters, which are likely a must. There's also work to be done in creating cine lenses for the GF-mount, which are currently all photography-first lenses by design.
However, regarding the GFX Eterna, I'd have every confidence in Fujifilm making something pretty special at the first time of asking.
You might also likeKeen to position itself as a leader in next-generation automotive infotainment systems, LG Electronics has unveiled the third edition of its Mobility Labworks Series Digital Cockpit concept.
Designed to be a ‘modular’ system that automotive brands can easily implement in future vehicles, the concept consists of future displays, a look at next-generation human-machine-interface and the inclusion of advanced AI for safer driving and increased convenience.
The LG Vision Display concept is arguably the most recognizable modern infotainment system in the series, as it consists of a 12.3-inch Transparent OLED screen that offers key data, such as navigation, current speed and points of interest.
Like many of LG’s other innovations in its latest series, it is designed for high levels of autonomous driving and also features a 14.2-inch 'roll-in-and-out Plastic OLED' (P-OLED) display that's embedded in the center console. This can be retracted when not in use to keep a clean interior aesthetic.
Continuing to riff on the idea that the next generation of drivers won’t actually have to do much driving, LG also showcases a touch-sensitive curved OLED display that has been integrated into the steering wheel.
(Image credit: LG)This takes care of driving settings and allows the driver to easily manage navigation and climate control when piloting the car, but also doubles-up as a multimedia hub for when the car takes over driving duties.
More importantly, LG has incorporated what it refers to as its ‘AI-based virtual assistant’ that can detect if a driver is getting tired and will suggest entering autonomous modes.
Furthermore, it can even navigate to a nearby coffee shop for a rest, as well as order and pay for said coffee via the screen’s built-in fingerprint recognition sensor.
Arguably the most audacious of all the concepts is LG’s slightly long-winded ‘Connectivity & Content Solution for Seamless Entertainment and Smart Mobility’. This effectively transforms the rear passenger seats into an interactive entertainment hub, highlighting the company’s webOS platform via a plethora of screens.
It features a large display console that’s attached to an armrest, as well as an entire unit that wraps over the heads of passengers and places another high-definition screen in front of their eyes.
According to the electronics specialist, this system allows users to navigate content and control volume using hand gestures.
LG continues its advance into the automotive space (Image credit: LG)It comes as no surprise that South Korean electronics giant LG has already started to work alongside fellow homegrown talent in the Hyundai Motor Group.
The upcoming EV3 features LG’s Automotive Content Platform (ACP), which is powered by webOS, while the Genesis GV80 debuted an earlier version last year.
Designed to mimic the user-interface found on LG’s range of smart TVs, the operating system is constantly being updated with new content that can be listened to on-the-move or streamed while stationary.
In some markets, the Hyundai Motor Group offers access to LG Channels, which offers over 80 live TV channels, real-time news updates and over 400 VOD content options, including movies, dramas, and animated series for children.
The natural next step for LG is to start designing and manufacturing the physical displays that this operating system will run on (as handily highlighted by its Mobility Labworks Series), taking some of the technological heavy lifting out of the hands of automotive manufacturers.
You might also likeMaking group calls on Signal is set to get a lot easier thanks to a major upgrade to its video conferencing capabilities.
The privacy-focused messaging app has introduced a host of new features and tools as it looks to take on the likes of Zoom and Microsoft Teams.
Although privacy and safety will remain at the forefront of the platform, Signal group calls will now offer a range of functions that will be instantly familiar to anyone used to the other big-name online collaboration tools.
Signal calls upgrade (Image credit: Signal)Top of the list of new additions is call links, meaning Signal users can be invited to, and then join a call, with just a tap or a click - without needing to be part of a group chat.
Call links can be used for a recurring meeting or catch-up, and users will be able to customize the name of the link, and whether new joiners will need to be approved, or make it more open - as well as the option to remove people from calls, and even block them.
Once in a call, which can support up to 50 participants at once, users will be able to raise a virtual hand to ask a question or make a comment without interrupting the speaker or the conversation, and will also now be able to send emoji reactions for a more personalized experience.
Users will also benefit from updated call control buttons, a seemingly basic but essential tool, meaning it's easier to turn your camera and microphone on or off, manage your speaker source, and see who else is in a call.
If you're using Signal Desktop, there are more options to view speakers and participants on the call, including grid, sidebar and speaker views, as well as a dedicated tab at the bottom of the app containing information on all your calls - including call history, links and the ability to call people back.
"We believe that however you want to communicate – a text, a call, a voice message, a GIF, a video call, a story – you should be able to do it privately," Signal's Nina Berman wrote in a blog post announcing the launch.
"Video calls have become a new normal meeting place for organizations, workplaces, and groups of friends all over the world. As communication norms change, Signal’s promise of a private place to communicate stays the same."
You may also likeEver played Skyrim? I remember my first time playing the game on PlayStation 3, trudging up the mountain known as the Throat of the World to meet the Greybeards, a caste of ancient priests who dwell at the top. The long journey up the mountain reminded me of Lord of the Rings; epic fantasy, regardless of medium, always involves an inordinate amount of walking. As I pushed the joystick forward and commanded my character to walk, the Northern Lights danced in the sky of the digital landscape, and I wished I could do this walk for real.
Ten years later, someone has answered my prayers and found a way to get their 10,000 steps in while playing Skyrim, all without using one of the best under-desk treadmills to do the trick.
I first saw this via a video published 10 days ago by YouTuber ShakeMistake, who is able to use the pedometer on his Android phone as he walks in place to propel his character forward in the game. All modern phones have pedometer functions that use the phone’s internal gyroscope, just like the best fitness trackers. ShakeMistake's footage shows him walking in place in his gaming studio, and the character onscreen moves forward as he does so.
A handheld trackball mouse is used to pivot, turn and take actions, but you could use another controller to do this. It’s very Ready Player One, in which the characters playing the virtual reality game use an omni-directional treadmill to move around the virtual environment.
He has done this in in two ways: a cheaper, easier, less immersive solution, and one that’s more complex to set up, but more sophisticated and rewarding to play. The first is a purpose-built app called StepL, which you download on your phone and on your PC. The apps match with a QR code made available during setup, and using the desktop app, it’ll map your W key to your phone’s pedometer.
The second uses another gamepad mapper called reWASD in combination with StepL. You can check out ShakeMistake’s full methodology in the video below.
Analysis: levelling up your cozy cardioWhen on long nature walks, hikes or trail runs, I’m one of those huge nerds who’ll occasionally listen to fantasy soundtracks to really make me feel as though I’m travelling across Middle-Earth, Tamriel or The Continent. I’m certainly not the only one: videos with titles like “Ambient Walking Tour in the Hogwarts Castle” have garnered millions of views online.
If we advocate for people to use under-desk treadmills and walkpads to get your steps in during work, and watching Netflix, why not do it for gaming? I’m a firm believer in removing barriers to fitness, and not letting perfect become the enemy of good. You might not be going to the gym or signing up for an endurance race, but if you do 1,000 more steps than you did yesterday, that’s a win in my book.
If you’re a big gamer, consider looking at ways to map your phone’s pedometer to your 'walk' button to create an accessible entry point to fitness in general, and walking in particular. There’s no better place to start your fitness journey than walking across a fantasy land on your way to slay a dragon…
You might also like...