Connect with us

Tech

Microsoft identifies boardroom cyber awareness as a top priority | Computer Weekly

Published

on

Microsoft identifies boardroom cyber awareness as a top priority | Computer Weekly


Given the recent spate of high-profile cyber breaches, such as the attack on Jaguar Land Rover that halted production and required a government bailout, Microsoft’s 2025 Digital security report is urging IT departments to ensure cyber risk is managed at boardroom level.

Microsoft recommended that IT leaders treat cyber security as a business risk on par with financial or legal challenges. “It is important that corporate boards and CEOs understand the security weaknesses of their organisation,” it said in the report.

The company urged IT leaders to track and report metrics such as multi-factor authentication coverage, patch latency, incident counts and incident response time to develop a comprehensive understanding of both the organisation’s potential vulnerabilities and its preparedness in the event of a cyber security incident.

Other recommendations include enforcing phishing-resistant multi-factor authentication across all accounts, including administrative accounts, and auditing the perimeter accesses granted to trusted partners.

Over the past year, Microsoft reported that it has continued to see actors intensify their development of new and novel techniques to challenge the defences organisations are implementing to detect and prevent them. It noted that the daily threats organisations face largely remain the same, and that attacks tend to be opportunistic, with threat actors targeting known security gaps.

“While users globally are at risk, we’ve observed most attacks in the last six months focused on the United States, the United Kingdom, Israel and Germany,” Microsoft said.

The report found that governments and the public sector suffered the most cyber attacks. Microsoft warned that many local governments operate on legacy systems that are difficult to patch and secure, and budget constraints and small IT teams often mean delayed updates, minimal threat monitoring, and limited incident response capabilities. This makes them high-value targets for both nation-state actors and financially motivated cyber criminals.

The Microsoft study found that the main attack vectors for hackers were perimeter web-facing assets (18%) and external remote services (12%), as well as – to a lesser degree – supply chains (3%).

Nevertheless, Microsoft said it has continued to observe threat actors targeting the trusted relationships with upstream managed service providers, remote access services such as virtual private network or virtual private server systems, remote monitoring and management tools, cloud backups, continuous integration and continuous delivery pipelines, and third-party deployment software providers to gain access through trusted or commonly deployed IT systems.

Microsoft warned that these intrusions generally compromise privileged supplier accounts, exploit unpatched software, or insert malicious code into legitimate components. The report’s authors recommended that organisations audit access privileges, validate software bills of materials, maintain dependency hygiene and perform runtime integrity checks.

In a blog post discussing the findings, Amy Hogan-Burney, corporate vice-president of customer security and trust at Microsoft, said: “Organisational leaders must treat cyber security as a core strategic priority – not just an IT issue – and build resilience into their technology and operations from the ground up.”

She also warned that the use of artificial intelligence is accelerating malware development and creating more realistic synthetic content, enhancing the efficiency of activities such as phishing and ransomware attacks. “Opportunistic malicious actors now target everyone – big or small – making cyber crime a universal, ever-present threat that spills into our daily lives,” said Hogan-Burney.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

Published

on

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks


Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state hacking group following the breach of a major maker of software, the federal government warned on Wednesday.

F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

Unprecedented

During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations. Wednesday’s disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.

Control of the build system and access to the source code, customer configurations, and documentation of unpatched vulnerabilities has the potential to give the hackers unprecedented knowledge of weaknesses and the ability to exploit them in supply-chain attacks on thousands of networks, many of which are sensitive. The theft of customer configurations and other data further raises the risk that sensitive credentials can be abused, F5 and outside security experts said.

Customers position BIG-IP at the very edge of their networks for use as load balancers and firewalls, and for inspection and encryption of data passing into and out of networks. Given BIG-IP’s network position and its role in managing traffic for web servers, previous compromises have allowed adversaries to expand their access to other parts of an infected network.

F5 said that investigations by two outside intrusion-response firms have yet to find any evidence of supply-chain attacks. The company attached letters from firms IOActive and NCC Group attesting that analyses of source code and build pipeline uncovered no signs that a “threat actor modified or introduced any vulnerabilities into the in-scope items.” The firms also said they didn’t identify any evidence of critical vulnerabilities in the system. Investigators, which also included Mandiant and CrowdStrike, found no evidence that data from its CRM, financial, support case management, or health systems was accessed.

The company released updates for its BIG-IP, F5OS, BIG-IQ, and APM products. CVE designations and other details are here. Two days ago, F5 rotated BIG-IP signing certificates, though there was no immediate confirmation that the move is in response to the breach.



Source link

Continue Reading

Tech

Paper industry could become more energy-efficient with a new measurement method

Published

on

Paper industry could become more energy-efficient with a new measurement method


Fossil consumption calculation process for use of fossil fuel in an integrated kraft pulp mill. Credit: Applied Energy (2025). DOI: 10.1016/j.apenergy.2025.126685

The pulp and paper industry consumes large amounts of energy. But despite stricter EU requirements for efficiency improvements, there has been no way to measure and compare energy consumption between different companies in a fair way. In collaboration with the Swedish Environmental Protection Agency, researchers at Linköping University, Sweden, now present a solution that has great potential to be used throughout the EU.

“Even if this would contribute to increasing efficiency by one or a few percent only, this involves so much energy that it can make a huge difference,” says Kristina Nyström, Ph.D. student at the Department of Management and Engineering at Linköping University.

Globally, the pulp and paper industry accounts for 4% of energy used by the industrial sector. Through its Industrial Emissions Directive, the EU has set efficiency requirements for the industrial sector to reduce climate impact. An important tool for this is to make comparisons between factories within an industry—so-called benchmarking.

“But this has not been possible in the paper industry, because the mills have been so different that comparable results have not been achieved,” Kristina Nyström explains.

Therefore, the Swedish Environmental Protection Agency, assisted by Linköping University and Chalmers Industriteknik and in consultation with the paper industry, has developed a calculation method to enable comparisons. The method, which is presented in an article published in the journal Applied Energy, has great potential to be used throughout the EU, according to Olof Åkesson, former Swedish Environmental Protection Agency employee, who initiated the project.

The solution is to divide paper production into standardized processes such as actual pulp production, dissolution of purchased pulp, drying of pulp or paper production. These processes are common to enough mills for comparisons to be meaningful. In this way, companies can discover what in their processes works less efficiently compared to others, where improvements can be made and which actions would be most beneficial.

In addition, this method allows for more measures to be included in the energy efficiency efforts. One example is that companies are credited with the residual heat from manufacturing that is used in the surrounding community, such as the heating of homes or greenhouses.

Should this method gain ground, it could contribute to a changed approach to energy efficiency. At present, public agencies’ demands for energy audits often focus on details, which risks significant efficiency measures being overlooked.

“The benefit of making the pulp and paper industry more efficient is that this can reduce the use of fossil fuels and release , biofuels and electricity for other purposes,” says Åkesson.

With the involvement of researchers, public agencies and companies in the pulp and paper industry, chances are high that the method was designed in a way that is useful in practice. The collaboration between organizations can serve as a model for other industries wanting to develop their own measurement methods, according to Nyström.

Several companies that tested the measurement method have been positive, and it now needs to be spread and tested on a larger scale, the researchers say. The Swedish Environmental Protection Agency is working to develop the model, now also in dialog with public agencies and the and in Finland.

More information:
Olof Åkesson et al, A calculation method enabling energy benchmarking in the pulp and paper industry: Adopting a methodology that bridge the research–policy implementation gap, Applied Energy (2025). DOI: 10.1016/j.apenergy.2025.126685

Citation:
Paper industry could become more energy-efficient with a new measurement method (2025, October 16)
retrieved 16 October 2025
from https://techxplore.com/news/2025-10-paper-industry-energy-efficient-method.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading

Tech

Researchers chart path for investors to build a cleaner aviation industry

Published

on

Researchers chart path for investors to build a cleaner aviation industry


Credit: Pixabay/CC0 Public Domain

Cutting planet-warming pollution to near-zero will take more than inventing new clean technologies—it will require changing how the world invests in them. That’s especially true for industries like aviation, where developing and adopting greener solutions is risky and expensive, according to a University of California San Diego commentary piece in Science.

The paper calls for smarter ways of managing investment risk that could help speed up the shift toward cleaner air travel and other hard-to-decarbonize sectors.

“The aviation sector—a fast-growing source of greenhouse gases—illustrates the broader challenge of industrial decarbonization: too little investment in technologies that could yield the biggest climate benefits,” said the paper’s co-author David G. Victor, professor of innovation and at the UC San Diego School of Global Policy and Strategy and co-director of the Deep Decarbonization Initiative.

The piece outlines a new approach that could help guide a coalition of research and development (R&D) programs alongside investors and airlines seeking to deploy new technologies to curb from the .

“Despite all the chaos in global geopolitics and climate policies these days, there are large and growing pools of capital willing to take risks on clean ,” Victor said. “What’s been missing is a framework to guide that capital to the riskiest but most transformative investments.”

He added that investors and research managers tend to focus on familiar, lower-risk projects like next-generation jet engines or recycled-fuel pathways.

“But getting aviation and other hard-to-abate sectors to near-zero emissions means taking on bigger risks with technologies and new lines of business that will be highly disruptive to the existing industry. Investors and airlines need to find smarter ways to encourage and manage these disruptive investments,” Victor said.

In the article, Victor and co-authors call for a more realistic framework to guide both and private .

They propose a tool called an Aviation Sustainability Index (ASI)—a quantitative method to assess how different technologies or investments could help decouple emissions from growth in air travel.

The approach is designed to help investors distinguish between projects that only modestly improve efficiency and those that could significantly transform the sector’s climate impact.

The authors note that while roughly $1 trillion is expected to flow into aviation over the next decade, most of that money will simply make aircraft slightly more efficient. Few investors, they argue, have clear incentives to back the kind of breakthrough technologies—such as hydrogen propulsion, advanced aircraft designs, or large-scale sustainable fuel systems—that could substantially reduce emissions.

“Cleaner flight is possible, but it requires changing how we think about both risk and return,” Victor said. “We need new institutions, incentives, and partnerships that reward innovation, not just incrementalism.”

The commentary, written by a multinational team of scholars, also highlights a broader lesson for : global decarbonization goals such as “net zero by 2050” sound bold and ambitious. But when it becomes clear that they can’t be met, these goals make it harder to focus on the practical steps needed today to drive change in real-world markets.

Ultimately, the paper argues for action that begins now. By developing better tools to evaluate climate-friendly investments and by rewarding companies willing to take calculated risks on breakthrough technologies, governments, and industry leaders can accelerate real progress toward decarbonization.

The paper was co-authored by Thomas Conlon of University College Dublin, Philipp Goedeking of Johannes Gutenberg University of Mainz (Germany) and Andreas W. Schäfer of University College London.

More information:
David G. Victor et al, Mobilizing capital and technology for a clean aviation industry, Science (2025). DOI: 10.1126/science.adu2458. www.science.org/doi/10.1126/science.adu2458

Citation:
Researchers chart path for investors to build a cleaner aviation industry (2025, October 16)
retrieved 16 October 2025
from https://techxplore.com/news/2025-10-path-investors-cleaner-aviation-industry.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Continue Reading

Trending