The 2025 technology landscape reveals a year of seismic shifts driven by surging interest in AI and an intensified focus on cybersecurity governance. Insights from the latest O’Reilly 2025 Technology Trends Report shed light on these pivotal changes shaping the industry. The AI Upskilling Boom Artificial Intelligence continues to dominate the technology and business landscape as a transformative force. O’Reilly’s platform data underscores an unprecedented demand for AI-related skills, with the most pronounced usage increases seen in topics like prompt engineering (456% increase), AI principles (386% increase), and generative AI (289% increase). Professionals across industries are not just embracing AI…
Author: Anastasios Arampatzis
The digital landscape has become an integral part of our lives, and social media platforms are at its heart. While these platforms offer undeniable benefits in connecting people and fostering communities, they also pose significant risks, especially for children. Exposure to inappropriate content, cyberbullying, and the addictive nature of social media have raised serious concerns among parents and policymakers alike. In response, countries are grappling with how best to protect kids online, and the debate over age verification is taking center stage. These initiatives are well-intentioned but have drawn criticism for potentially infringing on privacy rights and failing to address…
While lucrative for e-commerce businesses, the holiday shopping season also brings a surge in cyber threats. A recent study by Liquid Web highlights a worrying trend: December, the most critical month for online retailers, sees a staggering 31% increase in cyberattacks compared to the yearly average. This means that while shoppers hunt for the perfect gifts, cybercriminals are lurking, ready to exploit vulnerabilities and steal sensitive data. This isn’t exactly a stocking stuffer any business owner wants to find. Cyberattacks surge as consumers flock to online stores for holiday deals, turning this festive period into a prime opportunity for digital…
The year 2024 proved challenging for cybersecurity in Greece, with a significant surge in the volume and sophistication of cyberattacks. Ransomware attacks, Distributed Denial-of-Service (DDoS) attacks, and Advanced Persistent Threats (APTs) all significantly disrupted businesses, government services, and critical infrastructure. Efstratios Lontzetidis, a Cyber Threat Intelligence Researcher based in Greece, provided a compelling round up of the most essential threats facing Greece in the past year. Let’s take a quick look at the highlights. Ransomware Attacks Intensify Ransomware emerged as a dominant threat in Greece throughout 2024, affecting education, retail, shipping, and media sectors. Notably, groups like RansomHub and Akira…
The holidays are a time for joy, connection, and giving, but amidst the festive cheer lies a growing cyber threat that’s anything but jolly. As we fill our online shopping carts with gifts for loved ones, scammers are busy crafting their own presents—persuasive, GenAI-generated phishing emails and ads designed to steal your personal information, financial data, and peace of mind. In the spirit of the season, let’s unwrap the truth about these scams and learn how to keep our celebrations secure. The Rise of GenAI-Powered Scams Gone are the days of poorly written phishing emails that could be spotted from…
On 20 November 2024, the EU Cyber Resilience Act (CRA) was published in the Official Journal of the EU, kicking off the phased implementation of the CRA obligations. The European Union has introduced the Cyber Resilience Act to bolster the cybersecurity of connected devices and software products within its jurisdiction. The CRA is a harmonizing EU regulation, the first of its kind focusing on safeguarding consumers and businesses from cybersecurity threats. It is a key element of the EU’s Cybersecurity Strategy for the Digital Decade. CRA is an EU Regulation similar to the GDPR and the EU AI Act. It is, therefore, directly…
Artificial intelligence (AI) is transforming industries at an unprecedented pace, offering solutions to some of the world’s most complex challenges. But with its immense potential come significant risks—bias, discrimination, data privacy breaches, and security vulnerabilities. Governments worldwide have enacted AI regulations that balance innovation with trustworthiness and accountability to address these risks. While these regulations are crucial for building public trust, their variety and complexity can make compliance a daunting task for businesses operating across borders. The AI Regulations Tracker 2025, developed by the Bora cybersecurity marketing and Information Security Buzz team of experts, is a vital tool for companies…
In an era of increasingly sophisticated cyber threats, the U.S. Department of Defense (DoD) has introduced the Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) to bolster the cybersecurity posture of its Defense Industrial Base (DIB). This updated framework aims to ensure that contractors and subcontractors handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) implement robust cybersecurity practices. Understanding CMMC 2.0 CMMC 2.0 is an enhanced version of the original CMMC framework, streamlining the model from five to three cybersecurity maturity levels. Each level aligns with established National Institute of Standards and Technology (NIST) cybersecurity standards, namely NIST SP…
In today’s digital-first world, APIs are the lifelines connecting different software applications, enabling seamless interactions and data exchange. As businesses increasingly adopt digital transformation strategies, the reliance on APIs has skyrocketed. However, this growing dependency comes with its own set of risks. API security breaches are not just a technical nuisance; they are a substantial business risk with far-reaching consequences. But what exactly does this mean for your business? And why should API security be more than a footnote in your digital strategy? Let’s dive in to uncover the critical importance of fortifying your APIs. Understanding API Security API Security:…
The National Institute of Standards and Technology (NIST) has published its initial draft strategy, Internal Report (IR) 8547, titled “Transition to Post-Quantum Cryptography Standards. ” This draft outlines NIST’s strategy for migrating from current cryptographic algorithms vulnerable to quantum computing attacks to quantum-resistant alternatives. Published on November 12, 2024, it is open for comments until January 10, 2025. The report details a phased approach to PQC adoption and underscores the urgency of securing critical systems before quantum computing capabilities emerge. The Need for Post-Quantum Cryptography Cryptographic algorithms are vital for safeguarding confidential digital information from unauthorized access. For decades, these…