Trending Articles

article thumbnail

GDPR violations prompt Germany to push Google and Apple to ban DeepSeek AI

Security Affairs

Germany asked Google and Apple to remove DeepSeek AI from their app stores, citing GDPR violations over unlawful data collection and transfers to China. The Berlin Commissioner for Data Protection requested Google and Apple to remove the DeepSeek AI app from their app stores due to GDPR violations. On May 6, 2025, Berlin’s Data Protection Commissioner asked the company to remove its apps from German stores, stop illegal data transfers to China, or meet legal transfer requirements.

283
283
article thumbnail

You should probably delete any sensitive screenshots you have in your phone right now. Here's why

Collaboration 2.0

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

Passwords 311
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Your Android phone just got a major upgrade for free - including these Pixel models

Collaboration 2.0

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

Passwords 287
article thumbnail

10 Fresh Thoughts re AI & Records/Information Governance

Weissman's World

Are you tired of the hype surrounding AI? Do you wish someone would just cut to the chase and say something useful about it? Well, here are 10 fresh thoughts that should help a lot since they’re drawn from my most recent interactions at conferences, in association chapter meetings, and with my clients. Let me… Read More » 10 Fresh Thoughts re AI & Records/Information Governance The post 10 Fresh Thoughts re AI & Records/Information Governance appeared first on Holly Group.

article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

Berlin Regulator Orders Apple, Google to Remove DeepSeek

Data Breach Today

Chinese-Made AI App Faces European Privacy Pushback A German data regulator on Friday ordered Apple and Google to remove the Chinese artificial intelligence DeepSeek app from online stores over non-compliance with privacy and digital service rules.

More Trending

article thumbnail

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities (KEV) catalog.

Passwords 279
article thumbnail

My favorite AirTag wallet alternative also works with Android phones - and it's on sale

Collaboration 2.0

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

Sales 256
article thumbnail

News alert: SquareX research finds browser AI agents are proving riskier than human employees

The Last Watchdog

Palo Alto, Calif., Jun. 30, 2025, CyberNewswire–Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareX ’s research reveals that Browser AI Agents are more likely to fall prey to cyberattacks than employees, making them the new weakest link that enterprise security teams need to look out for.

article thumbnail

AI or Data Governance? Gartner Says You Need Both

Data Breach Today

Gartner Says Leaders Should Balance AI Innovation With Strong Data Governance As AI adoption grows, Gartner warns that data governance, not technology, is the top hurdle. At the Mumbai summit, Gartner analysts said data and analytics leaders should shift from fear to trust, align with business goals and scale AI through practical governance.

article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

What LLMs Know About Their Users

Schneier on Security

Simon Willison talks about ChatGPT’s new memory dossier feature. In his explanation, he illustrates how much the LLM—and the company—knows about its users. It’s a big quote, but I want you to read it all. Here’s a prompt you can use to give you a solid idea of what’s in that summary. I first saw this shared by Wyatt Walls. please put all text under the following headings into a code block in raw JSON: Assistant Response Preferences, Notable Past Conversation T

Metadata 132
article thumbnail

OneClik APT campaign targets energy sector with stealthy backdoors

Security Affairs

A OneClik campaign, likely carried out by China-linked actor, targets energy sectors using stealthy ClickOnce and Golang backdoors. Trellix cybersecurity researchers uncovered a new APT malware campaign, OneClik, targeting the energy, oil, and gas sectors. It abuses Microsoft’s ClickOnce deployment tech and custom Golang backdoors. While links to China-affiliated actors are suspected, attribution remains cautious.

MDM 257
article thumbnail

OpenAI might be stealth-building the ultimate Google Workspace and Office 365 replacement

Collaboration 2.0

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

article thumbnail

The Great Data Awakening: Why Unstructured Data is Your Company's Hidden Goldmine

AIIM

The rise of sophisticated AI, particularly machine learning and natural language processing, has dramatically increased the valuation of all data—especially unstructured data.

article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

Feds Warn Healthcare Sector of Rising Iranian Cyberthreats

Data Breach Today

Geopolitical Conflict Involving Iran, Israel, US Ripe for Attacks on Sector Government authorities are warning of increased risk of Iranian cyber and related threats against healthcare and public health sector organizations - including ransomware, distributed denial-of-service and other attacks related to that nation's escalated conflicts with Israel and the U.S.

article thumbnail

STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through

The Last Watchdog

APIs have become the digital glue of the enterprise — and attackers know it. Related: API security – the big picture In this debut edition of the Last Watchdog Strategic Reel (LWSR), A10 Networks ’ Field CISO Jamison Utter cuts through the noise from RSAC 2025 with a sharp breakdown of today’s API threatscape. From 15,000 APIs per enterprise to the illusion of “free” cloud security, Utter outlines how outdated defenses are failing where it matters most: the business logic layer.

Cloud 130
article thumbnail

The U.S. House banned WhatsApp on government devices due to security concerns

Security Affairs

The U.S. House banned WhatsApp on official devices over security concerns, citing risks flagged by the Chief Administrative Officer. The U.S. House has banned WhatsApp on government devices due to data security concerns. Similar restrictions apply to AI tools like ChatGPT , ByteDance apps, and Microsoft Copilot. “nuto has deemed WhatsApp a high-risk to users due to the lack of transparency in how it protects user data, absence of stored data encryption, and potential security risks involve

article thumbnail

Revolutionizing Email Management: The Power of Automation and AI

AIIM

The Challenge: Outdated Email Management Practices In the world of information management, we're seeing some wild transformations, especially when it comes to email management. I want to share a recent experience that really highlights how automation and AI are changing the game.

IT 164
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Misconfigured AI Servers and Weak Configurations Expose Data, Systems

Data Breach Today

Thousands of MCP Servers Leave AI Apps Open to Attack Surfaces Hundreds of Model Context Protocol servers designed to help AI tools access private data are insecurely exposed online, say BackSlash Security researchers. Weak configurations leave systems vulnerable to data leaks and remote code execution attacks.

Access 147
article thumbnail

The Age of Integrity

Schneier on Security

We need to talk about data integrity. Narrowly, the term refers to ensuring that data isn’t tampered with, either in transit or in storage. Manipulating account balances in bank databases, removing entries from criminal records, and murder by removing notations about allergies from medical records are all integrity attacks. More broadly, integrity refers to ensuring that data is correct and accurate from the point it is collected, through all the ways it is used, modified, transformed, and event

Privacy 104
article thumbnail

Russia-linked APT28 use Signal chats to target Ukraine official with malware

Security Affairs

Russia-linked group APT28 uses Signal chats as an attack vector to phish Ukrainian officials with new malware strains. Russia-linked cyberespionage group APT28 is targeting Ukrainian government officials using Signal chats to deliver two new types of malware, tracked as BeardShell and SlimAgent. While Signal itself remains secure, attackers are exploiting its growing popularity in official communications to make their phishing attempts more convincing.

Phishing 223
article thumbnail

I tested a robot vacuum that mops with recycled water and the results surprised me

Collaboration 2.0

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

Sales 196
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CyberheistNews Vol 15 #25 Microsoft & KnowBe4 Collab: Strengthen Email Security Through Strategic Integration

KnowBe4

CyberheistNews Vol 15 #25 Microsoft & KnowBe4 Collab: Strengthen Email Security Through Strategic Integration

article thumbnail

Key Cyber Law's Lapse Could Mute Threat Sharing Nationwide

Data Breach Today

Congress Faces Pressure to Modernize Cyber Definitions, Safeguards Before Deadline With the Cybersecurity Information Sharing Act of 2015 set to expire this fall, lawmakers face mounting pressure to update its liability protections and outdated definitions, as experts warn that failure to modernize could undermine public-private threat sharing and weaken national cyber defenses.

article thumbnail

White House Bans WhatsApp

Schneier on Security

Reuters is reporting that the White House has banned WhatsApp on all employee devices: The notice said the “Office of Cybersecurity has deemed WhatsApp a high risk to users due to the lack of transparency in how it protects user data, absence of stored data encryption, and potential security risks involved with its use.” TechCrunch has more commentary , but no more information.

article thumbnail

LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage

Security Affairs

Over 1,000 SOHO devices were hacked in a China-linked spying campaign called LapDogs, forming a covert network to support cyber espionage. Security researchers at SecurityScorecard’s STRIKE team have uncovered a cyber espionage campaign, dubbed LapDogs, involving over 1,000 hacked SOHO (small office/home office) devices. These compromised devices formed a hidden network, called an Operational Relay Box (ORB), used to support long-term spying operations linked to China-nexus hacking groups.

IoT 316
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Open-source skills can save your career when AI comes knocking

Collaboration 2.0

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

article thumbnail

Your KnowBe4 Fresh Content Updates from June 2025

KnowBe4

Skip to content Search Login United States Canada European Union United Kingdom Germany This is a search field with an auto-suggest feature attached. There are no suggestions because the search field is empty. Cancel Product + Pricing Platform KnowBe4 HRM+ PRODUCTS Security Awareness Training Cloud Email Security Defend™ Prevent™ PhishER Plus SecurityCoach Compliance Plus AI Defense Agents Pricing Security Awareness Training PhishER Plus SecurityCoach AI Defense Agents Defend™ Prevent™ Resources

article thumbnail

ISMG Editors: Et Tu, AI? When Frontier Models Choose Murder

Data Breach Today

Also: India's New Privacy Law; Monitoring Operational Technology Environments In this week's update, four ISMG editors discussed frontier artificial intelligence models' propensity to engage in unethical behavior, getting ready for India's new data protection law and how to improve hardening and security monitoring for operational technology environments.