Trending Articles

article thumbnail

Millions of SK Telecom customers are potentially at risk following USIM data compromise

Security Affairs

SK Telecom warned that threat actors accessed customer Universal Subscriber Identity Module (USIM) info through a malware attack. SK Telecom is South Koreas largest wireless telecom company, a major player in the countrys mobile and tech landscape. It holds about 48% of the market share for mobile services, meaning around 34 million subscribers use its network.

Risk 214
article thumbnail

This 360-degree camera is my ultimate travel accessory - with AI features that creatives would want

Collaboration 2.0

Insta360 continues to update its great 360-degree cameras offering an all-around great vlogging tool.

IT 311
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ASUS routers with AiCloud vulnerable to auth bypass exploit

Security Affairs

ASUS warns of an authentication bypass vulnerability in routers with AiCloud enabled that could allow unauthorized execution of functions on the device. ASUS warns of an authentication bypass vulnerability, tracked as CVE-2025-2492 (CVSS v4 score: 9.2), which impacts routers with AiCloud enabled. A remote attacker can trigger the flaw to perform unauthorized execution of functions on the device.

article thumbnail

How to Protect Yourself From Phone Searches at the US Border

WIRED Threat Level

Customs and Border Protection has broad authority to search travelers devices when they cross into the United States. Heres what you can do to protect your digital life while at the US border.

Privacy 359
article thumbnail

Going Beyond Chatbots: Connecting AI to Your Tools, Systems, & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

If AI agents are going to deliver ROI, they need to move beyond chat and actually do things. But, turning a model into a reliable, secure workflow agent isn’t as simple as plugging in an API. In this new webinar, Alex Salazar and Nate Barbettini will break down the emerging AI architecture that makes action possible, and how it differs from traditional integration approaches.

article thumbnail

Doge Worker's Code Supports NLRB Whistleblower

Krebs on Security

A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE) siphoned gigabytes of data from the agency's sensitive case files in early March.

More Trending

article thumbnail

ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform

WIRED Threat Level

In a document published Thursday, ICE explained the functions that it expects Palantir to include in a prototype of a new program to give the agency near real-time data about people self-deporting.

IT 346
article thumbnail

Your Meta Ray-Bans just got a big update for free - and it feels like science fiction

Collaboration 2.0

Previously limited to early access in certain countries, this new out-of-this-world feature is expanding to all owners.

IT 295
article thumbnail

Lotus Panda Hackers Strike Southeast Asian Governments With Browser Stealers, Sideloaded Malware

eSecurity Planet

A notorious Chinese-linked hacking group, known in cybersecurity circles as Lotus Panda, has once again been tied to a wave of cyberattacks that hit several Southeast Asian government and private sector organizations, according to fresh findings from Broadcoms Symantec Threat Hunter Team. The months-long intrusion campaign, which ran from August 2024 through February 2025, targeted various institutions, including a government ministry, air traffic control, a telecom provider, and a construction

article thumbnail

Hackers Hijack NFC for Instant Payment Fraud

Data Breach Today

Attack Combines Social Engineering and Card Emulation to Execute Real-Time Theft Hackers are using Chinese-speaking Android malware-as-a-service SuperCard X to carry out near-field communication relay attacks, siphoning payment card data and executing live point of sale and ATM transactions. Victims receive spoofed SMS or WhatsApp alerts purporting to originate from their bank.

Sales 165
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

Android spyware hidden in mapping software targets Russian soldiers

Security Affairs

A new Android spyware was discovered in a fake Alpine Quest app, reportedly used by Russian soldiers for war zone planning. Doctor Web researchers uncovered a new spyware, tracked as Android.Spy.1292.origin, targeting Russian military personnel. The malicious code was hidden in a trojanized Alpine Quest app and spread via Russian Android catalogs. The malware steals contacts, geolocation, and file info, it can also download extra modules to exfiltrate stored data when instructed. “Alpine Q

Military 199
article thumbnail

Florida Man Enters the Encryption Wars

WIRED Threat Level

Plus: A US judge rules against police cell phone tower dumps, China names alleged NSA agents it says were involved in cyberattacks, and Customs and Border Protection reveals its social media spying tools.

article thumbnail

Think GeoGuessr is fun? Try using ChatGPT to guess locations in your photos

Collaboration 2.0

ChatGPT can 'read' your photos for location clues - even without embedded GPS or EXIF data. Here's why that could be a problem.

289
289
article thumbnail

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia

Thales Cloud Protection & Licensing

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia madhav Thu, 04/24/2025 - 04:56 Enhance remote digital signing security with an eIDAS-compliant Qualified Signature Creation Device (QSCD) for digital signatures and seals As business processes and government services become increasingly digital, remote signing has become a secure and efficient way to confirm the authenticity of digital documents, transactions, and identities through the

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Whistleblower Warns DOGE Secretly Building 'Master Database'

Data Breach Today

Top Democrat Sounds Alarm Over Whistleblower Report of DOGE's Master Database A top Democrat on the House Oversight Committee sounded the alarm after a whistleblower provided information to Congress warning that staffers for the Department of Government Efficiency violated federal data laws while building a "master database" of sensitive information across federal agencies.

article thumbnail

AI, Information, and the Environment: Balancing Automation and Sustainability in the Age of GenAI

AIIM

Earth Day 2025: Intelligent Information Management and Its Growing Power Requirements Earth Day is an excellent opportunity to pause and reflect on our power needs in our private lives and businesses, particularly the growing and changing needs triggered by Generative AI (GenAI) technologies.

IT 132
article thumbnail

Protecting Your Phone—and Your Privacy—at the US Border

WIRED Threat Level

In this episode of Uncanny Valley, our hosts explain how to prepare for travel to and from the United Statesand how to stay safe.

Privacy 194
article thumbnail

Finally, a GPS tracker with unlimited battery life and high-accuracy location tracking

Collaboration 2.0

Garmin's eTrex Solar GPS tracker delivers impressive battery life, broad GNSS coverage, and a budget-friendly price tag.

283
283
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Warning: Ransomware Remains a Top Threat for SMBs

KnowBe4

A new report from Sophos found that ransomware attacks accounted for over 90% of incident response cases involving medium-sized businesses in 2024, as well as 70% of cases involving small businesses.

article thumbnail

Two Ransomware Hacks Affect 1.1 Million Patients

Data Breach Today

Hackers Hit Maryland Medical Group and California Hospital, Claim 480 GB Data Theft Two separate ransomware hacks of a Maryland medical group and a California hospital resulted in data thefts affecting more than 1.1 million patients, according to recent reports to regulators. Cybercriminals claim to have leaked 480 gigabytes of data from one of the attacks.

article thumbnail

Android Improves Its Security

Schneier on Security

Android phones will soon reboot themselves after sitting idle for three days. iPhones have had this feature for a while; it’s nice to see Google add it to their phones.

IT 89
article thumbnail

Gmail’s New Encrypted Messages Feature Opens a Door for Scams

WIRED Threat Level

Google is rolling out an end-to-end encrypted email feature for business customers, but it could spawn phishing attacks, particularly in non-Gmail inboxes.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

AI has grown beyond human knowledge, says Google's DeepMind unit

Collaboration 2.0

A new agentic approach called 'streams' will let AI models learn from the experience of the environment without human 'pre-judgment'.

279
279
article thumbnail

How Organizational Culture Shapes Cyber Defenses

KnowBe4

Recently, I received an email at work from a company with whom I've had previous interactions. The email lacked context and contained an attachment, immediately raising suspicion.

article thumbnail

UK Retailer Marks & Spencer Plays Incident Response Straight

Data Breach Today

Expert Lauds 'Textbook Cyber Crisis Communications' as M&S Details Some Disruption It's rare to see a corporation lauded for its hacking incident communications, but British retailer Marks and Spencer has executed an admirable version of what informing the world of bad news should look like. M&S notified customers directly about the cybersecurity incident.

Retail 147
article thumbnail

I changed 10 Samsung phone settings to instantly improve the user experience

Collaboration 2.0

Samsung phones are full of features - are you using them all? These settings could be the upgrade you didn't know you needed.

279
279
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

This video of humanoid robots running a half marathon is amazing, hilarious, and a little creepy

Collaboration 2.0

Despite lost limbs, overheating, and a crash or two, a few of the 20 robots competing in China over the weekend did quite well. See for yourself.

278
278
article thumbnail

I found the most complete wireless charger for my iPhone - and it has a handy kickstand

Collaboration 2.0

The Torras PolarCircle lives up to its name, offering fast wireless iPhone charging without the heat.

IT 276
article thumbnail

How much energy does a single chatbot prompt use? This AI tool can show you

Collaboration 2.0

That question you just asked ChatGPT might've used as much energy as an LED bulb running for 45 minutes.

267
267