Trending Articles

article thumbnail

Italian Privacy Agency Warns Against Unlawful Spyware Use

Data Breach Today

Use Other Than for Police Purposes Can Invoke Fine Up to 20 Million Euros The Italian privacy regulator warned against unlawful uses of Graphite spyware following reports of mass hacking campaigns using the tool. The Italian Data Protection Authority published a warning targeting commercial spyware developed by Israeli firm Paragon Solutions.

Privacy 147
article thumbnail

Top US Election Security Watchdog Forced to Stop Election Security Work

WIRED Threat Level

The US Cybersecurity and Infrastructure Security Agency has frozen efforts to aid states in securing elections, according to an internal memo viewed by WIRED.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mental Health Provider Settles Fortra Hack Lawsuit for $7M

Data Breach Today

Breach of GoAnywhere File Transfer App at Brightline Affected 1 Million Patients Virtual mental health provider Brightline has agreed to pay $7 million to settle a proposed class action lawsuit involving a data breach affecting about 1 million individuals stemming from the 2023 hack by ransomware gang Clop on software vendor Fortra's GoAnywhere managed file transfer application.

article thumbnail

Celebrating Information Management: Shell's Annual IG Week

AIIM

At Shell, we believe in the power of information management (IM) to drive business success. That's why, once a year, we host an Information Governance Week - a dedicated time to focus on the importance of IM across our organization.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

News alert: Gcore Radar reveals 56% rise in DDoS attacks – gaming industry targeted the most

The Last Watchdog

Luxembourg, Luxembourg, Feb. 11, 2025, CyberNewswire — Gcore , the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2024, and businesses need to act fast to protect themselves from this evolving threat.

More Trending

article thumbnail

The Alarming Backdoor Hiding in 2 Chinese Patient Monitors

Data Breach Today

Researcher Jason Sinchak on Recent Cyber Warnings About Contec CMS8000 Devices A hidden reverse backdoor in low-cost patient vital sign monitors used globally is hardcoded with an IP address connecting to a Chinese government-funded education and research network, which poses both privacy and potential safety concerns, said security researcher Jason Sinchak of ELTON.

Education 179
article thumbnail

Delivering Malware Through Abandoned Amazon S3 Buckets

Schneier on Security

Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize that they have been abandoned, and still ping them for patches, updates, and etc. The TL;DR is that this time, we ended up discovering ~150 Amazon S3 buckets that had previously been used across commercial and open source software

Libraries 112
article thumbnail

The Official DOGE Website Launch Was a Security Mess

WIRED Threat Level

Plus: Researchers find RedNote lacks basic security measures, surveillance ramps up around the US-Mexico border, and the UK ordering Apple to create an encryption backdoor comes under fire.

Security 110
article thumbnail

Facebook Users Beware: Thousands Hit by New Phishing Scam

KnowBe4

Check Point warns that a large-scale phishing campaign is targeting Facebook accounts with phony copyright infringement notices.

Phishing 103
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Perplexity is the AI tool Gemini wishes it could be

Collaboration 2.0

Here's why I stick with Perplexity over Google's Gemini for AI assistance, even on my Android phone.

IT 125
article thumbnail

Altman Rejects Musk's $97.4B Offer for OpenAI

Data Breach Today

Offer Comes Amid Legal Battle Between the Former OpenAI Co-Founders Elon Musk has reportedly offered to buy OpenAI's operating assets for $97.4 billion, escalating his legal and business battle with the artificial intelligence company's CEO Sam Altman. Altman dismissed the offer and said he will buy Twitter for $9.74 billion - if Musk is interested.

article thumbnail

Storm-2372 used the device code phishing technique since August 2024

Security Affairs

Russia-linked group Storm-2372 used the device code phishing technique since Aug 2024 to steal login tokens from governments, NGOs, and industries. Microsoft Threat Intelligence researchers warn that threat actor Storm-2372, likely linked to Russia, has been targeting governments, NGOs, and various industries across multiple regions since August 2024.

Phishing 104
article thumbnail

China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers

WIRED Threat Level

Despite high-profile attention and even US sanctions, the group hasnt stopped or even slowed its operation, including the breach of two more US telecoms.

IT 97
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Future-Proofing Information Management Through Talent Development

AIIM

The evolution of information management demands a new approach to talent development. As someone who transitioned from traditional librarianship to leading digital transformation initiatives, I understand the importance of continuous learning and adaptation.

article thumbnail

A major Gemini feature is now free for all users - no Advanced subscription required

Collaboration 2.0

Google is making a very useful Gemini featur available to everyone for free. The AI is also getting a little smarter today.

119
119
article thumbnail

Warning: Cybercrime Services Underpin National Security Risk

Data Breach Today

Russia, China, Iran and North Korea Tapping Cybercrime Services, Google Says The cybercrime-as-a-service economy continues to power ransomware and other criminal enterprises, as well as serve as "an accelerant for state-sponsored hacking," collectively posing an increasing risk to Western national security, cybersecurity researchers warn.

Risk 162
article thumbnail

Artificial intelligence (AI) as an Enabler for Enhanced Data Security

Security Affairs

Artificial intelligence enhances data security by identifying risks and protecting sensitive cloud data, helping organizations stay ahead of evolving threats. Artificial intelligence (AI) is transforming industries and redefining how organizations protect their data in todays fast-paced digital world. With over 90% of enterprises storing at least some of their data in the cloud, AIs ability to enhance security across complex, distributed environments is more vital than ever.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Trusted Encryption Environments

Schneier on Security

Really good—and detailed— survey of Trusted Encryption Environments (TEEs.

article thumbnail

Phishing for Love: A Sharp Surge in Valentine’s Day-Themed Scams

KnowBe4

Authors: Martin Kraemer, Security Awareness Advocate at KnowBe4 and James Dyer, Threat Intelligence Lead at KnowBe4 This Valentines Day, Cupid wasnt the only one taking aim. Our Threat Research team noted a 34.8% increase on Valentine-related threat traffic in comparison to February of 2024.

article thumbnail

How fake security reports are swamping open-source projects, thanks to AI

Collaboration 2.0

Patch spam contains code that is downright wrong and nonfunctional. Even worse: It can introduce new vulnerabilities or backdoors. What's a developer to do?

Security 118
article thumbnail

Thai Police Bust 4 Suspected 8Base Ransomware Group Members

Data Breach Today

Detained Russians Accused of Phobos Ransomware Attacks Against 1,000 Organizations Thai police have arrested four suspected members of the 8Base ransomware-wielding gang, which authorities say has extorted $16 million in ransom payments through attacks against mostly smaller players. The four men were taken into custody in a coordinated, international law enforcement operation.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

This Ad-Tech Company Is Powering Surveillance of US Military Personnel

WIRED Threat Level

In a letter to a US senator, a Florida-based data broker says it obtained sensitive data on US military members in Germany from a Lithuanian firm, revealing the global nature of online ad surveillance.

article thumbnail

The Rise of Non-Ransomware Attacks on AWS S3 Data

Thales Cloud Protection & Licensing

The Rise of Non-Ransomware Attacks on AWS S3 Data madhav Thu, 02/13/2025 - 04:39 A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. Instead, they exploit the AWS server-side encryption with customer-provided keys (SSE-C), extorting payment in exchange for the encryption key.

article thumbnail

New Research: Ransomware Data Extortion Skyrocketing

KnowBe4

Data theft extortion attacks increased by 46% in the fourth quarter of 2024, according to a new report from Nuspire.

article thumbnail

This $200 Motorola phone I tested is almost too good for the price

Collaboration 2.0

The Moto G (2025) packs multi-day battery life and a surprisingly good camera for a budget phone.

116
116
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

The Loneliness Epidemic Is a Security Crisis

WIRED Threat Level

Romance scams cost victims hundreds of millions of dollars a year. As people grow increasingly isolated, and generative AI helps scammers scale their crimes, the problem could get worse.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: Im speaking at Boskone 62 in Boston, Massachusetts, USA, which runs from February 14-16, 2025. My talk is at 4:00 PM ET on the 15th. Im speaking at the Rossfest Symposium in Cambridge, UK, on March 25, 2025. The list is maintained on this page.

66
article thumbnail

[POLL] Sam Altman: "I don't do Google searches anymore." How about you?

KnowBe4

I'm doing a quick poll because I find myself exactly where Sam is. But I would love to understand how that is for us IT pros here. Hence. a POLL I am hosting at LinkedIn. Deadline is a week from today, Feb 14, 2025.

IT 75