Trending Articles

article thumbnail

Google just made AI coding assistance free for everyone - with very generous limits

Collaboration 2.0

With 180,000 completions per month and deep IDE integration, Gemini Code Assist could change how developers write and review code. Here's what you need to know.

345
345
article thumbnail

A large botnet targets M365 accounts with password spraying attacks

Security Affairs

A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication. SecurityScorecard researchers discovered a botnet of over 130,000 devices that is conducting password-spray attacks against Microsoft 365 (M365) accounts worldwide. The attackers targeted accounts protected with basic authentication bypassing multi-factor authentication.

Passwords 290
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elon Musk’s Starlink Is Keeping Modern Slavery Compounds Online

WIRED Threat Level

A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmarwhere tens of thousands of people are enslavedare using Starlink to get online.

Privacy 318
article thumbnail

Elon Musk's Federal Worker Email Sparks 'Security Nightmare'

Data Breach Today

Federal Agencies and Experts Alike Say Musk's Email Request Poses Security Threat The Department of Government Efficiency-led effort to assess whether millions of federal jobs are necessary through a bulleted list of weekly activities is causing a major security threat, in addition to mass confusion across the federal government, experts told Information Security Media Group.

Security 252
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

GUEST ESSAY: How AI co-pilots boost the risk of data leakage — making ‘least privilege’ a must

The Last Watchdog

The rise of AI co-pilots is exposing a critical security gap: sensitive data sprawl and excessive access permissions. Related: Weaponizing Microsoft’s co-pilot Until now, lackluster enterprise search capabilities kept many security risks in checkemployees simply couldnt find much of the data they were authorized to access. But Microsoft Copilot changes the game, turbocharging enterprise search and surfacing sensitive information that organizations didnt realize was exposed.

Risk 130

More Trending

article thumbnail

SpyLend Android malware found on Google Play enabled financial cyber crime and extortion

Security Affairs

CYFIRMA researchers discovered that the SpyLend Android malware was downloaded 100,000 times from the official app store Google Play. CYFIRMA researchers discovered an Android malware, named SpyLend, which was distributed through Google Play as Finance Simplified. The malware targets Indian users with unauthorized loan apps, enabling predatory lending, blackmail, and extortion.

Access 293
article thumbnail

This Russian Tech Bro Helped Steal $93 Million and Landed in US Prison. Then Putin Called

WIRED Threat Level

In the epic US-Russian prisoner swap last summer, Vladimir Putin brought home an assassin, spies, and another prized ally: the man behind one of the biggest insider trading cases of all time.

Security 222
article thumbnail

UK Delays Plans for AI Regulation

Data Breach Today

Some Lawmakers Fear Regulation Could Stymie Innovation The British Labour Government has reportedly delayed plans to put forward a draft bill on artificial intelligence over concerns that binding AI regulation could stifle the country's AI growth potential. A spokesperson said the government remains "committed to bringing forward a legislation.

article thumbnail

More Research Showing AI Breaking the Rules

Schneier on Security

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly impossible task: to win against Stockfish, which is one of the strongest chess engines in the world and a much better player than any human, or any of the AI models in the study. Researchers also gave the models what they call a “scratchpad:” a text box the AI could use to “think” before making its next

Paper 116
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

This $300 Motorola has a better display and battery life than iPhone 16e - at half the price

Collaboration 2.0

The Moto G Power (2025) undercuts the competition with its 6.8-inch Full HD+ display and multi-day battery life.

IT 320
article thumbnail

A data leak exposes the operations of the Chinese private firm TopSec, which provides Censorship-as-a-Service

Security Affairs

A leak suggests that Chinese cybersecurity firm TopSec offers censorship-as-a-service services, it provided bespoke monitoring services to a state-owned enterprise facing a corruption scandal. SentinelLABS researchers analyzed a data leak that suggests that the Chinese cybersecurity firm TopSec offers censorship-as-a-service services. The origin of the data leak is unclear, the leak is large and inconsistently formatted, complicating the full analysis.

article thumbnail

$1.4 Billion Stolen From ByBit in Biggest Crypto Theft Ever

WIRED Threat Level

Plus: Apple turns off end-to-end encrypted iCloud backups in the UK after pressure to install a backdoor, and two spyware apps expose victim dataand the identities of people who installed the apps.

article thumbnail

Black Basta Leaks Reveal Targeting, Planning, Escalation

Data Breach Today

Group Cross-Referenced Open-Source Victim Intelligence With Infostealer Hauls The leak of 200,000 internal chat messages for the Black Basta operation provides an overview of how a modern ransomware group organizes itself to take down victims in the most efficient, profit-maximizing manner possible, using a variety of tactics that should be, in theory, easy to repel.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

KnowBe4's Interview of a North Korean Fake Employee

KnowBe4

You would think with all the global press we have received because of our public announcement of how we mistakenly hired a North Korean fake employee in July 2024, followed by our multiple public presentations and a whitepaper on the subject, that the North Korean fake employees would avoid applying for jobs at KnowBe4.

article thumbnail

6 features I wish Linux would borrow from MacOS

Collaboration 2.0

If Linux borrowed these features from MacOS, it would be unstoppable.

IT 304
article thumbnail

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails

Security Affairs

Belgian authorities are investigating Chinese hackers for breaching its State Security Service (VSSE), stealing 10% of emails from 2021 to May 2023. The Belgian federal prosecutor’s office is probing a possible security breach on its State Security Service (VSSE) by China-linked threat actors. Chinese hackers gained access to the VSSE’s email server between 2021 and May 2023, stealing 10% of staff incoming and outgoing emails. “For nearly two years, hackers working for Chinese

Security 172
article thumbnail

A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

WIRED Threat Level

Cloud container defenses have inconsistencies that can give attackers too much access. A new company, Edera, is taking on that challenge and the problem of the male-dominated startup world.

Cloud 177
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Breach Notification Service Tackles Infostealing Malware

Data Breach Today

'Have I Been Pwned' Flags Emails Found in Infostealer Malware Logs It Obtains How bad has the information stealing malware problem become? Here's a metric: The free breach-notification service Have I Been Pwned found a single infostealer service provided "284 million unique email addresses alongside the websites they were entered into and the passwords used.

Passwords 173
article thumbnail

US Officials Recommend Using Encrypted Apps for Messaging

eSecurity Planet

Our cybersecurity expert discusses why officials are warning that unencrypted messaging apps are vulnerable to hacking, surveillance and cyberattacks. Explore the risks of popular apps and why switching to encrypted alternatives is crucial. Take control of your data and protect your privacy before its too late! The post US Officials Recommend Using Encrypted Apps for Messaging appeared first on eSecurity Planet.

article thumbnail

Windscribe VPN review: A flexible and free VPN

Collaboration 2.0

Windscribe VPN is a VPN service that offers advanced features and comes in both free and paid versions.

304
304
article thumbnail

GitVenom campaign targets gamers and crypto investors by posing as fake GitHub projects

Security Affairs

GitVenom malware campaign targets gamers and crypto investors by posing as open-source projects on GitHub. Kaspersky researchers warn of a malware campaign, dubbed GitVenom, targeting GitHub users. The threat actors behind this campaign created hundreds of fake GitHub repositories with malicious code, disguising them as automation tools, crypto bots, and hacking utilities.

IT 172
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Inside the Telegram Groups Doxing Women for Their Facebook Posts

WIRED Threat Level

A WIRED investigation goes inside the Telegram groups targeting women who joined Are We Dating the Same Guy? groups on Facebook with doxing, harassment, and sharing of nonconsensual intimate images.

Privacy 173
article thumbnail

Belgium Investigating Intelligence Agency Hack by China

Data Breach Today

Hackers Reportedly Exploited Barracuda ESG Zero-Day The Belgian government opened a federal probe into a suspected Chinese espionage campaign targeting the country's civilian intelligence service. The attack on the Belgian government aligns with the broader Chinese strategy of compromising edge devices for stealth espionage campaigns.

article thumbnail

KnowBe4 Named #1 Security Product and #2 Overall Software Product in G2’s 2025 Best Software Awards

KnowBe4

KnowBe4 has been recognized in G2s 2025 Best Software Awards, earning the top spot as the #1 Security Product and ranking #2 Overall Software Product.

article thumbnail

10 bugs still haunt Windows 11 24H2 despite multiple patches

Collaboration 2.0

Microsoft's 24H2 update for Windows 11 has been hit with one bug after another. Many have been patched, but these remain.

302
302
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

U.S. CISA adds Microsoft Power Pages flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Power Pages vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Microsoft Power Pages vulnerability, tracked as CVE-2025-24989 , to its Known Exploited Vulnerabilities (KEV) catalog. CVE-2025-24989 (CVSS score: 8.2) is an improper access control flaw in Power Pages, an unauthorized attacker could exploit the flaw to elevate privileges over

IT 163
article thumbnail

‘OpenAI’ Job Scam Targeted International Workers Through Telegram

WIRED Threat Level

An alleged job scam, led by Aiden from OpenAI, recruited workers in Bangladesh for months before disappearing overnight, according to FTC complaints obtained by WIRED.

article thumbnail

Cryptohack Roundup: $49M Infini Exploit

Data Breach Today

Also: $31M From Uranium Hack Seized, SEC Wraps Up Crypto Lawsuits This week, the $49M Infini exploit, ByBit updates, hacked Uranium funds, seized, OKX settlement, DeepSeek crypto scam. Also, the SEC dismissed Coinbase, Robinhood, Uniswap and Gemini probes as well as its crypto dealer rule. It launched a new crypto fraud unit.

IT 147