Trending Articles

article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell C is the fourth-largest mobile network operator in South Africa, , after Vodacom, MTN, and Telkom. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and international calling, SIM-only plans and device deals.

article thumbnail

Going to InfoNEXT? ARMA Has a Deal for You

Weissman's World

If youre keeping score at home, you may remember that Im speaking at InfoNEXT 2025 in a couple of weeks moderating whats shaping up to be a great panel on the subject of Information Governance and Business Resiliency. I certainly hope Ill see you there. But if youre on the fence about whether to… Read More » Going to InfoNEXT? ARMA Has a Deal for You The post Going to InfoNEXT?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What are AI agents? How to access a team of personalized assistants

Collaboration 2.0

Agentic AI is all the rage, but what can it actually do for you or your company? Here's everything you need to know.

Access 324
article thumbnail

EU Commission Publishes AI Continent Action Plan and Seeks Input

Data Matters

On April 9, 2025 the European Commission adopted a communication on the so-called AI Continent Action Plan - its strategy to shape the next phase of AI development in Europe, with consultation to follow. The Commissions declared objective is to transform the EU into a global leader in AI by fostering innovation, ensuring trustworthy AI, and enhancing competitiveness while safeguarding democratic values and cultural diversity.

article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

UK Loses Bid for Complete Secrecy Over Apple Backdoor Demand

Data Breach Today

Independent Tribunal Rules That at Least 'Bare Details' of Case Can Be Made Public The British government has lost its bid to maintain "absolute" secrecy over its attempt to compel Apple to provide backdoor access to users' encrypted data, ruled Britain's independent Investigatory Powers Tribunal. Whether any further details will get released publicly remains unclear.

More Trending

article thumbnail

AI Vulnerability Finding

Schneier on Security

Microsoft is reporting that its AI systems are able to find new vulnerabilities in source code: Microsoft discovered eleven vulnerabilities in GRUB2, including integer and buffer overflows in filesystem parsers, command flaws, and a side-channel in cryptographic comparison. Additionally, 9 buffer overflows in parsing SquashFS, EXT4, CramFS, JFFS2, and symlinks were discovered in U-Boot and Barebox, which require physical access to exploit.

Access 114
article thumbnail

How to start using the new Linux terminal on your Android device

Collaboration 2.0

Google just added a powerful new feature to Android: The Linux terminal. It's easier than you think to use and it unlocks a whole new level of control.

IT 321
article thumbnail

Homeland Security Email Tells a US Citizen to 'Immediately' Self-Deport

WIRED Threat Level

An email sent by the Department of Homeland Security instructs people in the US on a temporary legal status to leave the country. But who the email actually applies toand who actually received itis far from clear.

Security 242
article thumbnail

Microsoft Warns Ransomware Actors Exploiting Windows Flaw

Data Breach Today

Tech Giant Says Threat Actors Are Exploiting a Flaw in Widely-Targeted Windows Tool Ransomware threat actors are exploiting a zero-day vulnerability discovered in a highly targeted Windows logging system tool in a campaign in part targeting U.S. IT and real estate sectors, Microsoft confirmed in a Tuesday blog post urging customers to apply available patches.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Palo Alto warns of brute-force login attempts on PAN-OS GlobalProtect gateways indicating possible upcoming attacks

Security Affairs

Experts warn of brute-force login attempts on PAN-OS GlobalProtect gateways following increased scanning activity on its devices. Palo Alto Networks reports brute-force login attempts on PAN-OS GlobalProtect gateways. The security firm pointed out that no known vulnerability has been exploited, but monitoring and analysis continue. “Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation

Passwords 236
article thumbnail

News alert: AcceleTrex unveils referral exchange that turns trusted conversations into scalable growth

The Last Watchdog

Miami, FL, Apr. 14, 2025Today, AcceleTrex Corporation officially emerged from stealth, unveiling a first-of-its-kind platform that transforms expert referrals into a powerful growth engine for innovators. Grounded in the belief that genuine relationships drive meaningful results, AcceleTrex combines Artificial Intelligence (AI) with Actual Intelligence the practical expertise of Market Experts to provide genuine Actionable Intelligence that accelerates smarter solutions.

Marketing 100
article thumbnail

Microsoft is pushing its controversial Recall feature to Windows Insiders

Collaboration 2.0

With Recall now in preview mode for Windows Insiders on Copilot+ PCs, Microsoft is testing the waters for an official release.

IT 312
article thumbnail

Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows

WIRED Threat Level

Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.

Security 203
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

China Sort of Admits to Being Behind Volt Typhoon

Schneier on Security

The Wall Street Journal has the story : Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are continuing to escalate. The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwa

IT 89
article thumbnail

Attackers are exploiting recently disclosed OttoKit WordPress plugin flaw

Security Affairs

Threat actors are exploiting a vulnerability inthe OttoKitWordPress plugin, a few hours after public disclosure. Threat actors are exploiting a recently discovered vulnerability, tracked asCVE-2025-3102(CVSS score of 8.1) inthe OttoKit WordPress plugin (formerly SureTriggers), a few hours after public disclosure. An attacker can trigger the vulnerability to create malicious administrator users when the plugin is not configured with an API key.

article thumbnail

Breach Roundup: Port of Seattle Notifies 90,000 Victims

Data Breach Today

Also, Oracle Denies Cloud Breach, Blames Hack on Obsolete Servers This week, Port of Seattle notified victims, Oracle blamed hack on obsolete servers, Google and Microsoft released April patches, WK Kellogg breached, six arrested in Spain for AI-investment scam, Scattered Spider's "King Bob" pleaded guilty, SmokeLoader users busted.

Cloud 162
article thumbnail

Windows 11 24H2 is crashing on many PCs due to conflict with security driver

Collaboration 2.0

Microsoft is working on a fix, but here's what you can do if you get a BSOD in the meantime.

Security 308
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Gamaredon: The Turncoat Spies Relentlessly Hacking Ukraine

WIRED Threat Level

For the past decade, this group of FSB hackersincludingtraitorUkrainian intelligence officershas used a grinding barrage of intrusion campaigns to make life hell for their former countrymen and cybersecurity defenders.

article thumbnail

Europe's Energy Sector at Risk: The Critical Need for Cybersecurity

KnowBe4

Reliable energy is the backbone of any modern society. It powers our homes, industries, and economies. But what happens when this essential infrastructure becomes a target for cyberattacks? In Europe, the energy sector is facing an escalating threat landscape, with potentially dire consequences.

Risk 77
article thumbnail

Malicious NPM packages target PayPal users

Security Affairs

Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. Fortinetresearchers discovered multiple malicious NPM packages that are used to target PayPal users. The packages were uploaded to the repository in early March by a threat actor known as tommyboy_h1 and tommyboy_h2 , and were used to steal PayPal credentials and hijack cryptocurrency transfers. “Using PayPal-related names helps these malicious packages avoid detection, making it ea

IT 199
article thumbnail

Possible Russian Hackers Targeted UK Ministry of Defense

Data Breach Today

Spear-Phishing Campaign Used RomCom Malware Variant A phishing campaign wielding malware previously associated with Russian-speaking hackers targeted the U.K. Ministry of Defense in late 2024. It is unclear if the campaign is tied to a data leak of 600 armed personnel, civil servants, and defense contractors reported late last year.

Phishing 147
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New White House tariff exemptions for electronics could offer temporary break for tech

Collaboration 2.0

The White House announced a temporary exemption for smartphones, laptops, and other consumer electronics from the steep tariffs that would hike up prices for many products.

298
298
article thumbnail

The Most Dangerous Hackers You’ve Never Heard Of

WIRED Threat Level

From crypto kingpins to sophisticated scammers, these are the lesser-known hacking groups that should be on your radar.

Security 196
article thumbnail

My Take: Is Amazon’s Alexa+ a Gutenberg moment — or a corporate rerun of history’s greatest co-opt?

The Last Watchdog

Last Friday morning, April 11, I was making my way home from NTT Researchs Upgrade 2025 innovation conference in San Francisco, when it struck me that were at a watershed moment. I was reflecting on NTTs newly launched Physics of Artificial Intelligence Lab when a GeekWire article crossed my LinkedIn feed, touting a seemingly parallel initiative by Amazon.

article thumbnail

Tycoon2FA phishing kit rolled out significant updates

Security Affairs

The operators of the Phishing-as-a-Service (PhaaS) platform Tycoon2FA have rolled out significant updates to enhance its evasion capabilities. Tycoon2FA, a phishing kit discovered in 2023 by cybersecurity firm Sekoia, was recently updated to improve its evasion capabilities. The phishing kit now uses advanced evasion tactics such as a custom CAPTCHA via HTML5 canvas, invisible Unicode in obfuscated JavaScript, and anti-debugging scripts to bypass detection and hinder analysis. “Lately, the

Phishing 191
article thumbnail

Maximizing Profit and Productivity: The New Era of AI-Powered Accounting

Speaker: Yohan Lobo and Dennis Street

In the accounting world, staying ahead means embracing the tools that allow you to work smarter, not harder. Outdated processes and disconnected systems can hold your organization back, but the right technologies can help you streamline operations, boost productivity, and improve client delivery. Dive into the strategies and innovations transforming accounting practices.

article thumbnail

Attackers Maintaining Access to Fully Patched Fortinet Gear

Data Breach Today

Symbolic Links Planted by Attackers Survived Patching, Provide Read-Only Access Attackers have been using a new type of post-exploitation technique to maintain remote access to hacked Fortinet FortiGuard devices - even if they had the latest patches - by dropping symbolic links in the device's filesystem designed to survive the patching process, the vendor has warned.

Access 147
article thumbnail

5 things to do with the Linux terminal on your Android phone - including my favorite

Collaboration 2.0

Google launched a Linux terminal app for Android that gives you full command-line access. Here's what you can do with it.

Access 297
article thumbnail

CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide

WIRED Threat Level

Despite their hacktivist front, CyberAv3ngers is a rare state-sponsored hacker group bent on putting industrial infrastructure at riskand has already caused global disruption.

Security 193