Trending Articles

article thumbnail

U.S. CISA adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Apache Tomcat path equivalence vulnerability, tracked as CVE-2025-24813 , to its Known Exploited Vulnerabilities (KEV) catalog. The Apache Tomcat vulnerability CVE-2025-24813 was recently disclosed and is being actively exploited just 30 hours after a public PoC was released.

IT 273
article thumbnail

I clicked on four sneaky online scams on purpose - to show you how they work

Collaboration 2.0

What happens when you get fooled by an online scam that lands in your email or text messages? I'll show you. Caution: Don't try this at home.

322
322
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

WIRED Threat Level

Xiaofeng Wang, a longtime computer science professor at Indiana University, has disappeared along with his wife, and their profiles on the school's website were wiped ahead of recent FBI raids.

article thumbnail

Hacker Leaks 270,000 Samsung Customer Records—Stolen Credentials Were Left Unchecked for Years

eSecurity Planet

In a troubling security breach, a hacker exposed the personal data of over 270,000 Samsung customers in Germany, freely dumping it on the internet. The hack, attributed to a cybercriminal operating under the alias GHNA, occurred when the attacker accessed a system used by Samsungs German customer service. According to cybersecurity firm Hudson Rock, the hack was made possible by a set of stolen credentials compromised in 2021.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

News alert: YRIKKA’s ‘Red Teaming’ API advances AI safety, reliability in high-stakes applications

The Last Watchdog

New York, NY, Apr. 3, 2025 YRIKKA has released the first publicly available API for agentic red teaming of Visual AI assets. This release comes at the heels of YRIKKA successfully raising its pre-seed funding round of $1.5M led by Focal and Garuda Ventures. The company was founded by Dr. Kia Khezeli (CEO) and Dr. John Kalantari (CTO), both of whom previously led machine learning projects with the Mayo Clinic, NASA, Intel, and Google.

Marketing 130

More Trending

article thumbnail

Gemini Pro 2.5 is a stunningly capable coding assistant - and a big threat to ChatGPT

Collaboration 2.0

Google's previous AIs miserably failed my usual AI coding tests but not Gemini Pro 2.5. To my amazement, it passed them all, joining only one other AI in the winner's circle.

IT 310
article thumbnail

Rational Astrologies and Security

Schneier on Security

John Kelsey and I wrote a short paper for the Rossfest Festschrift : “ Rational Astrologies and Security “: There is another non-security way that designers can spend their security budget: on making their own lives easier. Many of these fall into the category of what has been called rational astrology. First identified by Randy Steve Waldman [Wal12], the term refers to something people treat as though it works, generally for social or institutional reasons, even when theres little e

article thumbnail

EU Pumps €1.3 Billion into Cybersecurity, AI, and Digital Skills to Fortify Europe’s Tech Future

eSecurity Planet

The European Commission is making a massive 1.3 billion ($1.4 billion) bet on Europes digital future, with a strong focus on shoring up cybersecurity defenses, boosting artificial intelligence, and closing the digital skills gap. The funding, part of the Digital Europe Programme (DIGITAL) for 2025-2027, aims to strengthen Europes tech sovereignty and protect critical infrastructure from growing cyber threats.

article thumbnail

Cybersecurity Experts Slam Oracle's Handling of Big Breach

Data Breach Today

Technology Giant Accused of Using 'Wordplay' to Previously Deny Breach Reports Cybersecurity experts have slammed Oracle's handling of a large data breach that it's reportedly confirming to 140,000 affected cloud infrastructure clients - but only verbally, and not in writing - following nearly two weeks of it having denied that any such breach occurred.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

39M secrets exposed: GitHub rolls out new security tools

Security Affairs

39 Million Secrets Leaked on GitHub in 2024 GitHub found 39M secrets leaked in 2024 and launched new tools to help developers and organizations secure sensitive data in code. Microsoft-owned code hosting platform GitHub announced the discovery of 39 million secrets leaked in 2024. The exposure of this sensitive information poses a serious risk to organizations, as malicious actors are ready to exploit it in attacks.

Security 200
article thumbnail

This $80 tablet makes a great travel companion - and at this price I might get two

Collaboration 2.0

The Lenovo Tab M9 is a solid tablet for watching shows and movies with a nine-inch HD display and long battery life. Right now, it's nearly 50% off on Amazon.

IT 296
article thumbnail

An AI Image Generator’s Exposed Database Reveals What People Really Used It For

WIRED Threat Level

An unsecured database used by a generative AI app revealed prompts and tens of thousands of explicit imagessome of which are likely illegal. The company deleted its websites after WIRED reached out.

IT 204
article thumbnail

Scammers Target Netflix Users: Expert Issues Urgent Warning

eSecurity Planet

Streaming giant Netflix is at the center of a rising wave of online scams, cybersecurity experts warn. Fraudsters use increasingly sophisticated tactics from fake texts to deceptive emails and websites to steal Netflix users personal and financial information. With over 230 million subscribers worldwide, Netflix has become one of the most impersonated brands by cybercriminals.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cyber Forensic Expert in 2k Cases Faces FBI Probe

Krebs on Security

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation (FBI).

article thumbnail

Critical flaw in Apache Parquet’s Java Library allows remote code execution

Security Affairs

Experts warn of a critical vulnerability impacting Apache Parquet’s Java Library that could allow remote code execution. Apache Parquet’s Java Library is a software library for reading and writing Parquet files in the Java programming language. Parquet is a columnar storage file format that is optimized for use with large-scale data processing frameworks, such as Apache Hadoop, Apache Spark, and Apache Drill.

Libraries 169
article thumbnail

ChatGPT Plus is free for students now - how to grab this deal before finals

Collaboration 2.0

Claim this ChatGPT Plus offer before it expires. You can save $20 a month at a time when it matters most.

IT 290
article thumbnail

Cybersecurity Professor Faced China-Funding Inquiry Before Disappearing, Sources Say

WIRED Threat Level

A lawyer for Xiaofeng Wang and his wife says they are safe after FBI searches of their homes and Wangs sudden dismissal from Indiana University, where he taught for over 20 years.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft Intune Workshop - Take Control of Mobile Security

Daymark

Is your organization struggling to balance mobile security with employee productivity? Are you confident that only secure, compliant devices can access your business applications? You are not alone. In todays hybrid and mobile-first work environment, organizations face the challenge of securing corporate data while ensuring employees can work efficiently from anywhere.

MDM 79
article thumbnail

UK government tries to placate opponents of AI copyright bill

The Guardian Data Protection

Economic impact assessment is one concession aiming to head off opposition from MPs, peers and creatives such as Paul McCartney and Tom Stoppard The UK government is trying to placate peer and Labour backbencher concerns about copyright proposals by pledging to assess the economic impact of its plans. Creative professionals including Sir Paul McCartney, Sir Tom Stoppard and Kate Bush have strongly criticised ministers proposals to let artificial intelligence companies train their models on copyr

article thumbnail

Port of Seattle ‘s August data breach impacted 90,000 people

Security Affairs

Port of Seattle is notifying 90,000 people of a data breach after personal data was stolen in a ransomware attack in August 2024. In August 2024, a cyber attack hit the Port of Seattle , which also operates the Seattle-Tacoma International Airport. The attack impacted websites and phone systems. According to The Seattle Times, the cyber attack disrupted travel plans.

article thumbnail

New to Linux? 4 things to focus on before you switch

Collaboration 2.0

It's important to narrow your focus when choosing your first distribution. Here's how to do that.

IT 285
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Experts Warn Congress Another Salt Typhoon Attack Is Coming

Data Breach Today

Chinese Hackers Are Pre-Positioned, and Top Officials Could Be Making Matters Worse Experts told lawmakers on Wednesday that without urgent federal action to strengthen cyber defenses and additional efforts to improve the cybersecurity practices of some of the highest ranking government officials, another Salt Typhoon attack could be just around the corner.

article thumbnail

The Heart of Information Management: Focus on the Problem, Not the Technology

AIIM

In my decades of experience in information management, one truth has remained constant: we need to focus on the problem trying to be solved, not the new and shiny object - even if that object is AI.

article thumbnail

Stay ahead with Titanium X and OpenText Cybersecurity Cloud

OpenText Information Management

Cybersecurity threats dont stand still - and neither do we. Since Cloud Editions (CE) 23.1, OpenText Cybersecurity has delivered continuous innovation to help organizations detect threats accurately and proactively, respond immediately and strategically, and adapt faster to continually improve their security posture. Because in todays environment, a security-first mindset isnt optional - its the difference between preventing threats and recovering from them.

Cloud 69
article thumbnail

Apple backported fixes for three actively exploited flaws to older devices

Security Affairs

Apple backports three critical vulnerabilities actively exploited in attacks against older iOS and macOS models. Apple has backported fixes for three actively exploited vulnerabilities to older devices and OS versions. The three vulnerabilities are: CVE-2025-24085 (CVSS score: 7.3) – In January, Apple released security updates to address 2025s first zero-day vulnerability, tracked as CVE-2025-24085 , actively exploited in attacks targeting iPhone users.

Security 152
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

5 tools I trust to keep my online conversations private and anonymous

Collaboration 2.0

Privacy matters. These apps and services help you communicate without putting your identity or data at risk from prying eyes.

article thumbnail

Check Point Breach 'Very Pinpointed Event'

Data Breach Today

Hackers Claim on BreachForums to Have Stolen 'Highly Sensitive' Data Israeli cybersecurity firm Check Point rejected Monday a hackers' assertion that he stole "highly sensitive" information offered for sale on an online marketplace for illicit data. The incident "doesnt pose and risk or has any security implications to our customers or employees.

Sales 147
article thumbnail

Learning from Troy Hunt’s Sneaky Phish

Adam Shostack

Troy Hunt has a good post about being phished. Good on Troy for being transparent, and he talks about being tired and jet lagged, and that deserves sympathy. Attackers are sneaky. Troy honorably admits that he overrode 1Password and filled out the phishing site. In this post, I want to share why I think I wouldnt fall for this, even jet lagged. That defense is intensive sorting into folders, enabled by custom email addresses.

52