Trending Articles

article thumbnail

AT&T and Verizon Say Chinese Hackers Ejected From Networks

Data Breach Today

9 Telcos Have Been Breached by Beijing-Backed 'Salt Typhoon,' White House Says U.S. telecommunications giants AT&T and Verizon Communications believe they have finally ejected Chinese cyber espionage hackers from their networks. The White House said the "Salt Typhoon" nation-state hackers infiltrated at least nine U.S. telcos' infrastructure, and have been hard to eject.

article thumbnail

AI & Automation Trends: 2024 Insights & 2025 Outlook

AIIM

As we reflect on the transformative developments in AI and automation throughout 2024, several key trends have emerged that are shaping the future of information management. During a recent webinar , AIIM Florida Chapter Chairman Craig Laue and I discussed the top industry news and research of the year and what they mean for the future of the industry.

146
146
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI agents might be the new workforce, but they still need a manager

Collaboration 2.0

AI agents keep getting smarter and more independent. But there is still work to be done before an agentic AI-driven workforce can truly assume a broad range of tasks.

131
131
article thumbnail

Facebook and Instagram Ads Push Gun Silencers Disguised as Car Parts

WIRED Threat Level

A network of Facebook pages has been advertising fuel filters that are actually meant to be used as silencers, which are heavily regulated by US law. Even US military officials are concerned.

Military 130
article thumbnail

Enterprise ABM Marketing Tools: A Marketer's Guide

Savvy B2B marketers know that a great account-based marketing (ABM) strategy leads to higher ROI and sustainable growth. In this guide, we’ll cover: What makes for a successful ABM strategy? What are the key elements and capabilities of ABM that can make a real difference? How is AI changing workflows and driving functionality? This Martech Intelligence Report on Enterprise Account-Based Marketing examines the state of ABM in 2024 and what to consider when implementing ABM software.

article thumbnail

News alert: SquareX exposes OAuth attack on Chrome extensions — days before a major breach

The Last Watchdog

Palo Alto, Calif., Dec. 30, 2024, CyberNewswire — SquareX , an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension developers aimed at taking over the Chrome Extension from the Chrome Store. On December 25th, 2024, a malicious version of Cyberhavens browser extension was published on the Chrome Store that allowed the attacker to hijack authenticated sessions and ex

Phishing 130

More Trending

article thumbnail

Building Information Governance in the Age of Data Lakes

AIIM

When Systems Don't Talk to Each Other In my organization, we have dozens of corporate systems, and all of them do really important things as part of the work of the organization. But if somebody wants to ask a question like, "How are we providing services into a particular community?" and "What are the types of services in a particular community we're offering over time?

article thumbnail

5 lightweight Linux distributions with very low system requirements

Collaboration 2.0

If you have an aging computer and want to give it new life, there are plenty of lightweight Linux distributions that will serve you for years to come.

IT 127
article thumbnail

US Treasury Department Admits It Got Hacked by China

WIRED Threat Level

Treasury says hackers accessed certain unclassified documents in a major breach, but experts believe the attacks impacts could prove to be more significant as new details emerge.

IT 121
article thumbnail

Google Is Allowing Device Fingerprinting

Schneier on Security

Lukasz Olejnik writes about device fingerprinting, and why Google’s policy change to allow it in 2025 is a major privacy setback.

Privacy 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Launch Supply Chain Attack Against Chrome Extensions

Data Breach Today

Users of Cyberhaven's Data-Loss Prevention Chrome Extension Among Those Targeted Multiple Chrome browser extensions have been hacked, allowing attackers to steal the data they handle, security experts have warned. Subverted extensions include a data-loss tool built by cybersecurity startup Cyberhaven, which said attackers appeared to be targeting Facebook Ads accounts.

article thumbnail

Pro-Russia group NoName targeted the websites of Italian airports

Security Affairs

Pro-Russia group NoName057 targets Italian sites, including Malpensa and Linate airports, in a new DDoS campaign amid rising geopolitical tensions. The pro-Russia group NoName57 continues its campaign of DDoS attacks against Italian infrastructure. This time, the group of alleged hacktivists targeted multiple websites, include the sites of Malpensa and Linate airports, as well as the site of the Ministry of Foreign Affairs (Farnesina) and the Turin Transport Group (GTT).

article thumbnail

6 reasons why Google should switch Chromebooks from Android to Linux

Collaboration 2.0

By now, you've probably heard that Google plans to migrate Chromebooks to Android, but I believe there's a much better option that's already proven itself.

127
127
article thumbnail

Hey, Maybe It's Time to Delete Some Old Chat Histories

WIRED Threat Level

Your messages going back years are likely still lurking online, potentially exposing sensitive information you forgot existed. But there's no time like the present to do some digital decluttering.

IT 107
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

FTC Warns Immigrants About Rising Social Media Immigration Scams

KnowBe4

The Federal Trade Commission (FTC) has issued an urgent warning about a surge in immigration scams targeting immigrants and their families on social media platforms like Facebook.

article thumbnail

36 Chrome Extensions Compromised in Supply Chain Attack

Data Breach Today

Developers Listed as Public Contact Points Targeted in Phishing Campaign A supply chain attack that subverted legitimate Google Chrome browser extensions to inject data-stealing malware is more widespread than security researchers first suspected. So far researchers have identified 36 subverted extensions collectively used by 2.6 million people.

Phishing 162
article thumbnail

LDAPNightmare, a PoC exploit targets Windows LDAP flaw CVE-2024-49113

Security Affairs

Experts warn of a new PoC exploit, LDAPNightmare, that targets a Windows LDAP flaw (CVE-2024-49113), causing crashes & reboots. The vulnerability CVE-2024-49113 (CVSS score of 7.5), namedLDAPNightmare, is a Windows Lightweight Directory Access Protocol (LDAP) Denial of Service flaw that was discovered by the researcher Yuki Chen. An attacker can exploit the now-patched vulnerability to trigger a denial of service condition.

IT 117
article thumbnail

The 4 most Windows-like Linux distros to try because change is hard

Collaboration 2.0

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

113
113
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Microsoft Can Fix Ransomware Tomorrow

Adam Shostack

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow. My latest article at Dark Reading is Microsoft Can Fix Ransomware Tomorrow. It starts: Recently, I was at a private event on security by design. I explained that Microsoft could fix ransomware tomorrow, and was surprised that the otherwise well-informed people I was speaking to hadn't heard about this approach.

article thumbnail

Tax-Themed Phishing Campaign Delivers Malware Via Microsoft Management Console Files

KnowBe4

Securonix warns that tax-themed phishing emails are attempting to deliver malware via Microsoft Management Console (MSC) files.

Phishing 103
article thumbnail

US CISA Issues Final Cyber Rules for Restricted Bulk Data

Data Breach Today

Cyber Defense Agency Aims to Bolster Protections Against Chinese Intrusion The Cybersecurity and Infrastructure Security Agency is issuing final rules to safeguard U.S. sensitive data from potential Chinese intrusions, requiring Americans involved in restricted transactions with Chinese entities to adopt stringent cybersecurity measures.

article thumbnail

Salt Typhoon’s Reach Continues to Grow

Schneier on Security

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How I easily added AI to my favorite Microsoft Office alternative

Collaboration 2.0

If you're a fan of OnlyOffice Desktop Editors and AI, you'll be thrilled to know those two things have come together to make your life a bit easier. Here's how I did it in four easy steps.

IT 107
article thumbnail

Californians Say X Blocked Them From Viewing Amber Alert About Missing 14 Year-Old

WIRED Threat Level

Many people reported they hit a screen preventing them from seeing the alert unless they signed in.

article thumbnail

The EDPB Opinion on training AI models using personal data and recent Garante fine – lawful deployment of LLMs

Data Protection Report

The final days of 2024 were very eventful in the world of AI and data protection: the European Data Protection Board ( EDPB ) published its Article 64 General Data Protection Regulation ( GDPR) opinion on training AI models using personal data (the EDPB Opinion). Two days later, the Italian Garante per la Protezione dei Dati Personali ( Garante ) announced a fine of 15 million and corrective measures imposed on OpenAI.

article thumbnail

Finland Suspects Eight in Deep-Sea Cable Sabotage Incident

Data Breach Today

Suspect Crew Members of the Eagle S Cannot Leave the Ship Finnish police say they've identified as suspects eight crew members of an oil tanker linked to a Russian "shadow fleet" of sanctions busting ships in an investigation into an incident that broke submarine cables in the Baltic Sea. Authorities escorted the tanker into Finnish waters on Dec. 25.

147
147
article thumbnail

4 AI Hacks to Make Sales Teams More Efficient

Over the last two years, there’s been a 76 percent increase in AI adoption across sales organizations. The reason for its rise? AI increases teams’ productivity by predicting and automating actions that require manual effort. In other words, the research that takes reps hours, AI can do in seconds. For sales teams, AI opens up a world of new possibilities, including automating outreach, identifying best-fit buyers, and keeping CRMs flush with fresh data.

article thumbnail

DoubleClickjacking allows clickjacking on major websites

Security Affairs

The “DoubleClickjacking” exploit bypasses protections on major websites, using a double-click sequence for clickjacking and account takeover attacks. DoubleClickjackingis a technique that allows attackers to bypass protections on major websites by leveraging a double-click sequence. Attackers can exploit the technique to facilitate clickjacking attacks and account takeovers on almost all major websites.

article thumbnail

The latest MX Linux turns Xfce into a desktop anyone can use

Collaboration 2.0

If you're looking for a Linux distribution with a user-friendly desktop that's also very highly customizable, MX Linux presents the Xfce desktop in a way that anyone can use and grow with over time.

107
107
article thumbnail

ShredOS

Schneier on Security

ShredOS is a stripped-down operating system designed to destroy data. GitHub page here.

88