Trending Articles

article thumbnail

AT&T and Verizon Say Chinese Hackers Ejected From Networks

Data Breach Today

9 Telcos Have Been Breached by Beijing-Backed 'Salt Typhoon,' White House Says U.S. telecommunications giants AT&T and Verizon Communications believe they have finally ejected Chinese cyber espionage hackers from their networks. The White House said the "Salt Typhoon" nation-state hackers infiltrated at least nine U.S. telcos' infrastructure, and have been hard to eject.

article thumbnail

AI & Automation Trends: 2024 Insights & 2025 Outlook

AIIM

As we reflect on the transformative developments in AI and automation throughout 2024, several key trends have emerged that are shaping the future of information management. During a recent webinar , AIIM Florida Chapter Chairman Craig Laue and I discussed the top industry news and research of the year and what they mean for the future of the industry.

146
146
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Leaders' Guide to Selecting Imaging Technology: Leveraging TWAIN Standards

AIIM

As an Information Leader, selecting the right imaging technology for your organization is a critical decision that impacts information flow, accessibility, and management. With the rapid evolution of cloud and mobile technologies, it's crucial to choose solutions that are not only effective today but also future-proof. The TWAIN Working Group standards, particularly TWAIN Direct, offer a framework for making informed decisions.

Cloud 188
article thumbnail

AI agents might be the new workforce, but they still need a manager

Collaboration 2.0

AI agents keep getting smarter and more independent. But there is still work to be done before an agentic AI-driven workforce can truly assume a broad range of tasks.

139
139
article thumbnail

Marketing Operations Efficiency: The Essential Checklist

As marketing becomes more tech-driven, the role of marketing operations (MOps) is getting more complex. Today, the discipline is increasingly interwoven with other vital go-to-market motions — including sales and customer support — and is responsible for all business elements associated with marketing, including the tech stack. In this eBook, we’ll show you how marketing operations can create efficiencies in your tech stack, reporting, and budget that will not just improve internal processes, bu

article thumbnail

The Paper Passport Is Dying

WIRED Threat Level

Smartphones and face recognition are being combined to create new digital travel documents. The paper passports days are numbereddespite new privacy risks.

Paper 129

More Trending

article thumbnail

Palo Alto Firewalls Backdoored by Suspected Chinese Hackers

Data Breach Today

Hackers Targeted a PAN-OS Flaw Days After Its Disclosure A suspected Chinese hacking campaign that began in November is exploiting a vulnerability in Palo Alto firewalls to install a custom malware backdoor for espionage. UNC5325 activity aligns with the Chinese hacking strategy of targeting edge devices.

IT 200
article thumbnail

6 reasons why Google should switch Chromebooks from Android to Linux

Collaboration 2.0

By now, you've probably heard that Google plans to migrate Chromebooks to Android, but I believe there's a much better option that's already proven itself.

130
130
article thumbnail

US Treasury Department Admits It Got Hacked by China

WIRED Threat Level

Treasury says hackers accessed certain unclassified documents in a major breach, but experts believe the attacks impacts could prove to be more significant as new details emerge.

IT 119
article thumbnail

Pro-Russia group NoName targeted the websites of Italian airports

Security Affairs

Pro-Russia group NoName057 targets Italian sites, including Malpensa and Linate airports, in a new DDoS campaign amid rising geopolitical tensions. The pro-Russia group NoName57 continues its campaign of DDoS attacks against Italian infrastructure. This time, the group of alleged hacktivists targeted multiple websites, include the sites of Malpensa and Linate airports, as well as the site of the Ministry of Foreign Affairs (Farnesina) and the Turin Transport Group (GTT).

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Launch Supply Chain Attack Against Chrome Extensions

Data Breach Today

Users of Cyberhaven's Data-Loss Prevention Chrome Extension Among Those Targeted Multiple Chrome browser extensions have been hacked, allowing attackers to steal the data they handle, security experts have warned. Subverted extensions include a data-loss tool built by cybersecurity startup Cyberhaven, which said attackers appeared to be targeting Facebook Ads accounts.

article thumbnail

Building Information Governance in the Age of Data Lakes

AIIM

When Systems Don't Talk to Each Other In my organization, we have dozens of corporate systems, and all of them do really important things as part of the work of the organization. But if somebody wants to ask a question like, "How are we providing services into a particular community?" and "What are the types of services in a particular community we're offering over time?

article thumbnail

15 ways AI saved me time at work in 2024 - and how I plan to use it in 2025

Collaboration 2.0

In 2024, AI became truly helpful. Here are 15 clever ways I integrated it into my workflow for quicker, better results - and how you can too.

IT 129
article thumbnail

The Worst Hacks of 2024

WIRED Threat Level

From Chinese cyberspies breaching US telecoms to ruthless ransomware gangs disrupting health care for millions of people, 2024 saw some of the worst hacks, breaches, and data leaks ever.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Palo Alto Networks fixed a high-severity PAN-OS flaw

Security Affairs

Palo Alto Networks addressed a high-severity PAN-OS flaw that could trigger denial-of-service (DoS) on vulnerable devices. Palo Alto Networks addressed a high-severity flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), in PAN-OS software that could cause a denial-of-service (DoS) condition. An unauthenticated attacker can exploit this vulnerability to reboot the firewall by sending a malicious packet through its data plane.

article thumbnail

Palo Alto Patches Exploited Firewall Denial-of-Service Flaw

Data Breach Today

Unauthenticated Attackers Using Malicious Packet to Crash Devices' PAN-OS Software Security giant Palo Alto Networks is pushing updates to fix a denial-of-service vulnerability in its PAN-OS device software that unauthenticated, remote attackers have been actively exploiting. The flaw can be triggered by sending firewalls "a malicious packet," which will crash the devices.

Security 173
article thumbnail

Casino Players Using Hidden Cameras for Cheating

Schneier on Security

The basic strategy is to place a device with a hidden camera in a position to capture normally hidden card values, which are interpreted by an accomplice off-site and fed back to the player via a hidden microphone. Miniaturization is making these devices harder to detect. Presumably AI will soon obviate the need for an accomplice.

99
article thumbnail

How to generate your own music with the AI-powered Suno

Collaboration 2.0

Suno will use its AI skills to create a song based on your description of a specific genre and topic.

IT 126
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The EDPB Opinion on training AI models using personal data and recent Garante fine – lawful deployment of LLMs

Data Protection Report

The final days of 2024 were very eventful in the world of AI and data protection: the European Data Protection Board ( EDPB ) published its Article 64 General Data Protection Regulation ( GDPR) opinion on training AI models using personal data (the EDPB Opinion). Two days later, the Italian Garante per la Protezione dei Dati Personali ( Garante ) announced a fine of 15 million and corrective measures imposed on OpenAI.

article thumbnail

A ransomware attack disrupted services at Pittsburgh Regional Transit

Security Affairs

A ransomware attack on Pittsburgh Regional Transit (PRT) was the root cause of the agency’s service disruptions. On December 23, 2024, Pittsburgh Regional Transit (PRT) announced it was actively responding to a ransomware attack that was first detected on Thursday, December 19. Pittsburgh Regional Transit (PRT) is the public transportation agency that serves the Pittsburgh metropolitan area in Pennsylvania, USA.

article thumbnail

Finland Boards Tanker Suspected of Rupturing Undersea Cables

Data Breach Today

The 'Eagle S' Forms Part of Sanctions-Busting Russian Shadow Fleet, Says EU Finnish police boarded Thursday an oil tanker suspected of rupturing telecommunications and electricity cables running beneath the Baltic Sea in a Christmas Day incident. They escorted the tanker, the Eagle S, into Finnish waters as part of a criminal investigation into damage caused on Wednesday.

162
162
article thumbnail

Scams Based on Fake Google Emails

Schneier on Security

Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The latest MX Linux turns Xfce into a desktop anyone can use

Collaboration 2.0

If you're looking for a Linux distribution with a user-friendly desktop that's also very highly customizable, MX Linux presents the Xfce desktop in a way that anyone can use and grow with over time.

121
121
article thumbnail

Hey, Maybe It's Time to Delete Some Old Chat Histories

WIRED Threat Level

Your messages going back years are likely still lurking online, potentially exposing sensitive information you forgot existed. But there's no time like the present to do some digital decluttering.

IT 88
article thumbnail

A cyber attack hit Japan Airlines delaying ticket sales for flights

Security Affairs

A cyberattack hit Japan Airlines (JAL), causing the suspension of ticket sales for flights departing on Thursday. A cyber attack hit Japan Airlines (JAL) on Thursday, the offensive began at 7:24 a.m. and impacted internal and external systems. The Associated Press reported that the attack disabled a router, causing system malfunctions and suspending ticket sales for Thursday departures.

Sales 122
article thumbnail

Breach Roundup: Cyberattack Disrupts Japan Airlines

Data Breach Today

Also, US Court Rules NSO Group Violated Hacking Laws With Pegasus Spyware This week, cyberattack disrupts Japan Airlines, U.S. court rules NSO Group violated hacking laws, the European Space Agencys web store hacked, FTC orders Marriott to overhaul data security, Sophos patches critical firewall flaws and Apache fixes critical SQL injection in Traffic Control.

Security 162
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Salt Typhoon’s Reach Continues to Grow

Schneier on Security

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

article thumbnail

The 4 most Windows-like Linux distros to try because change is hard

Collaboration 2.0

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

120
120
article thumbnail

FTC Warns Immigrants About Rising Social Media Immigration Scams

KnowBe4

The Federal Trade Commission (FTC) has issued an urgent warning about a surge in immigration scams targeting immigrants and their families on social media platforms like Facebook.