Mon.Dec 16, 2024

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Continuing our look back at 2024, part two of Last Watchdogs year-ender roundtable turns its focus to emerging threats vs. evolving defense tactics. Part two of a four-part series The explosion of AI-driven phishing, insider threats, and business logic abuse has forced a shift toward more proactive, AI-enhanced defenses. The drivers are intensifying.

Security 130
article thumbnail

Report claims that Serbian authorities abused Cellebrite tool to install NoviSpy spyware

Security Affairs

Researchers warn of previously undetected surveillance spyware, named NoviSpy, that was found infecting a Serbian journalist’s phone. In February 2024, Serbian journalist Slavia Milanov was summoned to a police station after a routine traffic stop. After the police released him, Milanov noticed suspicious changes to his phone settings, such as disabled data and Wi-Fi.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Clop Ransomware Takes Responsibility for Cleo Mass Exploits

Data Breach Today

article thumbnail

Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets

WIRED Threat Level

Digital license plates sold by Reviver, already legal to buy in some states and drive with nationwide, can be hacked by their owners to evade traffic regulations or even law enforcement surveillance.

Security 108
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

European Union Sanctions Russian Malicious Cyber Actors

Data Breach Today

100
100

More Trending

article thumbnail

Winnti-Like Glutton Backdoor Targets Cybercriminals

Data Breach Today

100
100
article thumbnail

Finally, I found a wireless Android Auto adapter that's snappy, functional, and won't break the bank

Collaboration 2.0

83
article thumbnail

Arctic Wolf to Buy Cylance for $160M to Boost AI-Driven XDR

Data Breach Today

100
100
article thumbnail

The best cheap gaming PCs of 2024: Expert tested and recommended

Collaboration 2.0

81
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CISA Urges Enhanced Coordination in Incident Response Plan

Data Breach Today

100
100
article thumbnail

Lost luggage? Apple AirTag users can now share location with these airlines

Collaboration 2.0

78
article thumbnail

Why AI Adoption Stalls: Data, Talent and Strategy Gaps

Data Breach Today

100
100
article thumbnail

How to run a Windows app on Linux with Wine

Collaboration 2.0

75
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

ConnectOnCall data breach impacted over 900,000 individuals

Security Affairs

ConnectOnCall disclosed a data breach impacting over 900,000 individuals, exposing their personal information. ConnectOnCall is a telehealth platform and after-hours on-call answering service designed to enhance communication between healthcare providers and patients. It offers automated patient call tracking, HIPAA-compliant chat, and integrates with electronic health record (EHR) systems to streamline after-hours calls and care coordination.

article thumbnail

I converted this Mini PC from Windows to Linux, and it came alive. Here's how

Collaboration 2.0

IT 75
article thumbnail

Short-Lived Certificates Coming to Let’s Encrypt

Schneier on Security

Starting next year : Our longstanding offering won’t fundamentally change next year, but we are going to introduce a new offering that’s a big shift from anything we’ve done before—short-lived certificates. Specifically, certificates with a lifetime of six days. This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event.

article thumbnail

The best 85-inch TVs of 2024: Expert tested and recommended

Collaboration 2.0

75
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Why every organization needs an AI governance council: Orchestrating data & AI oversight across your organization

Collibra

Imagine this: A talent recruiter adopts an AI-powered hiring assistant, streamlining candidate screening and saving time. Initially, it feels revolutionary. But without proper oversight, the assistant begins reinforcing biases, rejecting qualified candidates based on gender, ethnicity or age. What starts as a productivity boost quickly becomes an organizational risk, raising concerns about fairness and accountability.

article thumbnail

How to factory reset your Android phone without unlocking it

Collaboration 2.0

IT 74
article thumbnail

Where did the year go? OpenText Content Management for Human Resources CE 24.4

OpenText Information Management

We've released numerous features and product updates in the last 12 months, along with hundreds of fixes, to enhance SAP SuccessFactors Extended ECM by OpenText and make it more flexible and performant for our clients. CE 24.4 includes not only these past improvements but also brings a brand-new list of features. Designed to reduce maintenance, enhance accessibility, and speed up HR processes, these updates will give HR professionals more time for strategic initiatives.

ECM 52
article thumbnail

This powerful firewall delivers enterprise-level security at a home office price

Collaboration 2.0

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Why You Need Cyber Resilience and Defence in Depth

IT Governance

And how to become resilient with ISO 27001 and ISO 22301 Unfortunately, even the most secure organisation can suffer an incident. The odds are simply stacked against you: While you need to protect all your assets from all types of threat, an attacker needs only one exploitable weakness to get into your systems. Plus, any security measure you implement is only designed to stop, at most, a handful of threats and thats assuming it was both correctly implemented and still doing its job.

Risk 53
article thumbnail

Search ChatGPT now available to free users on the 8th day of OpenAI

Collaboration 2.0

73
article thumbnail

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage

Thales Cloud Protection & Licensing

article thumbnail

I tested a rollable Android tablet - these 6 use cases impressed me the most

Collaboration 2.0

67
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Top 5 tech predictions for the energy and resources sector in 2025

OpenText Information Management

The energy and resources sector is undergoing a profound transformation driven by the global push toward sustainability, energy technological advancements, geopolitical risks, and increasing regulatory pressures in some areas of the world. In 2025, the continued evolution of the global energy mix, the rise of distributed energy resources (DERs) and the shift to decarbonized energy are reshaping industry operations across the entire sector.

article thumbnail

I still recommend this TCL TV model from last year - especially at up to $3,000 off right now

Collaboration 2.0

56
article thumbnail

Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise

Security Affairs

40