Thu.Jan 16, 2025

article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” or “Trackin

article thumbnail

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

WIRED Threat Level

A breach of AT&T that exposed nearly all of the company's customers may have included records related to confidential FBI sources, potentially explaining the Bureau's new embrace of end-to-end encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prominent US law firm Wolf Haldenstein disclosed a data breach

Security Affairs

The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The law firm Wolf Haldenstein disclosed a 2023 data breach that exposed the personal information of nearly 3.5 million individuals. Wolf Haldenstein Adler Freeman & Herz LLP is a prominent U.S.-based law firm that specializes in complex class action litigation.

article thumbnail

How to sign up for the next TikTok - and why you should do it right away

Collaboration 2.0

The TikTok alternative many users are recommending is called Neptune. Join the waitlist now to snag the username you want. Here's what to do.

IT 313
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

Security Affairs

The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. The Clop ransomware group added 59 new companies to its leak site, the gain claims to have breached them by exploiting a vulnerability in Cleo file transfer products. “ We have data of many companies who use cleo.

More Trending

article thumbnail

Russia-linked APT Star Blizzard targets WhatsApp accounts

Security Affairs

The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “ Callisto “, Seaborgium , ColdRiver , and TA446, targeted government officials, military personnel,journalists and think tanks since at least 2015.

Phishing 246
article thumbnail

I gave away my Kindle and iPad within hours of testing this Android tablet

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G has become my favorite e-reader tablet for several reasons.

300
300
article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” or “Trackin

article thumbnail

Super Productivity is the ultimate task manager for your time management goals

Collaboration 2.0

When a regular task manager just isn't enough, you need something a bit more 'super' that can not only help you keep track of tasks but also time spent on tasks and much more.

291
291
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

FBI Deletes PlugX Malware from Thousands of Computers

Schneier on Security

According to a DOJ press release , the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details : To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI , at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

Access 98
article thumbnail

These Beyerdynamic headphones deliver impressively accurate sound and all-day comfort

Collaboration 2.0

Looking for a brilliant pair of studio-quality, open-back headphones? The Beyerdynamic DT 1990 Pro are some of the best that I've tested.

291
291
article thumbnail

Prominent US law firm Wolf Haldenstein disclosed a data breach

Security Affairs

The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The law firm Wolf Haldenstein disclosed a 2023 data breach that exposed the personal information of nearly 3.5 million individuals. Wolf Haldenstein Adler Freeman & Herz LLP is a prominent U.S.-based law firm that specializes in complex class action litigation.

article thumbnail

Android Automotive users are about to see a lot more apps in their vehicles

Collaboration 2.0

Google is making efforts to push more apps to the Android infotainment system without extra work from developers.

280
280
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

2025 Will Be a Brave New Tokenized World

Data Matters

Tokenization of real-world assets (RWAs) is revolutionizing the way we perceive and manage assets. Tokenized RWAs, or more simply the digital representation of physical or intangible assets using a token recorded on a blockchain, allows for the efficient recording, trading, transferring, and managing of tangible assets in a digital format. The post 2025 Will Be a Brave New Tokenized World appeared first on Data Matters Privacy Blog.

article thumbnail

This 11-in-1 docking station delivered all the ports I needed - and then some

Collaboration 2.0

Need more ports? This easy-to-use docking station from one of my favorite tech brands can help.

279
279
article thumbnail

Breach Roundup: Microsoft Makes Security Staff Cuts

Data Breach Today

Also: Intensified Russian Hacking in Ukraine, Spain's Telefnica Confirms Breach This week, Microsoft laid off security staff and released Patch Tuesday, Russian hackers intensified attacks on Ukraine in 2024, Telefnica confirmed a breach, a Tennessee mortgage leader reported a breach and the Texas AG sued Allstate over driver data collection.

Security 173
article thumbnail

It's official: All your Office apps are getting AI and a price increase

Collaboration 2.0

Every Microsoft 365 Personal and Family subscription is about to get Copilot AI features, along with a price increase of at least 30%. The global rollout comes after months of testing and is certain to be controversial.

IT 266
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Law Office Wolf Haldenstein Says Hack Affected 3.4 Million

Data Breach Today

Legal Firm Joins Other Class Action Litigators Targeted by Hackers Wolf Haldenstein Adler Freeman & Herz LLP, a law firm that represents consumers in data breach lawsuits, has reported to regulators its own 2023 hack affecting more than 3.4 million individuals. The incident isn't the first time a law firm that handles data breach litigation reported a major hack.

article thumbnail

Linux Mint 22.1 is primed and ready for release - and I'm excited

Collaboration 2.0

The latest update of the best Linux desktop distro is out and ready to go. Here's what to expect.

259
259
article thumbnail

Cryptohack Roundup: BitMEX's $100M Penalty

Data Breach Today

Also: US Govt Seeks Return of Hack Funds to Bitfinex; Mango Markets Shuts This week, BitMEX fined $100M, prosecutors sought return of Bitfinex funds, Mango Markets shut, a Web3 attack method; pastor charged in crypto scam, CFPB proposed firms refund hack victims, 2024 crime stats, Wolf Capital co-founder's guilty plea, Thai Bitcoin miners seized and a New York AG lawsuit.

Marketing 147
article thumbnail

The best password manager for families in 2025: Expert tested and reviewed

Collaboration 2.0

The best password managers provide security, privacy, and ease of use for a reasonable price. We tested the best ones to help you find what's best for your family.

Passwords 253
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Researchers Spot Serious UEFI Secure Boot Bypass Flaw

Data Breach Today

Attackers Can Employ a Vulnerable Driver to Target Most Windows and Linux Systems Researchers are warning Microsoft Windows as well as many Linux distribution users to install updates that revoke permissions for a vulnerable driver that attackers can use to target most systems, allowing them to bypass UEFI Secure Boot and install a bootkit to take full control of a system.

Security 147
article thumbnail

Can Gemini ever catch ChatGPT in the AI race? Here's where it stands now

Collaboration 2.0

Though growing in capability, Gemini still isn't as popular as competing AI apps and services.

IT 251
article thumbnail

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape

Thales Cloud Protection & Licensing

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape andrew.gertz@t Thu, 01/16/2025 - 16:30 Compliance Thales | Cloud Protection & Licensing Solutions More About This Author > If you work in compliance for a financial services organization, chances are you have been focused on the March 31st deadline for the implementation of the Payment Card Industry Data Security Standard version (PCI DSS 4.0).

article thumbnail

The best AI for coding in 2025 (and what not to use)

Collaboration 2.0

I've been subjecting chatbots to a set of real-world programming tests for 18 months now. There are two I recommend if you're looking for AI coding help - and several to avoid.

247
247
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Lessons for Cybersecurity from the American Public Health System

Adam Shostack

An important step towards cyber public health Every four years, the Computing Research Association publishes a set of Quadrenial papers that explore areas and issues around computing research with potential to address national priorities. The white papers attempt to portray a comprehensive picture of the computing research field detailing potential research directions, challenges, and recommendations.

article thumbnail

7 ways to get more out of your Bitwarden password manager

Collaboration 2.0

Bitwarden is one of the best password managers on the market, but are you using it effectively? Here are a few tips to ensure you are.

Passwords 244
article thumbnail

Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

Security Affairs

The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. The Clop ransomware group added 59 new companies to its leak site, the gain claims to have breached them by exploiting a vulnerability in Cleo file transfer products. “ We have data of many companies who use cleo.