Thu.Feb 27, 2025

article thumbnail

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails

Security Affairs

Belgian authorities are investigating Chinese hackers for breaching its State Security Service (VSSE), stealing 10% of emails from 2021 to May 2023. The Belgian federal prosecutor’s office is probing a possible security breach on its State Security Service (VSSE) by China-linked threat actors. Chinese hackers gained access to the VSSE’s email server between 2021 and May 2023, stealing 10% of staff incoming and outgoing emails. “For nearly two years, hackers working for Chinese

Security 173
article thumbnail

10 bugs still haunt Windows 11 24H2 despite multiple patches

Collaboration 2.0

Microsoft's 24H2 update for Windows 11 has been hit with one bug after another. Many have been patched, but these remain.

325
325
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elon Musk’s Starlink Is Keeping Modern Slavery Compounds Online

WIRED Threat Level

A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmarwhere tens of thousands of people are enslavedare using Starlink to get online.

Privacy 323
article thumbnail

Microsoft battles more bugs in Windows 11 24H2 with new round of patches

Collaboration 2.0

Released this week, the optional update also improves a number of features.

318
318
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Belgium Investigating Intelligence Agency Hack by China

Data Breach Today

Hackers Reportedly Exploited Barracuda ESG Zero-Day The Belgian government opened a federal probe into a suspected Chinese espionage campaign targeting the country's civilian intelligence service. The attack on the Belgian government aligns with the broader Chinese strategy of compromising edge devices for stealth espionage campaigns.

More Trending

article thumbnail

Cryptohack Roundup: $49M Infini Exploit

Data Breach Today

Also: $31M From Uranium Hack Seized, SEC Wraps Up Crypto Lawsuits This week, the $49M Infini exploit, ByBit updates, hacked Uranium funds, seized, OKX settlement, DeepSeek crypto scam. Also, the SEC dismissed Coinbase, Robinhood, Uniswap and Gemini probes as well as its crypto dealer rule. It launched a new crypto fraud unit.

IT 162
article thumbnail

This $200 Motorola is the cheap Android phone to beat in 2025 - and I love the design

Collaboration 2.0

For a budget phone, the Moto G (2025) offers outstanding battery life that lasts for days, along with a surprisingly capable camera.

282
282
article thumbnail

Suspected Data Breach Extortion Hacker Busted in Thailand

Data Breach Today

Man Accused of Hacking 90 Organizations Globally Under a Variety of Aliases A suspected hacker tied to more than 90 global data breaches has been arrested in Thailand. The Royal Thai Police and the Singapore Police Force said the 39-year-old suspect used a variety of aliases, including Altdos, Desorden, Ghostr and 0mid16B, and attempted to pressure victims into paying a ransom.

article thumbnail

How to print from an Android phone

Collaboration 2.0

If you need to print from your Android phone, you'd be surprised at how easy it is to make it work.

IT 279
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Weekly Update 441

Troy Hunt

Processing data breaches (especially big ones), can be extremely laborious. And, of course, everyone commenting on them is an expert, so there's a heap of opinions out there. And so it was with the latest stealer logs, a corpus of data that took the better part of a month to process. And then I made things confusing in various ways which led to both Disqus comment and ticket hell.

IoT 84
article thumbnail

Your Google Pixel Watch 3 is about to get a life-saving update - for free

Collaboration 2.0

This might be the Pixel Watch 3's most important update yet -- and it brings something even the Apple Watch can't do.

IT 278
article thumbnail

Mimic Gets $50M to Fight Ransomware with Millisecond Defense

Data Breach Today

Series A Investment Expands AI-Driven Cybersecurity and Threat Deflection Mimic got $50 million in Series A funding to expand its ransomware defense solutions. Backed by Google Ventures and Menlo Ventures, the company will enhance AI-driven threat detection, automate security for proprietary apps, and grow internationally to protect enterprises from ransomware attacks.

article thumbnail

Hackers stole this engineer's 1Password database. Could it happen to you?

Collaboration 2.0

A software engineer for the Disney Company unwittingly downloaded a piece of malware that turned his life upside down. Was his password manager to blame?

Passwords 269
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

How Test Time Compute Can Help Scale AI

Data Breach Today

Approach Aims to Scale AI Models by Making them Smarter Instead of Bigger Scaling AI models in size has hit a plateau. One possible solution to is time test compute, which dynamically allocates extra computational resources during inference - or the thinking phase - to refine answers. Test-time compute lets AI models allocate resources based on the problem's complexity.

130
130
article thumbnail

I speed-tested 11 browsers - and the fastest might surprise you

Collaboration 2.0

Personally, my favorite it among the slowest, but if speed is your priority, here are the browsers you should check out.

IT 262
article thumbnail

Nvidia's Huang: DeepSeek Fuels Explosion in AI Compute Needs

Data Breach Today

DeepSeek's Reasoning AI and Inference Scaling Driving Massive Demand for Compute AIs shift to reasoning models like DeepSeek is pushing compute demand to unprecedented levels, says NVIDIA CEO Jensen Huang. Blackwell chips are designed to handle inference scaling, where complex models consume 100x more compute than traditional AI. He predicts strong data center growth in 2025.

130
130
article thumbnail

You can delete personal info directly from Google Search now - and it's shockingly fast

Collaboration 2.0

This might be the simplest - and fastest - way to remove your personal information online.

IT 262
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

OpenText recognized in the Constellation ShortList™ QA Tools for NextGen Apps

OpenText Information Management

OpenText has been recognized in the Constellation ShortList QA Tools for NextGen Apps. This prestigious acknowledgment underscores a commitment to delivering comprehensive solutions that empower organizations to optimize customer experiences. OpenText Application Quality Management and OpenText Functional Testing are both recognized. Constellation Research's rigorous evaluation process considers various criteria, including AI and machine learning capabilities, global support, data management, de

article thumbnail

3 ways Amazon just leapfrogged Apple, Google, and ChatGPT in the AI race

Collaboration 2.0

The long-awaited Amazon Alexa+ upgrade is here, setting a new pace for AI voice assistants.

262
262
article thumbnail

KnowBe4 Named #1 Security Product and #2 Overall Software Product in G2’s 2025 Best Software Awards

KnowBe4

KnowBe4 has been recognized in G2s 2025 Best Software Awards, earning the top spot as the #1 Security Product and ranking #2 Overall Software Product.

article thumbnail

OpenAI finally unveils GPT-4.5. Here's what it can do

Collaboration 2.0

OpenAI says its latest model is more conversational and even hallucinates less. Here's how to access it.

IT 259
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Phishing Attack Leads to Lateral Movement in Just 48 Minutes

KnowBe4

Researchers at ReliaQuest have published a report on a phishing breach in the manufacturing sector that went from initial access to lateral movement in just 48 minutes.

article thumbnail

Most US workers don't use AI at work yet. This study suggests a reason why

Collaboration 2.0

According to a new Pew Research study, 80% of Americans don't generally use AI at work, while those who do seem unenthusiastic about its benefits.

IT 243
article thumbnail

Chinese Hackers Target Hospitals by Spoofing Medical Software

KnowBe4

A Chinese government-backed hacking group is using fake medical software to compromise hospital patients' computers, infecting them with backdoors, keyloggers, and cryptominers.

article thumbnail

This $100 Android phone reminded me of my Pixel 9 Pro in the best way

Collaboration 2.0

The NUU N30 isn't a powerhouse on paper, but it delivers reliable performance for everyday use.

Paper 243
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Jamf-powered Apple device management in healthcare

Jamf

Extend healthcare workflows to better equip clinicians and patients with Jamf apps and integrations.

40
article thumbnail

OnePlus Watch 3 vs. Google Pixel Watch 3: I tested both Android wearables, and it's a close one

Collaboration 2.0

The new OnePlus Watch 3 has the best battery life of any smartwatch I've tested, but there are other reasons to consider Google's latest smartwatch, too.

IT 242
article thumbnail

Criminal group UAC-0173 targets the Notary Office of Ukraine

Security Affairs

CERT-UA warns of UAC-0173 using DCRat malware to target Ukrainian notaries in a new attack wave since mid-January 2025. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new campaign by criminal group UAC-0173 targeting Ukrainian notaries with a remote access trojan DCRat (aka DarkCrystal RAT). The campaign started in mid-January 2025, the attack chain starts with phishing messages claiming to be sent on behalf of territorial divisions of the Ministry of Justice of Ukraine.