Wed.Mar 26, 2025

article thumbnail

Google fixed the first actively exploited Chrome zero-day since the start of the year

Security Affairs

Google fixed a flaw in the Chrome browser for Windows that was actively exploited in attacks targeting organizations in Russia. Google has released out-of-band fixes to address a high-severity security vulnerability, tracked as CVE-2025-2783 , in Chrome browser for Windows. The flaw was actively exploited in attacks targeting organizations in Russia.

Libraries 288
article thumbnail

GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority

The Last Watchdog

It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as doctors and nurses scramble to stabilize critical patients without access to real-time data. Admissions come to a standstill.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Authentication bypass CVE-2025-22230 impacts VMware Windows Tools

Security Affairs

Broadcom addressed a high-severity authentication bypass vulnerability, tracked as CVE-2025-22230, in VMware Tools for Windows. Broadcom released security updates to address a high-severity authentication bypass vulnerability, tracked as CVE-2025-22230 (CVSS score 9.8), impacting VMware Tools for Windows. VMware Tools for Windows is a suite of utilities that enhances the performance and usability of virtual machines (VMs) running on VMware hypervisors like VMware Workstation, Fusion, and vSphere

article thumbnail

How to transform your old, obsolete Kindle into the ultimate open-source reader

Collaboration 2.0

Your old Kindle's not dead yet; it's just waiting for a jailbreak. Let me show you how it's done.

IT 316
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

AI Data Poisoning

Schneier on Security

Cloudflare has a new feature —available to free users as well—that uses AI to generate random pages to feed to AI web crawlers: Instead of simply blocking bots, Cloudflare’s new system lures them into a “maze” of realistic-looking but irrelevant pages, wasting the crawler’s computing resources. The approach is a notable shift from the standard block-and-defend strategy used by most website protection services.

Honeypots 126

More Trending

article thumbnail

Malicious Android Apps Evade Detection: McAfee

Data Breach Today

Cybersecurity Firm Finds Rash of Apps Coded With Microsoft.NET MAUI Cybercriminals are using a Microsoft cross-platform app development framework to create Android malware that bypasses security measures, evades detection and steals user data. Malicious apps spotted by McAfee researchers aren't traditional Android malware.

article thumbnail

This smart ring I tested competes with Oura at half the price and no subscription

Collaboration 2.0

The affordable RingConn Gen 2 packs impressive health-tracking features that rival top-tier competitors. For a limited time, you can save $20 on one.

250
250
article thumbnail

Mercenary Hacking Group Appears to Embrace Ransomware

Data Breach Today

Highly Targeted Ransomware Hit Traced to Long-Running Cyberespionage Group A stealthy group of mercenary hackers active since 2018 appears to have diversified into hitting hypervisors with ransomware via highly targeted attacks. Researchers said they tracked the hit to a corporate espionage team tracked as RedCurl.

article thumbnail

Trisquel Linux handles both your desktop and server needs - or does it?

Collaboration 2.0

If you want to install a Linux desktop and server, you'd typically choose two different distributions. With Trisquel, you get both in one. But are the tradeoffs worth it?

IT 235
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Advanced Fined 3 Million Pounds Over 2022 Ransomware Hack

Data Breach Today

UK ICO Says Advanced's Security Measures 'Fell Seriously Short' A British IT service company must pay a 3.07 million pound fine for a 2022 ransomware hack that exposed medical records of tens of thousands of National Health Service patients. Hackers breached the Advanced system through a user account that did not have multifactor authentication in place.

article thumbnail

This $50 anti-spy camera finder I recommend to travelers is cheaper than ever - how it works

Collaboration 2.0

Ads for hidden cameras and bug detectors are everywhere on social media, promising security in hotels, Airbnbs, and homes. Curious, I put one to the test.

IT 227
article thumbnail

Don’t Respond to Ransomware Attackers With AI, Experts Say

eSecurity Planet

When in a stressful situation, your brain can feel scrambled, making it hard to think clearly about the next move. Turning to an artificial intelligence chatbot like ChatGPT for help might be tempting. But if ransomware attackers threaten you, that may not be a good idea. Typically, AI is not sensitive enough to pick up on human emotion or provide the necessary nuance required to connect with threat actors and diffuse the situation, and this is where it can escalate, Moty Cristal, from ransomwar

article thumbnail

These comfortable headphones I watch movies with just got a great deal

Collaboration 2.0

The Sonos Ace offer great sound, immense comfort, and a sleek design. You can get them for $70 off during Amazon's Big Spring Sale.

Sales 219
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Faster Engineering Projects: It’s Time to Automate Project Turnover

Synergis Software

Over the summer our local McDonalds closed for two months to expand their drive-thru from one to two lanes. I wondered then, how could a business afford to be closed for so long and during peak outdoor hours? The average McDonalds makes $6,500/day. At a cost of 60 days, thats approximately $390K in lost revenue, and thats not including the cost of the construction.

article thumbnail

You can access free Gemini Gems on Android and iOS now - where to find them

Collaboration 2.0

Google now lets anyone make their own customized AI assistants for free.

Access 218
article thumbnail

Reading the Tea Leaves in FDA's AI-Enabled Device Guidelines

Data Breach Today

While recent draft guidance from the Food and Drug Administration on artificial intelligence-enabled medical devices is non-binding, the document signals that the agency is intensifying its regulatory scrutiny of these technologies, said Dr. Scott Schell of IT consulting firm Cognizant.

article thumbnail

I'm a command-line pro and this is the best terminal app I've ever used, thanks to AI

Collaboration 2.0

This handy terminal app saves you time by using AI to explain commands, scripts, and code. It even taught this old pro new tricks.

IT 214
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Auto Lending Fraud Climbs 16.5% to $9.2B in 2024

Data Breach Today

Credit Washing, Synthetic ID Fraud and Bust-Out Fraud Are Among the Usual Suspects Auto lenders are grappling with a surge in complex fraud schemes that are not only increasing in volume but also exploiting systemic blind spots. From coordinated bust-out rings to fake dealership websites, fraudsters are expanding their playbooks with bold new tactics.

130
130
article thumbnail

This is the most helpful new Linux tool I've tried in years - here's why and how I use it

Collaboration 2.0

This Linux tool is my new go-to for easier searching, upgrading, and automating my system. Anyone who works on a Linux desktop should try it.

IT 214
article thumbnail

Google Launches Reasoning AI Model

Data Breach Today

Benchmark Results From Google Show Gemini 2.5 Outperforming Rivals Google introduced on Tuesday its "most intelligent" AI reasoning model yet, designed to pause and "think" before responding. The model ships with a 1 million-token context window, capable of processing about 750,000 words in a single input - more than the entire Lord of the Rings series.

IT 130
article thumbnail

AI for the world, or just the West? How researchers are tackling Big Tech's global gaps

Collaboration 2.0

Western companies' one-size-fits-all AI strategies don't serve many of the world's populations. These African researchers are working to change that.

207
207
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Go ahead for BL’s £1.1bn London extension

CILIP

Go ahead for BLs 1.1bn London extension THE developer partnering with the British Library to extend its St Pancras site has confirmed that the project will proceed with a view to opening to the public in 2032. The development combines public and commercial space around a redesigned full-height foyer and public entrances designed to attract the public and the worlds most ambitious and successful life sciences companies.

article thumbnail

AI won't take your job, but this definitely will

Collaboration 2.0

Here's what's quietly reshaping the job market, and it's happening faster than you think.

Marketing 205
article thumbnail

Introducing the DEF CON 32 Hackers' Almanack

Adam Shostack

Grateful to introduce the Hackers' Almanack! I wrote the introduction for The DEF CON 32 Hackers Almanack ! Every year, thousands of hackers converge in Las Vegas for a joyous, crazy exploration of the edges of technology otherwise fondly called Hacker Summer Camp. They include many communities with different perspectives, all with a core commitment to hacking and exploration.

article thumbnail

5 best Linux distros for staying anonymous - when a VPN isn't enough

Collaboration 2.0

Need serious privacy on a regular basis? Work with these distributions, and you'll leave no trace. There's even a Windows and MacOS option.

Privacy 203
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Why OT Cybersecurity Careers Demand a Dual Lens

Data Breach Today

Takeaways From CS4CA USA: OT Security Must Bridge the Gap Between IT and Operations At the CS4CA USA Summit in Houston this week, this was the common refrain heard from practitioners - protecting industrial environments demands more than traditional IT know-how. It requires a hybrid expertise, one that speaks both the language of data packets and programmable logic controllers.

article thumbnail

Focal's popular wireless Bathys return - this time with more features and a beefed up price tag

Collaboration 2.0

Focal announces the Bathys MG, the second iteration of the company's wireless headphones. The audio pioneer promises to do the impossible: bring hi-fi audio to wireless headphones.

196
196
article thumbnail

Exclusive: Eve, AI legal platform, raises $47 million Series A led by Andreessen Horowitz

Info Source

For about a year, I’ve been hearing that lawyers are using AI in droves. But it wasnt until I talked to Jennifer Gore last week that I started to understand what that meant in practice. “You can ask, ‘What are the bad facts in my case?’ and itll tell you all the issues that are going to be brought up by the other side,” said Gore, founder of Atlanta Personal Injury Law Group, talking about her legal AI platform of choice, startup Eve.