Tue.Jan 07, 2025

article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications to their users, including emails, automated phone calls and system-level messages sent to all signed-in devices.

Phishing 284
article thumbnail

FDA Warns of Cyber Risks in Guidance for AI-Enabled Devices

Data Breach Today

New Non-Binding Recommendations Target Medical Device Makers, Software Developers Manufacturers are eager to incorporate AI into a wide range of medical devices, from cardiac monitors that can spot developing heart problems to medical imaging systems that can find malignancies a radiologist might miss. The FDA released new guidance this week on how to secure these devices.

Risk 163
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolution from Physical to Digital Records Management: A Central Bank Perspective

AIIM

The Digital Transformation Challenge As Chief Information Assets Officer at the Central Bank of the Bahamas, I've witnessed firsthand the complex transition from physical to digital records. The shift isn't as simple as scanning documents - it requires a complete transformation in how we think about and manage information.

article thumbnail

T-Mobile Sued by Washington State Over 2021 Data Breach

Data Breach Today

Attorney General Accuses Telecom of Failing to Correctly Notify Millions of Victims Washington state's attorney general filed a consumer protection lawsuit against T-Mobile over a massive 2021 data breach that exposed personally identifiable information for more than 79 million consumers, alleging in part the telecom failed to correctly notify victims.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

News alert: CyTwist launches threat detection engine tuned to identify AI-driven malware in minutes

The Last Watchdog

Ramat Gan, Israel, January 7th, 2025, CyberNewswire — CyTwist , a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to develop advanced and evasive threats.

More Trending

article thumbnail

CES 2025: The 10 most impressive products so far

Collaboration 2.0

CES is in full swing, and we've seen major announcements from the likes of Samsung, Roborock, MSI, and more. Here's our roundup of the new tech you don't want to miss.

134
134
article thumbnail

New EagerBee Campaign Targeting Middle Eastern Organizations

Data Breach Today

Campaign Uses Updated Version of the Malware Plugin, Kaspersky Says Hackers are deploying an updated strain of EagerBee malware to target internet service providers and government organizations in the Middle East, warn security researchers. EagerBee operates in memory and comes with advanced stealth and security evasion capabilities.

article thumbnail

New product wows CES by fully charging a phone in under 5 seconds

Collaboration 2.0

With Swippitt, you can insert your phone into a toaster-looking contraption and get a full charge in seconds -- and it actually works.

IT 132
article thumbnail

CISA Issues New Goals to Strengthen IT Cybersecurity

Data Breach Today

CISA Urges IT and Design Sector Software Developers to Improve Cyber Hygiene The Cybersecurity and Infrastructure Security Agency is urging the information technology and design sector to strengthen foundational cybersecurity practices throughout the software development lifecycle by aiming to achieve a series of new sector-specific goals released Tuesday.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Two OTC continuous glucose monitors won awards at CES - and you can try them now

Collaboration 2.0

These over-the-counter CGMs from health brands Dexcom and Abbott make glucose monitoring affordable and accessible. Here's how they can help you - no prescription necessary.

Access 128
article thumbnail

AWS re:Invent 2024: The Future of Cloud, AI and Resilience

Data Breach Today

ISMG Compendium Showcases More Than 50 Interviews on Threats, Emerging Solutions Welcome to Information Security Media Group's AWS re:Invent 2024 Compendium featuring the latest insights from the industry's premier cloud computing conference and the perspectives of CIOs, CISOs and other technology leaders on the future of IT and how to secure it.

Cloud 130
article thumbnail

The one feature Bluesky really needs

Collaboration 2.0

You just followed a fascinating new account on Bluesky. But does that account really belong to who you think it does?

IT 126
article thumbnail

Moxa Warns of Critical Industrial Router Vulnerabilities

Data Breach Today

Flaws Enable Privilege Escalation and Remote Exploitation Taiwanese industrial computing firm Moxa Technologies is warning customers about two high-severity vulnerabilities affecting its routers and network appliances, posing significant security risks to operational technology environments.

Risk 130
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data

WIRED Threat Level

Misconfigured license-plate-recognition systems reveal the livestreams of individual cameras and the wealth of data they collect about every vehicle that passes by them.

Privacy 120
article thumbnail

Report: Flaws in Illumina DNA Sequencer Devices Allows Hacks

Data Breach Today

Eclypsium Report Describes BIOS/UEFI Issues in Illumina iSeq 100 Firmware Certain vulnerabilities in device maker Illumina's iSeq 100 DNA gene sequencer could allow hackers to overwrite the system's firmware to render the device unusable or to install a firmware implant for ongoing attacker persistence, said researchers at Eclypsium who identified the flaws.

130
130
article thumbnail

In a machine-led economy, relational intelligence is key to success

Collaboration 2.0

AI agents will change work forever. To embrace that chance, business leaders must focus on what matters most - designing and cultivating healthy and sustainable relationships.

119
119
article thumbnail

1Password Acquires Trelica to Boost SaaS Access Management

Data Breach Today

Unified Extended Access Management Platform Gains Key Integrations and Workflows The addition of Trelica allows 1Password to accelerate its extended access management roadmap by 18 months. The acquisition emphasizes simplicity for end users while unifying SaaS visibility, device management and identity security under a single solution.

Access 130
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Meta ditches fact checking for community notes - just like on X

Collaboration 2.0

Meta CEO Mark Zuckerberg cited the recent elections as a 'cultural tipping point' for restoring free speech.

114
114
article thumbnail

News Alert: Security Risk Advisors joins Microsoft Intelligent Security Association (MISA)

The Last Watchdog

Philadelphia, Pa., Jan. 7, 2025, CyberNewswire — Security Risk Advisors today announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their solutions with Microsoft Security technology to better defend mutual customers against a world of increasing cyber threats.

Risk 130
article thumbnail

Need a 10-port USB-C charger? Plugable has just the thing

Collaboration 2.0

If you could use a 10-port charger or 5-display docking station, Plugable has some CES 2025 reveals you should check out.

112
112
article thumbnail

US adds Tencent to the list of companies supporting Chinese military

Security Affairs

US adds Chinese multinational technology and entertainment conglomerate Tencent to the list of companies supporting the Chinese military. The US Department of Defense has added Chinese multinational technology and entertainment conglomerate Tencent to its “Chinese military company” list under the Section 1260 requirement. The US government does not explain the decision.

article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

The best robotics and AI tech of CES 2025

Collaboration 2.0

AI was featured in nearly every consumer tech category at CES. Here's what stood out.

111
111
article thumbnail

US Treasury Department Sanctions Chinese Company Over Cyberattacks

Schneier on Security

From the Washington Post : The sanctions target Beijing Integrity Technology Group , which U.S. officials say employed workers responsible for the Flax Typhoon attacks which compromised devices including routers and internet-enabled cameras to infiltrate government and industrial targets in the United States, Taiwan, Europe and elsewhere.

article thumbnail

Need more storage or Thunderbolt 5 ports? OWC delivers new gear for video pros

Collaboration 2.0

Premium hardware maker OWC unveils a new RAID storage unit and Thunderbolt 5 hub.

111
111
article thumbnail

Mazda Connect Systems Vulnerable to Cyber Attacks

eSecurity Planet

Our cybersecurity expert explores the security risks in the automotive industry, from remote hacks to data breaches, and explains the cyber attacks Mazda vehicles may be vulnerable to. The post Mazda Connect Systems Vulnerable to Cyber Attacks appeared first on eSecurity Planet.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Two affordable OTC glucose monitors unveiled at CES - and you can try them now

Collaboration 2.0

These over-the-counter GCMs from health brands Dexcom and Abbot make glucose monitoring affordable and accessible. Here's how they could help you - no prescription necessary.

Access 105
article thumbnail

U.S. CISA adds Oracle WebLogic Server and Mitel MiCollab flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Oracle WebLogic Server and Mitel MiCollab flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Oracle WebLogic Server and Mitel MiCollab vulnerabilities, to its Known Exploited Vulnerabilities (KEV) catalog. Below are the descriptions for the vulnerabilities added to the catalog: CVE-2020-2883 (CVSS score 9.8) is a vulnerability in Oracle WebLogic Server (v

IT 67
article thumbnail

Two affordable OTC glucose monitors were just unveiled at CES - and you can try them now

Collaboration 2.0

These over-the-counter GCMs from health brands Dexcom and Abbot make glucose monitoring affordable and accessible. Here's how they can help you - no prescription necessary.

Access 105