Mon.Jan 20, 2025

article thumbnail

Esperts found new DoNot Team APT group’s Android malware

Security Affairs

Researchers linked the threat actor DoNot Teamto a new Android malware that was employed in highly targeted cyber attacks. CYFIRMA researchers linked a recently discovered Android malware to the Indian APT group known as DoNot Team. The Donot Team (aka APT-C-35 and Origami Elephant) has been active since 2016, it focuses ongovernment and military organizations, ministries of foreign affairs, and embassies in India, Pakistan, Sri Lanka, Bangladesh, and other South Asian countries.

Military 284
article thumbnail

PowerSchool Faces 23 Lawsuits Over Schools' Mega Data Breach

Data Breach Today

Customers Question Why PowerSource Support Tool Had Direct Access to Their Systems Educational software-maker PowerSchool faces over 20 lawsuits seeking class-action status, filed in the wake of a massive data breach involving current and former student and faculty data being held by an as-yet-unknown number of school districts across the U.S., Canada and Bermuda.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets

Security Affairs

Researchers found malicious npm and PyPI packages capable of stealing and deleting sensitive data from infected systems. Socket researchers have identified multiple packages in the npm and Python Package Index (PyPI) repository designed to target Solana private keys and drain funds from victims’ wallets. The malicious npm packages allowed the threat actors to exfiltrate Solana private keys via Gmail.

Libraries 253
article thumbnail

Amazon Details Measures to Counter S3 Encryption Hacks

Data Breach Today

Hackers Using Valid Customer Credentials to Re-Encrypt S3 Objects Amazon is urging its customers to deploy additional security measures to secure S3 buckets following reports of ransomware attacks targeting the platform. The company said mitigations prevented "a high percentage of attempts from succeeding.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Phishing Campaign Attempts to Bypass iOS Protections

KnowBe4

An SMS phishing (smishing) campaign is attempting to trick Apple device users into disabling measures designed to protect them against malicious links, BleepingComputer reports.

Phishing 126

More Trending

article thumbnail

IDP Trends and Opportunities for 2025

Info Source

By Ralph Gammon, Senior Analyst at Infosource 16 January 2025 1. Agentic AI Emerges as a complement to IDP : Or maybe its the other way around, as Agentic AI is probably the macro piece here, but, either way, these two technologies go hand in hand, just like Capture and Workflow have for the past 40 years (dating back to FileNets original applications).

article thumbnail

Industrial Switch Vulnerabilities Allow Remote Exploitation

Data Breach Today

Researchers Uncover Three Vulnerabilities, Urge Firmware Update Attackers could chain critical vulnerabilities in industrial network switches to gain remote control to compromise automation systems, IoT devices and surveillance networks. Claroty's Team82 uncovered three flaws in WGS-804HPT switches manufactured by Planet Technology.

IoT 130
article thumbnail

Threat Actors Abuse Google Translate to Craft Phishing Links

KnowBe4

Threat actors are abusing Google Translates redirect feature to craft phishing links that appear to belong to, according to researchers at Abnormal Security.

Phishing 114
article thumbnail

Threat Intelligence's Top Players Tackle Evolving Cyber Risk

Data Breach Today

Acquisitions, AI and Emerging Threats Define Strategy for Recorded Future, Google From Google's $5.4 billion acquisition of Mandiant to Recorded Future's fraud insights following Mastercard's $2.65 billion purchase, threat intelligence vendors are innovating with AI and are focused on operationalizing their data through automation and managed services.

Risk 130
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

From Pig Butchering to People Talking

KnowBe4

Interpol has recently recommended discontinuing the use of the term "Pig Butchering" in cybercrime discussions, expressing concern that such terminology may discourage victims from reporting incidents due to feelings of shame or embarrassment.

Phishing 111
article thumbnail

InoTec SCAMAX® engages Robert H. Appelbaum for its Americas business

Info Source

The capture expert and industry veteran will take over sales and business development for the German premium scanners in North, Central and South America. Ergolding near Landshut, Germany / Atlanta, Georgia, USA, January 15, 2025: The leading manufacturer of premium scanners DATAWIN GmbH is further expanding its business in the Americas. To this end, DATAWIN has engaged capture expert Robert H.

Sales 40
article thumbnail

Biden Signs New Cybersecurity Order

Schneier on Security

President Biden has signed a new cybersecurity order. It has a bunch of provisions, most notably using the US governments procurement power to improve cybersecurity practices industry-wide. Some details : The core of the executive order is an array of mandates for protecting government networks based on lessons learned from recent major incidents—namely, the security failures of federal contractors.

article thumbnail

HPE is investigating IntelBroker’s claims of the company hack

Security Affairs

HPE is probing claims by the threat actor IntelBroker who is offering to sell alleged stolen source code and data from the company. Last week, the notorious threat actor IntelBroker announced on a popular cybercrime forum the sale of data allegedly stolen from HPE. IntelBroker, known for leaking data from major organizations, made the headlines by claiming responsibility for a breach of Cisco.

Sales 293
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Weekly Update 435

Troy Hunt

If I'm honest, I was in two minds about adding additional stealer logs to HIBP. Even with the new feature to include the domains an email address appears against in the logs, my concern was that I'd get a barrage of "that's useless information" messages like I normally do when I load stealer logs! Instead, the feedback was resoundingly positive.

IT 86
article thumbnail

Sen. Warren Fires Off 175 Questions to RFK Jr on HHS, HIPAA

Data Breach Today

Elizabeth Warren Letter Probes Kennedy on His Plans if Confirmed as HHS Secretary Senate confirmation hearings have not yet been set for President Donald Trump's pick to lead the U.S. Department of Health and Human Services. But that hasn't stopped at least one lawmaker from already firing off an extensive list of questions to Robert F. Kennedy Jr., including about HIPAA.

130
130
article thumbnail

Trump Federal Workforce Plans Draw Alarm from Unions, Experts

Data Breach Today

Creating 'Schedule F' Is a Stated Trump Priority Newly-sworn in President Donald Trumps plan to revive policy from his first term that eases the firing of federal employees could disrupt workforce stability, with federal unions and experts warning that weakening federal civil service protections could weaken national security.

Security 162