Sun.Apr 13, 2025

article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell C is the fourth-largest mobile network operator in South Africa, , after Vodacom, MTN, and Telkom. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and international calling, SIM-only plans and device deals.

article thumbnail

An affordable Windows laptop with great specs for work travel? I found the one to buy

Collaboration 2.0

The Asus Vivobook S 15 is an impressive ultraportable on its own, but the OLED display and excellent battery life make it hard to overlook at this price.

IT 191
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure

Security Affairs

China admitted in a secret meeting with U.S. officials that it conducted Volt Typhoon cyberattacks on U.S. infrastructure, WSJ reports. China reportedly admitted in a secret meeting with U.S. officials that it carried out cyberattacks on U.S. infrastructure, linked to the Volt Typhoon campaign. According to the Wall Street Journal, at a December Geneva summit, Chinese officials indirectly admitted to Volt Typhoon cyberattacks on U.S. infrastructure, reportedly linked to U.S.

IT 319
article thumbnail

This is the most customizable smart home accessory I didn't know I needed

Collaboration 2.0

Govee's new Neon Rope Light 2 makes it easy to decorate your home and has quickly become a staple in my household.

IT 182
article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 41

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Lazarus Expands Malicious npm Campaign: 11 New Packages Add Malware Loaders and Bitbucket Payloads BadBazaar: iOS and Android Surveillanceware by Chinas APT15 Used to Target Tibetans and Uyghurs GOFFEE continues to attack organizations in Russia Atomic and Exodus crypto wallets targeted in malicious npm campaign Malicious VSCode extensions infect Windows with cryp

Security 169