Mon.Jan 27, 2025

article thumbnail

Swedish Authorities Seize Vessel in Cable Sabotage Probe

Data Breach Today

Undersea Cable Damage in Baltic Sparks Concerns of Russian 'Shadow Fleet' Activity Swedish authorities seized a vessel in the Baltic Sea as part of a criminal investigation into sabotage of an undersea cable between Sweden and Latvia after a series of regional cable disruptions, including one involving suspected Russian shadow fleet activity, raising security concerns.

Security 147
article thumbnail

DeepSeek’s Popular AI App Is Explicitly Sending US Data to China

WIRED Threat Level

Amid ongoing fears over TikTok, Chinese generative AI platform DeepSeek says its sending heaps of US user data straight to its home country, potentially setting the stage for greater scrutiny.

IT 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SonicWall's Zero-Day Provokes Patch Alerts

Data Breach Today

Preauthentication Deserialization Flaw Could Result in Remote Code Execution Software vendors and national security agencies are urging immediate patching of a critical SonicWall flaw days after the security device manufacturer disclosed that hackers are actively exploiting a zero-day. The flaw doesn't require user authentication.

article thumbnail

Is this the iPhone SE 4? Leaked photos reveal major changes coming in 2025

Collaboration 2.0

Rumored to launch in April, the SE 4 sports a single camera, a notch, a USB-C port, and no more Home button, according to photos and a video shared by a known leaker.

112
112
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

DeepSeek's New AI Model Shakes American Tech Industry

Data Breach Today

AI Startup's R1 Model Draws Praise and Skepticism An open reasoning model from Chinese artificial intelligence startup DeepSeek has the tech industry assessing its potential impact as shares of U.S. technology mainstays plummeted in trading on Monday. Hangzhou-based DeepSeek released its R1 model on Jan. 20.

More Trending

article thumbnail

Change Healthcare Now Counts 190 Million Data Breach Victims

Data Breach Today

Cost of Attack Has Reached $3.1 Billion for Parent Company UnitedHealth Group One of the biggest data breaches of 2024 is even worse than previously reported, as the tally of Change Healthcare breach victims has now reached 190 million individuals. The cost tied to the attack is $3.1 billion, according to its owner, U.S. health insurance giant UnitedHealth Group.

article thumbnail

My favorite bone conduction headphones for swimming just got a brilliant new feature

Collaboration 2.0

Bone conduction headsets let you stay aware while working out. The Nank Runner Diver2 Pro adds a new design element to take that idea even further.

102
102
article thumbnail

Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000

Data Breach Today

RansomHub Theft Hit Patients of 2 Dozen HCF Facilities and Home Healthcare Unit A chain of more than two dozen skilled nursing and rehabilitation facilities is notifying tens of thousands of patients whose information was compromised in a hacking incident last fall. Russian-speaking cybercriminal gang RansomHub claims to have published 250 gbytes of data stolen in the heist.

130
130
article thumbnail

How to remove Copilot from your Microsoft 365 plan

Collaboration 2.0

Copilot has muscled its way into Microsoft 365 with a price hike to boot. But you can remove the AI from Word and revert to the classic plan. Here's how.

IT 102
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Fenix24 Buys vArmour IP to Boost Cyber Resilience, Recovery

Data Breach Today

Focus on Pre-Breach Resilience and Post-Breach Recovery Via Mapping Dependencies By acquiring vArmours intellectual property, Phoenix 24 will enhance its recovery services with advanced application visualization and dependency mapping. CEO Mark Grazman said the move will streamline recovery processes during ransomware attacks and improve organizational readiness.

article thumbnail

This versatile HP laptop will satisfy business professionals and creatives alike

Collaboration 2.0

HP's EliteBook x360 1040 has an adaptable form factor with one of the best video conferencing experiences I've tested on a laptop.

102
102
article thumbnail

Maybe AI Hallucinations Aren't So Bad After All

Data Breach Today

Scientists Say Fabricated AI Responses Could Lead to New Discoveries and Innovation Hallucinations are considered one of the most worrisome flaws of emerging artificial intelligence technology. But some scientists see the tendency of AI and large language models to fabricate responses is tool for discovery in fields such as chemistry and pharmaceuticals.

article thumbnail

Why China's DeepSeek could burst our AI bubble

Collaboration 2.0

The startup's open-source reasoning model R1 is clobbering AI rivals and panicking investors. But there's more.

100
100
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Scammers Are Creating Fake News Videos to Blackmail Victims

WIRED Threat Level

Yahoo Boy scammers are impersonating CNN and other news organizations to create videos that pressure victims into making blackmail payments.

Privacy 92
article thumbnail

This robot vacuum performs as well as some flagship models for a fraction of the cost

Collaboration 2.0

Ecovacs' Deebot N30 Omni is a mid-range robot vacuum with high-end features worth way more than its cost, especially with this deal.

IT 96
article thumbnail

Nearly Three-Quarters of UK Education Orgs Have Sustained Cyberattacks

KnowBe4

73% of educational institutions in the UK have sustained at least one cyberattack or breach in the past five years, according to researchers at ESET.

article thumbnail

Apple releases iOS 18.3 with AI-powered Apple Intelligence on by default

Collaboration 2.0

The move means that people who don't want to use Apple's AI tech will need to manually disable it.

IT 95
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Privacy by design: Integrating data protection best practices in AI solutions development

CGI

While Data Privacy Day is a great opportunity to reinforce data protection best practices, privacy by design needs to be practiced 24/7 throughout the year.

Privacy 64
article thumbnail

Enterprises are hitting a 'speed limit' in deploying Gen AI - here's why

Collaboration 2.0

Many C-suite executives have been cheerleaders for their company's work in AI despite slow progress, finds Deloitte's latest survey.

94
article thumbnail

Beware of Toll Scam Texts: How Cybercriminals are Targeting U.S. Drivers

KnowBe4

Drivers across the U.S. are being bombarded with fraudulent text messages claiming to come from toll operators like E-ZPass.

article thumbnail

The Galaxy S25 Ultra S Pen is losing its Bluetooth superpowers - but Samsung has a pricey fix

Collaboration 2.0

While the Bluetooth-enabled S Pen doesn't come with the new phone, Samsung may be offering it separately for users who really want it.

IT 89
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Jamf School Onboarding Workflow, Part 1: The easy way to deploy Jamf Connect

Jamf

In this blog, learn about the new feature in Jamf School to help EDU-centric administrators to develop streamlined onboarding workflows, creating a seamless user experience for students and educators alike. In short, create a smooth path for new and existing device onboarding to place the necessary tools in the hands of stakeholders sooner.

article thumbnail

Your Google Pixel 9 is getting a major audio upgrade - and it's coming for free

Collaboration 2.0

Bluetooth LE audio lets you listen to your Auracast-enabled hearing aids, headphones, speakers, and more.

IT 88
article thumbnail

News alert: INE Security announces new initiative to help companies accelerate CMMC 2.0 compliance

The Last Watchdog

Cary, NC, Jan. 26, 2025, CyberNewswire — INE Security , a leading global provider of cybersecurity training and certifications, today announced a new initiative designed to accelerate compliance with the Department of Defense’s (DoD) newly streamlined Cybersecurity Maturity Model Certification (CMMC) 2.0. This initiative aims to assist Defense Industry Base (DIB) contractors in swiftly adapting to the updated certification standards, which are critical to securing and maintaining def

article thumbnail

My favorite ChatGPT feature just got way more powerful

Collaboration 2.0

ChatGPT Canvas just got easier to access and smarter (hint: it can now code better than ever). Here's how to use it.

Access 88
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

New VPN Backdoor

Schneier on Security

A newly discovered VPN backdoor uses some interesting tactics to avoid detection: When threat actors use backdoor malware to gain access to a network, they want to make sure all their hard work can’t be leveraged by competing groups or detected by defenders. One countermeasure is to equip the backdoor with a passive agent that remains dormant until it receives what’s known in the business as a “magic packet.” On Thursday, researchers revealed that a never-before-seen back

article thumbnail

Can Substack lure creators with its new $20 million program? Here's how it plans to do it

Collaboration 2.0

Substack has attracted thousands of independent writers, journalists, and creators over the last few years by allowing them to monetize their content through paid newsletters. It might be about to attract a lot more.

IT 85
article thumbnail

Data Privacy and Cybersecurity Outlook for 2025: What Financial Services Firms Need To Know

Data Matters

Last year saw many developments across the worldwide data privacy and cybersecurity landscape, including in the EU/UK, and this momentum shows no sign of slowing in 2025. The EU General Data Protection Regulation (GDPR) enters its seventh year in May 2025. New cybersecurity and operational resilience legislation and related guidance are coming into force to regulate new and challenging technologies, several of which will affect financial services firms.