Fri.Jan 10, 2025

article thumbnail

Banshee macOS stealer supports new evasion mechanisms

Security Affairs

Experts found a new version of the Banshee macOS information stealer which was enhanced with new evasion mechanisms. Check Point researchers discovered a new version of the Banshee macOS infostealer which is distributed through phishing websites and fake GitHub repositories, often masqueraded as popular software. In August 2024, Russian crooks advertised a macOS malware called BANSHEE Stealer that can target both x86_64 and ARM64 architectures.

Archiving 295
article thumbnail

These ear-cleaning headphones I saw at CES 2025 sound weird - but make so much sense

Collaboration 2.0

The Bebird EarSight Flow streams water into your ears to wash them, with a special camera that allows you to watch the cleaning process in real time.

299
299
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishers abuse CrowdStrike brand targeting job seekers with cryptominer

Security Affairs

CrowdStrike warns of a phishing campaign that uses its recruitment branding to trick recipients into downloading a fake application, which finally installs the XMRig cryptominer. CrowdStrike discovered a phishing campaign using its recruitment branding to trick recipients into downloading a fake application, which acts as a downloader for the XMRig cryptominer.

Phishing 278
article thumbnail

Finally, a 16GB Raspberry Pi 5 - but does a mini PC make more sense at this price?

Collaboration 2.0

The 16GB option might be overkill for the average home gamer, but it's a welcome addition for edge cases that truly need the extra RAM.

IT 290
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

ISMG Editors: The Coming Battle Over Chinese Cyberthreats

Data Breach Today

Also: Cybersecurity Tech Leader Amit Yorans Life, Leadership and Legacy In this week's update, ISMG editors discussed the escalating geopolitical cyberthreats expected in 2025, including advanced and persistent campaigns linked to Chinese actors. Panelists also paid tribute to Amit Yoran, one of the cybersecurity industry's most influential leaders.

More Trending

article thumbnail

Biden Administration Releases 'AI Strategic Plan' for HHS

Data Breach Today

Days Are Dwindling, But Biden White House Unveils New AI Roadmap for HHS With 10 days left in office, the Biden administration released an artificial intelligence strategic plan for the U.S. Department of Health and Human Service. HHS called the plan a "comprehensive roadmap" outlining the departments "commitment to trustworthy, ethical and equitable AI use.

article thumbnail

My favorite TV at CES 2025 is this battery-powered display that you can lug around

Collaboration 2.0

It's no G5 OLED, but the LG StanbyMe 2 strikes the right balance of quirkiness, innovation, and performance -- making it my CES standout.

IT 279
article thumbnail

Report: Chinese Hackers Breached CFIUS

Data Breach Today

Cyberespionage Campaign Reached Treasury Office that Reviews Foreign Investment Chinese hackers reportedly breached a U.S. government office responsible for reviewing foreign investments for national security threats as part of a cyberespionage campaign targeting the Department of Treasury. Hackers gained access to the Committee on Foreign Investment in the U.S.

article thumbnail

5 Google Lens tricks to level up your image search

Collaboration 2.0

From shopping and taking notes to verifying images or simply satisfying your curiosity, Google Lens has some cool tricks you'll want to try.

278
278
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Cloud Security, APT Threats, AI Risks Loom Large in 2025

Data Breach Today

Google Mandiant's Jamie Collier on the Biggest Cloud Security Challenges To combat AI threats in 2025, security teams are set to enter the second phase of AI innovation in security by deploying semi-autonomous operations such as alert parsing, creation of high-priority item lists and risk remediation, said Jamie Collier, senior threat intelligence advisor at Mandiant.

Cloud 147
article thumbnail

AI agents may soon surpass people as primary application users

Collaboration 2.0

A 'binary big bang' occurred when AI foundation models cracked the natural language barrier, kickstarting a shift in our technology systems: how we design them, use them, and how they operate.

278
278
article thumbnail

Three Russian Cryptomixer Masterminds Indicted in US

Data Breach Today

Blender and Sinbad Were Favorites of Ransomware and North Korean Hackers Three Russian nationals behind cryptocurrency mixers favored by ransomware hackers and North Korean crypto thieves face criminal charges in U.S. federal court: Roman Vitalyevich Ostapenko, 55, Alexander Evgenievich Oleynik, 44, and Anton Vyachlavovich Tarasov, 32.

article thumbnail

How AI will transform cybersecurity in 2025 - and supercharge cybercrime

Collaboration 2.0

From AI-driven defense to evolving ransomware tactics, here's what cybersecurity industry leaders and experts are preparing for this year.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

PowerSchool's Breach Fallacy: Paying Criminals for Promises

Data Breach Today

Cybercrime History Teaches That Paying a Ransom for Data Deletion Is Foolish Data breach victim PowerSchool, maker of a widely used K-12 student information system platform, has been attempting to assure schools, and parents and guardians, by saying its attacker has promised to delete the stolen data. What's the old saying about those who fail to learn from history?

article thumbnail

Thanks to Nvidia, there's a new generation of PCs coming, and they'll be running Linux

Collaboration 2.0

OK, maybe you wouldn't pay three grand for a Project DIGITS PC. But what about a $1,000 Blackwell PC from Acer, Asus, or Lenovo?

271
271
article thumbnail

Google DeepMind's Consolidation, World Modelling Initiatives

Data Breach Today

Firm Folds AI Studio, Gemini API Into DeepMind; Sets up World Model Team Google is restructuring its artificial intelligence teams and forming a new division under its DeepMind unit. Both the AI Studio team and the Gemini API team will now be run under DeepMind, a shift Google says will make DeepMind's work more accessible to the public.

article thumbnail

I tested an ink pen that records your handwriting and makes a digital copy. Spoiler: It works

Collaboration 2.0

The Nuwa Pen utilizes three tiny cameras to capture what you write - on paper! - and save your notes in an accompanying app. I demoed the game-changing device at CES 2025.

Paper 264
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Synthetic Data: A Powerful but Imperfect Solution for AI Training

Information Matters

In the rapidly evolving world of artificial intelligence (AI), synthetic data has emerged as a promising approach to train powerful machine learning models. Synthetic data refers to artificially generated information that statistically mirrors. The post Synthetic Data: A Powerful but Imperfect Solution for AI Training appeared first on Information Matters - AI-Driven Business Transformation.

article thumbnail

Finally, I found a robot vacuum at CES 2025 that can climb stairs - sort of

Collaboration 2.0

At the Las Vegas trade show, Dreame introduced its premium X50 Ultra, which aspires to go where no robot vac has gone before.

IT 264
article thumbnail

Navy Warship USS Manchester Installed Starlink for Illegal Wi-Fi Connection

eSecurity Planet

Military officials installed Starlink on a Navy warship, not for operations but to provide high-speed internet for sports and Netflix. Watch to learn more. The post Navy Warship USS Manchester Installed Starlink for Illegal Wi-Fi Connection appeared first on eSecurity Planet.

Military 111
article thumbnail

Using a VPN is no longer enough. Protect your entire network with WireGuard - here's how

Collaboration 2.0

Want to bypass geo-restrictions and secure your entire network? Pair the WireGuard protocol with your favorite VPN. I use privacy-oriented Proton to show you how.

Privacy 264
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Why supply chains require an ecosystem mindset

CGI

Behind every item lies a complex, interconnected global supply chain ecosystem that must work in perfect harmony to ensure that the products and services we rely on are always within reach.

98
article thumbnail

I tried Hypershell's X-series exoskeleton at CES, and it was a fascinating experience

Collaboration 2.0

The exoskeleton is designed with weekend warrior athletes in mind. It's built to offer assistance in physical activities such as hiking or biking. Here's what it's like to wear.

IT 262
article thumbnail

AI Startup Secures £1 Million to Enhance UK Port Safety Through Smart Surveillance

Information Matters

A Cambridge artificial-intelligence startup has secured 1.1 million in government funding to develop technology that aims to prevent accidents and improve efficiency at British ports and warehouses by. The post AI Startup Secures 1 Million to Enhance UK Port Safety Through Smart Surveillance appeared first on Information Matters - AI-Driven Business Transformation.

article thumbnail

This silent air purifier keeps my home free of smoke, odors and allergens

Collaboration 2.0

The Air Oasis iAdaptAir 2.0 uses ionization and UV sterilization to filter and clean your air. Here's how it fared after months in my home.

IT 261
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

AI Startup Raises £1.5 Million to Modernize Hospital Operating Rooms

Information Matters

VitVio, a London-based artificial intelligence startup, has secured 1.5 million in pre-seed funding to deploy AI-powered monitoring systems in hospital operating rooms, as healthcare facilities seek. The post AI Startup Raises 1.5 Million to Modernize Hospital Operating Rooms appeared first on Information Matters - AI-Driven Business Transformation.

article thumbnail

How to clear your Android phone's cache and make it feel like new for 2025

Collaboration 2.0

Start the new year by adding this simple process to your Android maintenance routine. You'll be glad you did.

IT 257
article thumbnail

Friday Squid Blogging: Cotton-and-Squid-Bone Sponge

Schneier on Security

News : A sponge made of cotton and squid bone that has absorbed about 99.9% of microplastics in water samples in China could provide an elusive answer to ubiquitous microplastic pollution in water across the globe, a new report suggests. […] The study tested the material in an irrigation ditch, a lake, seawater and a pond, where it removed up to 99.9% of plastic.

Paper 96