Thu.Jan 30, 2025

article thumbnail

DeepSeek database exposed highly sensitive information

Security Affairs

Chinese AI platform DeepSeek has publicly exposed two databases containing highly sensitive user and backend details. Wiz Research discovered a publicly accessible ClickHouse database belonging to DeepSeek, exposing chat history, secret keys, and backend details. After responsible disclosure, DeepSeek promptly secured the issue. “Within minutes, we found a publicly accessible ClickHouse database linked to DeepSeek, completely open and unauthenticated, exposing sensitive data.

Metadata 299
article thumbnail

Good Governance is About the “Why”

Weissman's World

I get inquiries all the time from people seeking support as they ready to tackle what sound like fairly specific records and information governance issues. Lately, these types of inquiries have fallen into these three general areas: Getting rid of paper Moving to the cloud Preparing for AI These descriptors which well use throughout… Read More » Good Governance is About the Why The post Good Governance is About the Why appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TeamViewer fixed a vulnerability in Windows client and host applications

Security Affairs

TeamViewer has patched a high-severity privilege escalation vulnerability affecting its Windows client and host applications. TeamViewer released security patches for a high-severity elevation of privilege vulnerability, tracked as CVE-2025-0065 (CVSS score of 7.8), in its remote access solutions for Windows. The vulnerability is an improper neutralization of argument delimiters in the TeamViewer_service.exe component of TeamViewer Full Client & Host prior to version 15.62 for Windows.

Access 277
article thumbnail

This $300 Samsung phone looks as good as the Galaxy S25 - at a fraction of the price

Collaboration 2.0

For a limited time, the Samsung Galaxy A35 is available for a fraction of the cost of the S25 series. It's also discounted when you bundle a pair of Buds FE.

IT 305
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Italy’s Data Protection Authority Garante requested information from Deepseek

Security Affairs

Italys data privacy regulator Garante has requested information from Chinese AI company DeepSeek regarding its data practices. Italys Data Protection Authority Garante has asked the AI firm DeepSeek to clarify its data collection, sources, purposes, legal basis, and storage, citing potential risks to user data. “The Italian Data Protection Authority has sent a request for information to Hangzhou DeepSeek Artificial Intelligence and Beijing DeepSeek Artificial Intelligence, the companies th

More Trending

article thumbnail

PHP package Voyager flaws expose to one-click RCE exploits

Security Affairs

The open-source PHP packageVoyageris affected by three vulnerabilities that could be exploited to achieve one-click remote code execution on affected instances. Voyager is a popular open-source PHP package for managing Laravel applications, offering an admin interface, BREAD operations, media, and user management. During an ordinary scan activity, SonarSource researchers reported an arbitrary file write vulnerability in Voyager.

article thumbnail

These low-latency earbuds seamlessly switched between my devices (and they sound great)

Collaboration 2.0

Steelseries' Arctis Gamebuds have tons of game-specific presets to bring your titles to life, then let you swap back to your phone with a tap.

277
277
article thumbnail

Operation Talent: An international law enforcement operation seized Cracked, Nulled and other cybercrime websites

Security Affairs

An international law enforcement operation targeted several major cybercrime websites, including Cracked, Nulled, Sellix, and StarkRDP. An international law enforcement operation led by Europol, code-named Operation Talent, dismantled several major cybercrime sites, including Cracked, Nulled, Sellix, and StarkRDP. The message displayed on the targeted cybercrime websites states that authorities have seized the platforms, along with information about their customers and victims.

Phishing 151
article thumbnail

Breach Roundup: DeepSeek Leaked Sensitive Data

Data Breach Today

Also: Infostealer Malware Compromises Mexican Government Computers This week, DeepSeek exposed sensitive data, hackers exploited unpatched Zyxel flaws, infostealer malware on Mexican government computers, Smiths Group incident, PowerSchool breach notifications, an Apple zero-day, XWorm RAT backdoor, and Credit Control Corporation settled a lawsuit.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

AI agents will match 'good mid-level' engineers this year, says Mark Zuckerberg

Collaboration 2.0

Autonomous software engineering agents will take over significant programming tasks, predicts Meta's CEO. And he's counting on Llama to achieve that goal.

264
264
article thumbnail

Fake Reddit and WeTransfer Sites are Pushing Malware

Schneier on Security

There are thousands of fake Reddit and WeTransfer webpages that are pushing malware. They exploit people who are using search engines to search sites like Reddit. Unsuspecting victims clicking on the link are taken to a fake WeTransfer site that mimicks the interface of the popular file-sharing service. The ‘Download’ button leads to the Lumma Stealer payload hosted on “weighcobbweo[.]top.” Boingboing post.

92
article thumbnail

Microsoft's latest optional patch is a bug-fix bonanza for Windows 11 24H2

Collaboration 2.0

The new preview update resolves some persistent and annoying problems with Windows 24H2, but you may need to download and install it manually.

IT 262
article thumbnail

Nation State Groups Exploit Gemini AI App

Data Breach Today

Google Says Iranian and Chinese Threat Group the Most Active Iranian and Chinese threat actors are using Google's artificial intelligence application Gemini for vulnerability scanning and reconnaissance activities, with some attempting to bypass security guardrails of the application, the computing giant disclosed.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

I found the most complete wireless charging accessory yet - and it has a useful cooling system

Collaboration 2.0

If you're not a fan of wireless chargers that overheat and reach less-than-optimal speeds, the Torras PolarCircle I tested has your name on it.

IT 261
article thumbnail

Federal Cybersecurity Contractors Whiplashed By Uncertainty

Data Breach Today

'There's A Lot of Confusion Going On' A halt on new contract awards by the federal governments top procurement agency has thrown vendors into confusion, raising concerns about its ripple effects. White House announcements are "definitely causing confusion" among cybersecurity contractors and officials, an industry analyst said.

article thumbnail

My favorite ultraportable laptop makes the ThinkPad and MacBook Air feel underwhelming

Collaboration 2.0

The Asus Vivobook S 15 is a fantastic ultraportable laptop with fast performance and a brilliant OLED screen. It's on sale for a limited time.

Sales 255
article thumbnail

NY Blood Center Attack Disrupts Suppliers in Several States

Data Breach Today

Ransomware Attack on Center Is Latest Assault on Blood Supply Chain A New York blood center and its divisions that serves hospitals in several states are dealing with ransomware attack disrupting donations and other activities. The attack - the latest assault on a blood supplier - comes just days after the center declared a blood shortage emergency.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Microsoft's new Copilot+ Surface devices are built for business with Intel inside

Collaboration 2.0

For business buyers, last year's opening salvo of AI-ready PCs was a nonstarter due to compatibility issues with Qualcomm's processors. Those Surface Pro and Surface Laptop devices will soon be available with Intel's Lunar Lake processors. You can preorder now.

249
249
article thumbnail

Attackers Could Gain Control of 2 Flawed Patient Monitors

Data Breach Today

Feds Warn Flaws Could Lead to 'Simultaneous Exploitation' of All Devices U.S. federal authorities are warning that cybersecurity vulnerabilities in two brands of patient monitors used in healthcare settings and in patients' homes can allow remote attackers to take over control the devices when connected to the internet, posing safety and data privacy concerns.

article thumbnail

OpenAI's Sora generates 600 videos a minute worldwide: Top 5 cities may surprise you

Collaboration 2.0

Just over a month since its launch, Sora is booming.

IT 245
article thumbnail

Got EI? Emotional Intelligence Makes Cyber Leaders Stronger

Data Breach Today

Tips on Relationships and Empathy That CISOs Should Know Before the Next Crisis Emotional Intelligence is the ability to recognize, understand, manage and influence both your own emotions and those of others. It encompasses five key areas: self-awareness, self-regulation, motivation, empathy and social skills that enable leaders to build trust and manage teams effectively.

IT 130
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

App fatigue is real: Users are downloading fewer apps than ever

Collaboration 2.0

The competition for mobile screen space is intense. Here are ways to gain more retention for mobile apps.

243
243
article thumbnail

The Convergence of AI, Data Privacy, and Information Governance

AIIM

Looking ahead at information management trends, I see three key areas converging: AI governance, data governance, and information governance. This convergence isn't just theoretical - it's reshaping how we handle information at the Central Bank of the Bahamas.

article thumbnail

The best AI for coding in 2025 (and what not to use - including DeepSeek R1)

Collaboration 2.0

I've been subjecting chatbots to a set of real-world programming tests for two years now. There are two I recommend if you're looking for AI coding help - and several to avoid.

241
241
article thumbnail

Hoarding, Debt and Threat Modeling

Adam Shostack

The psychology of getting started threat modeling During a recent threat modeling course, one of our students, Aleksei*, made a striking comparison that resonated with a lot of us: starting security analysis is like tackling a hoarders house. That visceral image of looking at mountains of accumulated issues, feeling overwhelmed by where to begin, captures a challenge many engineering leaders face when they first attempt to systematically assess their systems security.

Paper 59
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Copilot's powerful new 'Think Deeper' feature is free for all users - how it works

Collaboration 2.0

With Copilot, you can bypass a ChatGPT Plus subscription and access OpenAI's o1 model for free.

IT 240
article thumbnail

White Paper: The Benefits of Adding JPEG-XL to the ISO PDF

Info Source

Introduction As digital document workflows evolve, there is a growing need for more efficient and higher quality image compression methods. The PDF format, while established as the standard for document exchange, has historically been limited by its reliance on older image formats like JPEG, PNG, and JPEG 2000. Despite advancements in imaging technology, the PDF standard has not incorporated new image codecs for over 20 years, resulting in inefficiencies in both file size and image quality.

Paper 52
article thumbnail

93% of IT leaders will implement AI agents in the next two years

Collaboration 2.0

Surpassing most projections for AI adoption, organizations are leveraging digital labor across all lines of business, according to a new report from MuleSoft and Deloitte Digital.

IT 239