Mon.Apr 14, 2025

article thumbnail

Malicious NPM packages target PayPal users

Security Affairs

Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. Fortinetresearchers discovered multiple malicious NPM packages that are used to target PayPal users. The packages were uploaded to the repository in early March by a threat actor known as tommyboy_h1 and tommyboy_h2 , and were used to steal PayPal credentials and hijack cryptocurrency transfers. “Using PayPal-related names helps these malicious packages avoid detection, making it ea

IT 226
article thumbnail

Google is talking to dolphins using Pixel phones and AI - and the video is delightful

Collaboration 2.0

How Pixel phones are helping researchers decipher dolphin communication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tycoon2FA phishing kit rolled out significant updates

Security Affairs

The operators of the Phishing-as-a-Service (PhaaS) platform Tycoon2FA have rolled out significant updates to enhance its evasion capabilities. Tycoon2FA, a phishing kit discovered in 2023 by cybersecurity firm Sekoia, was recently updated to improve its evasion capabilities. The phishing kit now uses advanced evasion tactics such as a custom CAPTCHA via HTML5 canvas, invisible Unicode in obfuscated JavaScript, and anti-debugging scripts to bypass detection and hinder analysis. “Lately, the

Phishing 185
article thumbnail

5 things to do with the Linux terminal on your Android phone - including my favorite

Collaboration 2.0

Google launched a Linux terminal app for Android that gives you full command-line access. Here's what you can do with it.

Access 328
article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows

WIRED Threat Level

Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.

Security 236

More Trending

article thumbnail

The Most Dangerous Hackers You’ve Never Heard Of

WIRED Threat Level

From crypto kingpins to sophisticated scammers, these are the lesser-known hacking groups that should be on your radar.

Security 235
article thumbnail

AirTag too quiet? This alternative is much louder and works with Android and iPhone

Collaboration 2.0

Use them to find your keys and phone, and even take a selfie.

260
260
article thumbnail

TraderTraitor: The Kings of the Crypto Heist

WIRED Threat Level

Allegedly responsible for the theft of $1.5 billion in cryptocurrency from a single exchange, North Koreas TraderTraitor is one of the most sophisticated cybercrime groups in the world.

Privacy 234
article thumbnail

This SteamOS clone is the best Linux distro for gamers

Collaboration 2.0

Until Valve releases an official version of SteamOS, Bazzite has you covered for gaming on a Linux PC.

247
247
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

China Sort of Admits to Being Behind Volt Typhoon

Schneier on Security

The Wall Street Journal has the story : Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are continuing to escalate. The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwa

IT 104
article thumbnail

Windows 10 PC can't be upgraded? You have 5 options and 6 months to take action

Collaboration 2.0

Microsoft will officially end support for its most popular operating system later this year. Here's what you should do with your Windows 10 PCs that fail Microsoft's Windows 11 compatibility tests - before that day arrives.

IT 247
article thumbnail

Gamaredon: The Turncoat Spies Relentlessly Hacking Ukraine

WIRED Threat Level

For the past decade, this group of FSB hackersincludingtraitorUkrainian intelligence officershas used a grinding barrage of intrusion campaigns to make life hell for their former countrymen and cybersecurity defenders.

article thumbnail

Closing your Apple Watch rings can lower less stress, improve sleep - and win you prizes

Collaboration 2.0

Ahead of the Apple Watch's 10th anniversary, Apple is encouraging smartwatch wearers to close their activity rings for a limited-edition award.

241
241
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Attackers Maintaining Access to Fully Patched Fortinet Gear

Data Breach Today

Symbolic Links Planted by Attackers Survived Patching, Provide Read-Only Access Attackers have been using a new type of post-exploitation technique to maintain remote access to hacked Fortinet FortiGuard devices - even if they had the latest patches - by dropping symbolic links in the device's filesystem designed to survive the patching process, the vendor has warned.

Access 225
article thumbnail

GPT-4.1 is here, but not for everyone. Here's who can try the new models

Collaboration 2.0

OpenAI just launched a new family of models. Meet GPT-4.1, GPT-4.1 mini, and GPT-4.1 nano.

231
231
article thumbnail

News alert: AcceleTrex unveils referral exchange that turns trusted conversations into scalable growth

The Last Watchdog

Miami, FL, Apr. 14, 2025Today, AcceleTrex Corporation officially emerged from stealth, unveiling a first-of-its-kind platform that transforms expert referrals into a powerful growth engine for innovators. Grounded in the belief that genuine relationships drive meaningful results, AcceleTrex combines Artificial Intelligence (AI) with Actual Intelligence the practical expertise of Market Experts to provide genuine Actionable Intelligence that accelerates smarter solutions.

Marketing 100
article thumbnail

There's a quiet PC boom happening - thanks to Windows 10 and the tariffs

Collaboration 2.0

Turns out fear is a great sales strategy for computers. Here's which PC vendors are benefitting the most.

Sales 212
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide

WIRED Threat Level

Despite their hacktivist front, CyberAv3ngers is a rare state-sponsored hacker group bent on putting industrial infrastructure at riskand has already caused global disruption.

Security 207
article thumbnail

It's a private cloud revival: Why Kubernetes and cloud-native tech are essential in the AI age

Collaboration 2.0

I went to KubeCon London thinking it had peaked, but I was so wrong. Here's why.

Cloud 210
article thumbnail

Microsoft’s Recall AI Tool Is Making an Unwelcome Return

WIRED Threat Level

Microsoft held off on releasing the privacy-unfriendly feature after a swell of pushback last year. Now its trying again, with a few improvements that skeptics say still aren't enough.

Privacy 187
article thumbnail

Windows warning: Don't delete that weird 'inetpub' folder. Already did? Here's your fix

Collaboration 2.0

It may look empty, but that folder is tied to a new security patch - and it shouldn't be removed.

Security 209
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Smishing Triad: The Scam Group Stealing the World’s Riches

WIRED Threat Level

Millions of scam text messages are sent every month. The Chinese cybercriminals behind many of them are expanding their operationsand quickly innovating.

Privacy 187
article thumbnail

How I used GitHub Spark to build an app with just a one-sentence AI prompt

Collaboration 2.0

It's exciting, it's limited, and it might be a peek into the future of no-code development.

IT 206
article thumbnail

Black Basta: The Fallen Ransomware Gang That Lives On

WIRED Threat Level

After a series of setbacks, the notorious Black Basta ransomware gang went underground. Researchers are bracing for its probable return in a new form.

article thumbnail

These stackable toolkits have a compact design that looks great in my workshop

Collaboration 2.0

Hoto's Snapbloq toolkits include a precision screwdriver set, a mini cordless rotary toolkit, and a mini drill pen kit, on sale now as a bundle.

Sales 204
article thumbnail

Maximizing Profit and Productivity: The New Era of AI-Powered Accounting

Speaker: Yohan Lobo and Dennis Street

In the accounting world, staying ahead means embracing the tools that allow you to work smarter, not harder. Outdated processes and disconnected systems can hold your organization back, but the right technologies can help you streamline operations, boost productivity, and improve client delivery. Dive into the strategies and innovations transforming accounting practices.

article thumbnail

CISA Braces for Major Workforce Cuts Amid Security Fears

Data Breach Today

Staffers Considering Deferred Resignation, Payout Options Ahead of Looming Deadline CISA employees face a Monday deadline to accept a deferred resignation, early retirement or payout as DHS prepares sweeping workforce cuts - potentially reducing the agencys staff by a third and heightening risks to critical infrastructure across the U.S.

Security 147
article thumbnail

I made 5 simple changes on Android to instantly make my phone sound better

Collaboration 2.0

Not satisfied with the sound of music, video, and podcasts coming out of your phone? Here are five ways to improve what you hear.

203
203
article thumbnail

Possible Russian Hackers Targeted UK Ministry of Defense

Data Breach Today

Spear-Phishing Campaign Used RomCom Malware Variant A phishing campaign wielding malware previously associated with Russian-speaking hackers targeted the U.K. Ministry of Defense in late 2024. It is unclear if the campaign is tied to a data leak of 600 armed personnel, civil servants, and defense contractors reported late last year.

Phishing 147