Thu.Mar 20, 2025

article thumbnail

CERT-UA warns of cyber espionage against the Ukrainian defense industry using Dark Crystal RAT

Security Affairs

CERT-UA warns of a cyber campaign using Dark Crystal RAT to target Ukraine’s defense sector, including defense industry employees and Defense Forces members. The Computer Emergency Response Team of Ukraine (CERT-UA) uncovered a new cyber espionage campaign targeting employees of defense-industrial complex enterprises and representatives of the Defense Forces of Ukraine with Dark Crystal RAT.

article thumbnail

Is OpenAI doomed? Open-source models may crush it, warns expert

Collaboration 2.0

Large language models are now commodities, making OpenAI's business model vulnerable to the economics of open-source AI such as DeepSeek, says Kai-Fu Lee.

IT 320
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Edimax IC-7100 IP Camera, NAKIVO,and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability CVE-2017

IT 173
article thumbnail

Tired of traditional social media? Here are 4 reasons why Substack is my go-to social media app

Collaboration 2.0

Here's why I've been turning to Substack more and more - and why you might do the same if you give it a try.

IT 289
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Pennsylvania State Education Association data breach impacts 500,000 individuals

Security Affairs

A data breach at the Pennsylvania State Education Association exposed the personal information of over 500,000 individuals. The Pennsylvania State Education Association (PSEA) suffered a data breach that impacted 517,487 individuals. PSEA is a labor union representing teachers, education support professionals, and other school employees in Pennsylvania.

Education 157

More Trending

article thumbnail

I tried to replace my MacBook Pro with the M3 iPad Air - then the reality of iPadOS struck me

Collaboration 2.0

The M3 iPad Air has some really impressive features and capabilities, but is it right for most iPad users?

IT 273
article thumbnail

Low-Cost Drone Add-Ons From China Let Anyone With a Credit Card Turn Toys Into Weapons of War

WIRED Threat Level

Chinese ecommerce giants like Temu and AliExpress sell drone accessories like those used by soldiers in the Russia-Ukraine conflict.

Security 219
article thumbnail

The best free AI courses and certificates in 2025

Collaboration 2.0

I have a master's degree in education and have been working with AI for decades. Here are the top free AI courses online I'd recommend to anyone looking to upskill right now - and why.

Education 250
article thumbnail

Infostealers Fuel 2.1B Credentials and 23M Host Infections

eSecurity Planet

Cybercriminal activity is reaching unprecedented levels, with 2024 witnessing a dramatic surge in malware-fueled attacks that have left organizations scrambling to safeguard their data. A recent report from Flashpoint paints a stark picture of a threat landscape defined by infostealers, credential theft, and escalating vulnerabilities, urging organizations to strengthen their defenses against these relentless adversaries.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Copilot now lets you control your Android phone from your PC - here's how

Collaboration 2.0

You can send texts, set timers, and get directions - without ever touching your Android phone.

247
247
article thumbnail

Cryptohack Roundup: $6.1M Wemix Theft

Data Breach Today

Also: OKX Temporarily Suspends Services to Prevent Funds Laundering This week, $6.1M Wemix theft, OKX suspended services, Vermont dropped Coinbase case, new RAT-targeted crypto wallet extensions, TJ Stone got prison time, Nebraska's new crypto ATM rule, Trezor disclosed a potential bug and British prosecutors charged a former police officer for 50 Bitcoin theft.

162
162
article thumbnail

How to avoid the AI complexity trap

Collaboration 2.0

AI is not a silver bullet. But, when done right, it can enable simplicity - with limits.

IT 247
article thumbnail

Veeam Update Patches Critical Backup Software Vulnerability

Data Breach Today

'Real Danger' Alert for Unpatched Veeam Servers Attached to a Production Domain Widely used Veeam Backup & Replication software has been patched to fix a critical vulnerability that could be abused to remotely exploit malicious code. Security experts recommend rapid patching, given ransomware and other groups' repeated targeting of the software.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

You can get a free Samsung TV with this Verizon 5G home internet deal - how it works

Collaboration 2.0

Verizon's 5G Home Plus internet plans start at $55 a month and include massive freebies for a limited time (like a Samsung TV or a Meta Quest 3S).

IT 246
article thumbnail

Fighting Financial Fraud With Adversarial AI Defenses

Data Breach Today

Experts Weigh the Advantages and Risks of Generative Adversarial Networks With traditional rule-based fraud detection systems and even conventional machine learning models struggling to identify these highly deceptive fraud patterns, financial institutions are exploring generative adversarial networks to enhance fraud detection.

Risk 147
article thumbnail

I found an Android phone that can convince iPhone users to make the switch - and it's not a flagship

Collaboration 2.0

The Nothing Phone 3a Pro is the most stylistic interpretation of bang for your buck.

IT 235
article thumbnail

Breach Roundup: A WhatsApp Flaw Ushered in Spyware

Data Breach Today

Also: France Temporarily Lifts Pavel Durov's Travel Ban Amid Telegram Probe This week, Paragon Solutions spread through WhatsApp, France suspended Pavel Durov's travel ban, Vapor malware hit 60M Android users, state-backed hackers exploit a Windows flaw, Western Alliance Bank exposed customers data, Apple fixed a passwords bug, and a sperm bank exposed customer information.

Passwords 147
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The 8TB T5 Evo SSD is back in stock and over $150 off at Samsung

Collaboration 2.0

Amazon's Big Spring Sale is next week, but if you can't wait to upgrade your PC storage, you can snag the 8TB T5 Evo portable SSD for just $500 when you buy from Samsung.

Sales 221
article thumbnail

Why Google and Wiz Struck a Deal Now After 2024 Talks Caved

Data Breach Today

Major Competitive, Regulatory, Economic and Technological Changes Fueled This Deal The fact a $32 billion acquisition agreement between Google and Wiz was reached speaks to major changes that have occurred in the market around the competitive landscape, the regulatory environment, the macroeconomic environment, customer buying behavior, and the technology itself.

Marketing 130
article thumbnail

The hidden cost of AI video generators that no one warns you about

Collaboration 2.0

AI video creation sounds magical - until you try it.

IT 213
article thumbnail

Violent ChatGPT Hallucination Sparks GDPR Complaint

Data Breach Today

Norwegian Man Tells OpenAI: I Didn't Kill My Children A Norwegian man is peeved that a chatbot hallucinated a violent backstory for his life after seeing that ChatGPT apparently believes he's a child killer spending decades inside prison. "The fact that someone could read this output and believe it is true is what scares me the most," he said.

GDPR 130
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

The best OLED TVs of 2025: Expert tested

Collaboration 2.0

March Madness is in full swing, and if you want a TV that will let you catch every detail of every game, we've tested the best OLED TVs.

203
203
article thumbnail

Authorities Warn of Security Terror Threats to Hospitals

Data Breach Today

Health ISAC, AHA Bulletin Urges Entities to Bolster Physical, Cyber, Preparedness Threats transmitted on social media intimating coordinated terrorist attacks on hospitals in mid-tier U.S. cities have industry authorities warning the healthcare sector to shore up physical and cyber security, as well as emergency management response plans.

Security 130
article thumbnail

Verizon is giving these Android phones satellite texting for free - Google and Samsung models included

Collaboration 2.0

The feature was previously limited to emergency situations and location sharing.

202
202
article thumbnail

AI Regs: Compliance Risks and Hidden Liabilities for CISOs

Data Breach Today

Attorney Jonathan Armstrong on AI Security, Legal Risks Related to EU AI Act AI regulation is evolving fast, and many businesses may already be violating key provisions without realizing it. Jonathan Armstrong, partner at Punter Southall Law, warns that companies may be using high-risk AI applications without security teams even knowing.

Risk 130
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Why KFC and Taco Bell may be most Americans' first taste of AI agents

Collaboration 2.0

The world's largest restaurant company, with more than 61,000 locations, is partnering with Nvidia to develop order-taking AI agents.

199
199
article thumbnail

Security Researcher Comments on HIPAA Security Rule

Adam Shostack

A group of us have urged HHS to require better handling of security reports A group of us have urged HHS to require that health care providers to act on (and facilitate reporting of) security issues by good faith cybersecurity researchers. The core of what we recommend is that HHS should require cooperation with Good Faith researchers. All regulated entities should be required to enable people to report security issues in a way thats easy to discover and aligned with standards.

article thumbnail

This ultra-thin power bank is my new favorite traveling accessory - and it's affordable

Collaboration 2.0

Nitecore calls its new lightweight power bank a 'waterproof, competition-grade energy bar,' and I have to agree.

IT 189