Mon.Mar 24, 2025

article thumbnail

FBI warns of malicious free online document converters spreading malware

Security Affairs

The FBI warns of a significant increase in scams involving free online document converters to infect users with malware. The FBI warns that threat actors use malicious online document converters to steal users sensitive information and infect their systems with malware. “The FBI Denver Field Office is warning that agents are increasingly seeing a scam involving free online document converter tools, and we want to encourage victims to report instances of this scam.” reads the alert. &

Passwords 287
article thumbnail

How to Delete Your Data From 23andMe

WIRED Threat Level

DNA-testing company 23andMe has filed for bankruptcy, which means the future of the companys vast trove of customer data is unknown. Heres what that means for your genetic data.

Security 327
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloak ransomware group hacked the Virginia Attorney General’s Office

Security Affairs

The Cloak ransomware group claims responsibility for a cyberattack on the Virginia Attorney Generals Office that occurred in February. The ransomware group Cloak has claimed responsibility for a February cyberattack on the Virginia Attorney General Office. A cyberattack on the Virginia Attorney Generals Office forced officials to shut down IT systems, including email and VPN, and revert to paper filings.

article thumbnail

SHARED INTEL Q&A: Forrester highlights why companies need to strive for ‘cryptoagility’– today

The Last Watchdog

Quantum computings ability to break todays encryption may still be years awaybut security leaders cant afford to wait. Forresters The Future of Quantum Security makes it clear: the transition to quantum-safe cryptography must start now. Related: Quantum standards come of age The real threat isnt just the eventual arrival of quantum decryptionits that nation-state actors are already stockpiling encrypted data in harvest now, decrypt later attacks.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools

Security Affairs

Medusa ransomware uses a malicious Windows driver ABYSSWORKER to disable security tools, making detection and mitigation more difficult. Elastic Security Labs tracked a financially driven MEDUSA ransomware campaign using a HEARTCRYPT-packed loader and a revoked certificate-signed driver, ABYSSWORKER, to disable EDR tools. The attackers used a 64-bit Windows PE driver named smuol.sys, disguised as a CrowdStrike Falcon driver, which is VMProtect-protected and signed with a revoked Chinese certific

More Trending

article thumbnail

Attackers can bypass middleware auth checks by exploiting critical Next.js flaw

Security Affairs

A critical flaw in the Next.js React framework could be exploited to bypass authorization checks under certain conditions. Maintainers of Next.js React framework addressed a critical vulnerability tracked as CVE-2025-29927 (CVSS score of 9.1) with the release of versions versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3. “Next.js version 15.2.3 has been released to address a security vulnerability ( CVE-2025-29927 ).

article thumbnail

Massive Oracle Cloud Breach: 6M Records Exposed, 140k+ Tenants Risked

eSecurity Planet

A sophisticated supply chain hack targeting Oracle Cloud has exfiltrated a staggering 6 million records. CloudSEKs XVigil uncovered that threat actor rose87168 began selling the stolen data on March 21. The breach, exploiting a vulnerability in Oracles cloud infrastructure, now endangers over 140,000 tenants and has raised serious questions about cloud security practices.

Cloud 116
article thumbnail

News alert: Arsen’s rolls out AI-powered phishing tests to improve social engineering resilience

The Last Watchdog

Paris, France, Mar. 24, 2025, CyberNewswire — Arsen , a leading cybersecurity company specializing in social engineering defense, today announced the full release of Conversational Phishing, a groundbreaking feature embedded in its phishing simulation platform. This AI-powered tool introduces dynamic, adaptive phishing conversations to train employees against evolving threats more effectively than ever before.

Phishing 130
article thumbnail

This Asus laptop looks unassuming, but it has a powerful feature that professionals will love

Collaboration 2.0

Asus' Vivobook Pro 15 from last year is a powerful laptop thanks to its solid performance, hi-res display, and extra touches made with pros in mind.

IT 267
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Using Starlink Wi-Fi in the White House Is a Slippery Slope for US Federal IT

WIRED Threat Level

The ad hoc addition to the otherwise tightly controlled White House information environment could create blind spots and security exposures while setting potentially dangerous precedent.

IT 250
article thumbnail

How to delete your 23andMe data and why you should do it now

Collaboration 2.0

With the genetic testing site filing for bankruptcy protection, you'll definitely want to delete your account and have any stored samples destroyed.

IT 266
article thumbnail

The rising cybersecurity crisis in healthcare: Are you prepared?

OpenText Information Management

In 2024, a staggering 67% 1 of healthcare organizations worldwide faced ransomware attacksthe highest rate in years. The healthcare industry, with its treasure trove of protected health information (PHI) and critical infrastructure, has become a prime target for cybercriminals. From massive data breaches at major organizations to skyrocketing recovery costs, the stakes have never been higher.

article thumbnail

Microsoft's new AI agents aim to help security pros combat the latest threats

Collaboration 2.0

Designed for Microsoft's Security Copilot tool, the AI-powered agents will automate basic tasks, freeing IT and security staff to tackle more complex issues.

Security 248
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Proof of Concept: Is the US Losing Its Cyber Grip?

Data Breach Today

Cunningham and Daniel Warn That Poor Leadership, Cuts Are Hurting US Cyber Posture In the latest "Proof of Concept," Michael Daniel of the Cyber Threat Alliance and former Forrester analyst Chase Cunningham joined editors from Information Security Media Group to examine how fractured leadership, shifting responsibilities and declining federal support are eroding U.S. cyber defenses.

IT 130
article thumbnail

AI bots scraping your data? This free tool gives those pesky crawlers the run-around

Collaboration 2.0

Cloudflare's AI Labyrinth has a message for bots: Get lost. Here's how to toggle on the tool.

228
228
article thumbnail

Rapid7 Gets Truce With Activist Investor, Adds 3 Board Seats

Data Breach Today

Cooperation Deal With Jana Expands Rapid7 Board to 11, Tightens Governance Controls Rapid7 struck a truce with Jana Partners, agreeing to hand the activist investor three board seats in exchange for cooperation until early next year. The deal will boost Rapid7's board size from eight to 11, adding former Forescout CEO Wael Mohamed and former Imperva and Gigamon CFO Michael Burns.

article thumbnail

Got a suspicious E-ZPass text? Don't click the link (and what to do if you already did)

Collaboration 2.0

E-ZPass phishing texts have hit many thousands of people over the last few months - even non-drivers. Here's what to do if you receive one.

Phishing 219
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

23andMe's Bankruptcy: What Does it Mean for Data Privacy?

Data Breach Today

California Alerting Consumers to Delete Data, Samples Shared With Firm Genetics testing firm 23andMe has filed for Chapter 11 bankruptcy protection and says it is looking to sell the company. But what does that potentially mean for the firm's trove of highly sensitive health and ancestry information pertaining to millions of consumers?

article thumbnail

5 ways I use regex in Linux (and why they're so essential)

Collaboration 2.0

Once you get the hang of regular expressions, you'll find them invaluable. The trick is to start small - I'll show you how.

213
213
article thumbnail

Medusa Ransomware Brings Its Own Vulnerable Driver

Data Breach Today

Hackers Use Stolen Certificates to Bypass Endpoint Detection and Response A Russian-speaking ransomware group has been deploying a malicious Windows PE driver that imitates a legitimate CrowdStrike Falcon driver to bypass endpoint security, warn researchers. The driver disables endpoint detection and response software by stripping process protections.

article thumbnail

Did your Google Maps Timeline disappear? Here's the fix to get yours back

Collaboration 2.0

Google has admitted a technical issue caused timeline data to vanish. But you might be able to get yours back. Here's how.

211
211
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Wheelchair Firm Ramps Up Notices to 500,000 for Email Hack

Data Breach Today

Large Health Data Breach Started With Phishing Lure in Employees' Email Tennessee-based Numotion, one of the largest U.S. providers of wheelchairs and other health-related mobility products is notifying nearly 500,000 people of a 2024 email hacking incident that potentially compromised their personal and health-related information.

article thumbnail

10 professional developers on the true promise and peril of vibe coding

Collaboration 2.0

Is vibe coding the future of software or a security nightmare in disguise? Here's how experienced developers are responding to the latest AI-fueled coding craze.

Security 210
article thumbnail

Tencent Says It Does More in AI With Fewer GPUs

Data Breach Today

Not Every New Generation of LLM Needs Exponentially More Chips, Says Tencent Exec Chinese tech giant Tencent reported a slowdown in GPU deployment, attributing it to a prioritization among Sino tech companies of chip efficiency over raw numbers, a strategy made clear internationally by artificial intelligence firm DeepSeek.

article thumbnail

I use GIMP every day and I'm loving its 3.0 release. Here are my 4 favorite upgrades

Collaboration 2.0

After seven years of development, GIMP 3.0 is finally here - and this free alternative to Photoshop is better than ever.

IT 210
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

API Security: Another Critical Asset Under Threat

Data Breach Today

Adam Arellano of Traceable by Harness on Creating Multi-Layered Defense Increasingly, APIs are in cyber adversaries' crosshairs. What creates vulnerability complexities in API environments, and what can be done to create a more effective, multi-layered defense? Adam Arellano of Traceable by Harness discusses how AWS and Traceable tackle this challenge.

Security 130
article thumbnail

Your TV's USB port has hidden superpowers: 5 benefits you're not taking advantage of

Collaboration 2.0

The USB port on your TV is more than just an afterthought - it's a hidden gem packed with unexpected features.

IT 203
article thumbnail

Secure by Design Must Lead Software Development

Data Breach Today

Crossley of Schneider Electric Urges Supplier Scrutiny and Continuous Risk Review To strengthen defenses, organizations must adopt secure-by-design practices, select mature open-source components and embed risk awareness throughout development, according to Cassie Crossley, vice president, supply chain security, cybersecurity and product security office, Schneider Electric.

Security 130