February, 2025

article thumbnail

Infostealers Tied to Stolen AI and Defense Credentials

Data Breach Today

Information-Stealing Malware Continues to Feed Markets for Stolen Credentials Defense sector and military agency employees, and artificial intelligence service users, all show signs of having been infected by information-stealing malware, as the market for buying and selling stolen credentials continues to thrive, experts warn.

article thumbnail

Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’?

Krebs on Security

The FBI joined authorities across Europe last week in seizing domain names for Cracked and Nulled , English-language cybercrime forums with millions of users that trafficked in stolen data, hacking tools and malware. An investigation into the history of these communities shows their apparent co-founders quite openly operate an Internet service provider and a pair of e-commerce platforms catering to buyers and sellers on both forums.

Archiving 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Celebrating Information Management: Shell's Annual IG Week

AIIM

At Shell, we believe in the power of information management (IM) to drive business success. That's why, once a year, we host an Information Governance Week - a dedicated time to focus on the importance of IM across our organization.

article thumbnail

A large botnet targets M365 accounts with password spraying attacks

Security Affairs

A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication. SecurityScorecard researchers discovered a botnet of over 130,000 devices that is conducting password-spray attacks against Microsoft 365 (M365) accounts worldwide. The attackers targeted accounts protected with basic authentication bypassing multi-factor authentication.

Passwords 298
article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

GUEST ESSAY: How AI co-pilots boost the risk of data leakage — making ‘least privilege’ a must

The Last Watchdog

The rise of AI co-pilots is exposing a critical security gap: sensitive data sprawl and excessive access permissions. Related: Weaponizing Microsoft’s co-pilot Until now, lackluster enterprise search capabilities kept many security risks in checkemployees simply couldnt find much of the data they were authorized to access. But Microsoft Copilot changes the game, turbocharging enterprise search and surfacing sensitive information that organizations didnt realize was exposed.

Risk 219

More Trending

article thumbnail

Download your Kindle books ASAP - before Amazon kills this feature next week

Collaboration 2.0

The clock is ticking for Kindle users. After February 2025, a long-standing feature disappears. Will this change how you buy and store digital books? Read on to find out.

362
362
article thumbnail

DOGE Now Has Access to the Top US Cybersecurity Agency

WIRED Threat Level

DOGE technologists Edward Coristinethe 19-year-old known online as Big Ballsand Kyle Schutt are now listed as staff at the Cybersecurity and Infrastructure Security Agency.

article thumbnail

Delivering Malware Through Abandoned Amazon S3 Buckets

Schneier on Security

Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize that they have been abandoned, and still ping them for patches, updates, and etc. The TL;DR is that this time, we ended up discovering ~150 Amazon S3 buckets that had previously been used across commercial and open source software

Libraries 117
article thumbnail

Citrix addressed NetScaler console privilege escalation flaw

Security Affairs

Citrix addressed a high-severity privilege escalation vulnerability impacting NetScaler Console and NetScaler Agent under certain conditions. Citrix released security updates to address a high-severity security vulnerability, tracked as CVE-2024-12284 (CVSS score of 8.8) impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent. The vulnerability is an improper privilege management that could allow attackers to escalate privileges under certain conditions. “A vulnerability h

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

News alert: Gcore Radar reveals 56% rise in DDoS attacks – gaming industry targeted the most

The Last Watchdog

Luxembourg, Luxembourg, Feb. 11, 2025, CyberNewswire — Gcore , the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2024, and businesses need to act fast to protect themselves from this evolving threat.

article thumbnail

Information Governance: The Foundation of Responsible AI Systems

AIIM

The rise of artificial intelligence has sparked a digital renaissance, transforming how we process, analyze, and utilize data. But as AI systems become more sophisticated and pervasive, a critical question emerges: How do we ensure the data feeding these systems is accurate, secure, and ethically managed? This is where information governance takes center stage.

article thumbnail

Why rebooting your phone daily is your best defense against zero-click hackers

Collaboration 2.0

Mobile spyware attacks are on the rise globally. That's why you should treat your phone like a computer, according to this cybersecurity expert.

article thumbnail

DOGE Teen Owns ‘Tesla.Sexy LLC’ and Worked at Startup That Has Hired Convicted Hackers

WIRED Threat Level

Experts question whether Edward Coristine, a DOGE staffer who has gone by Big Balls online, would pass the background check typically required for access to sensitive US government systems.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

More Research Showing AI Breaking the Rules

Schneier on Security

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly impossible task: to win against Stockfish, which is one of the strongest chess engines in the world and a much better player than any human, or any of the AI models in the study. Researchers also gave the models what they call a “scratchpad:” a text box the AI could use to “think” before making its next

Paper 117
article thumbnail

Coyote Banking Trojan targets Brazilian users, stealing data from 70+ financial apps and websites

Security Affairs

Coyote Banking Trojan targets Brazilian users, stealing data from over 70 financial applications and websites. FortiGuard Labs researchers detected a campaign using LNK files executing PowerShell commands to deploy the Coyote Banking Trojan. Threat actors target Brazilian users by stealing financial data, the malware can harvest sensitive information from over 70 financial applications and numerous websites.

Metadata 292
article thumbnail

News alert: SpyCloud operationalizes darknet data, pioneers shift to holistic identity threat protection

The Last Watchdog

Austin, TX, Feb. 4, 2025, CyberNewswire — SpyClouds Identity Threat Protection solutions spearhead a holistic identity approach to security, illuminating correlated hidden identity exposures and facilitating fast, automated remediation. SpyCloud , a leading identity threat protection company, announced key innovations in its portfolio, pioneering the shift to holistic identity threat protection.

Analytics 124
article thumbnail

Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs

Data Breach Today

Rapid Patching Urged: Flaws Pose Man-in-the-Middle Attack, Denial of Service Risks Millions of servers are at risk from vulnerabilities in OpenSSH, a widely used, open source remote server management and file transfer tool. The flaws pose man-in-the-middle attack and denial of service exploit risks, and have been patched in the latest version of OpenSSH.

Risk 260
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

If COBOL is so problematic, why does the US government still use it?

Collaboration 2.0

If you've gotten cash from an ATM, you've interacted with a COBOL-based system. Here's why this old programming language will probably outlive us all.

article thumbnail

Top US Election Security Watchdog Forced to Stop Election Security Work

WIRED Threat Level

The US Cybersecurity and Infrastructure Security Agency has frozen efforts to aid states in securing elections, according to an internal memo viewed by WIRED.

Security 347
article thumbnail

AIs and Robots Should Sound Robotic

Schneier on Security

Most people know that robots no longer sound like tinny trash cans. They sound like Siri , Alexa , and Gemini. They sound like the voices in labyrinthine customer support phone trees. And even those robot voices are being made obsolete by new AI-generated voices that can mimic every vocal nuance and tic of human speech, down to specific regional accents.

IT 99
article thumbnail

SpyLend Android malware found on Google Play enabled financial cyber crime and extortion

Security Affairs

CYFIRMA researchers discovered that the SpyLend Android malware was downloaded 100,000 times from the official app store Google Play. CYFIRMA researchers discovered an Android malware, named SpyLend, which was distributed through Google Play as Finance Simplified. The malware targets Indian users with unauthorized loan apps, enabling predatory lending, blackmail, and extortion.

Access 294
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Mishing Is the New Phishing — And It’s More Dangerous

eSecurity Planet

Cybercriminals are shifting their focus from emails to text messages, using mishing a more deceptive form of phishing to target mobile users and infiltrate corporate networks, according to new security research by Zimperium. The research found a sharp rise in mobile phishing attacks, with cybercriminals moving away from traditional email scams in favor of SMS-based attacks.

article thumbnail

Clinical Trial Database Exposes 1.6M Records to Web

Data Breach Today

Researcher Says Firm Failed to Secure Sensitive Health Data From Survey Forms An unsecured database containing 2 terabytes of data allegedly exposed more than 1.6 million clinical research records to the internet, including sensitive personal and medical information of patients, said the security researcher who discovered the lapse. Why does this keep happening?

Security 257
article thumbnail

Google just made AI coding assistance free for everyone - with very generous limits

Collaboration 2.0

With 180,000 completions per month and deep IDE integration, Gemini Code Assist could change how developers write and review code. Here's what you need to know.

347
347
article thumbnail

Elon Musk’s Starlink Is Keeping Modern Slavery Compounds Online

WIRED Threat Level

A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmarwhere tens of thousands of people are enslavedare using Starlink to get online.

Privacy 316
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Deepfakes and the 2024 US Election

Schneier on Security

Interesting analysis : We analyzed every instance of AI use in elections collected by the WIRED AI Elections Project ( source for our analysis), which tracked known uses of AI for creating political content during elections taking place in 2024 worldwide. In each case, we identified what AI was used for and estimated the cost of creating similar content without AI.

IT 93
article thumbnail

Storm-2372 used the device code phishing technique since August 2024

Security Affairs

Russia-linked group Storm-2372 used the device code phishing technique since Aug 2024 to steal login tokens from governments, NGOs, and industries. Microsoft Threat Intelligence researchers warn that threat actor Storm-2372, likely linked to Russia, has been targeting governments, NGOs, and various industries across multiple regions since August 2024.

Phishing 284
article thumbnail

UK betting giants under fire for ads targeting at-risk gamblers

The Guardian Data Protection

Judge condemns firm for use of customers data after problem gambler was sent 1,300 emails over two years I lost 10 years of my life: how UK betting giants unlawful marketing kept suicidal gambler hooked Gambling companies in Britain could be forced to overhaul their advertising practices after a betting firm was ruled to have unlawfully targeted a problem gambler who was bombarded with more than 1,300 marketing emails.

Risk 93