Sat.Mar 01, 2025 - Fri.Mar 07, 2025

article thumbnail

Beyond the Basement: The Modern Information Management Professional

AIIM

Remember that old stereotype of the records manager working alone in the basement, shuffling papers? Let me tell you why that image is completely outdated and why today's information management professionals need a much more dynamic skill set.

article thumbnail

Proof of Concept: Automating Security Safely With Agentic AI

Data Breach Today

CSA's Troy Leach and Schellman's Avani Desai on AI Autonomy and Human Oversight In the latest "Proof of Concept," Troy Leach of the Cloud Security Alliance and Avani Desai of Schellman discuss how agentic AI is transforming security operations, enabling real-time threat detection and automated responses. But with increased autonomy comes greater risk.

Security 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data at Risk: 96% of Ransomware Attacks Involve Data Theft

KnowBe4

A new report from Arctic Wolf has found that 96% of ransomware attacks now involve data theft as criminals seek to force victims to pay up.

article thumbnail

Hunters International gang claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies

Security Affairs

Ransomware group Hunters International claims to have hacked Tata Technologies, threatening to leak 1.4 TB of stolen data. The Hunters International ransomware group claimed to have breached the Indian multinational technology company Tata Technologies, a Tata Motors subsidiary. The group claims the theft of 1.4 terabytes of data and is threatening to leak it.

article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

Pentagon Cuts Threaten Programs That Secure Loose Nukes and Weapons of Mass Destruction

WIRED Threat Level

Documents obtained by WIRED show the US Department of Defense is considering cutting up to 75 percent of workers who stop the spread of chemical, biological, and nuclear weapons.

Security 363

More Trending

article thumbnail

Russian DDoS Groups Frothing After Europe Backs Ukraine

Data Breach Today

Self-Described Hacktivists Appear to Remain Moscow Foreign Policy Extension Russia's use of high-profile online nuisance attacks as a psychology ploy designed to amplify Moscow's geopolitical agenda continues. As Europe has rallied to support Ukraine, self-proclaimed Russian hacktivists have trumpeted their targeting of the U.K. and EU member states, instead of the U.S.

272
272
article thumbnail

Polish Space Agency POLSA disconnected its network following a cyberattack

Security Affairs

The Polish space agency POLSA announced it has disconnected its network from the internet following a cyberattack. The Polish space agency POLSA was forced to disconnect its network from the internet in response to a cyberattack. The agency revealed that it has disconnected its infrastructure to contain the attack and secure data, a circumstance that suggests it was the victim of a ransomware attack. “A cybersecurity incident has occurred at POLSA.

IT 255
article thumbnail

1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers

WIRED Threat Level

New research shows at least a million inexpensive Android devicesfrom TV streaming boxes to car infotainment systemsare compromised to allow bad actors to commit ad fraud and other cybercrime.

Security 319
article thumbnail

Goodbye Skype, hello Teams: How Microsoft is making the switch easy

Collaboration 2.0

Microsoft confirms it's shutting down Skype, but it has a plan to ease your transition to Teams.

IT 324
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Feds Link $150M Cyberheist to 2022 LastPass Hacks

Krebs on Security

In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022.

Passwords 257
article thumbnail

Elastic patches critical Kibana flaw allowing code execution

Security Affairs

Elasticfixed a critical flaw inthe Kibanadata visualization dashboard software forElasticsearchthat could lead to arbitrary code execution. Elasticreleased security updates to address a critical vulnerability, tracked asCVE-2025-25012 (CVSS score of 9.9), impacting the Kibana data visualization dashboard software forElasticsearch. Kibana provides visualization capabilities on top of the content indexed on an Elasticsearch cluster.

Security 192
article thumbnail

US Charges 12 Alleged Spies in China’s Freewheeling Hacker-for-Hire Ecosystem

WIRED Threat Level

The Justice Department claims 10 alleged hackers and two Chinese government officials took part in a wave of cyberattacks around the globe that included breaching the US Treasury Department and more.

article thumbnail

What is vishing? Voice phishing is surging - expert tips on how to spot it and stop it

Collaboration 2.0

Phishing isn't limited to your inbox anymore.

Phishing 321
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

US Eases Off Russia in Cyberspace

Data Breach Today

Reports: Cyber Command Ordered to Halt Offensive Operations Against Russia Russia won't have to United States to worry about in cyberspace in an apparent concession to Moscow meant to grease talks between the two capitals over the fate of Ukraine. Defense Secretary Pete Hegseth ordered U.S. Cyber Command to halt offensive cyber operations against Russia.

252
252
article thumbnail

New Eleven11bot botnet infected +86K IoT devices

Security Affairs

The Eleven11bot botnet has infected over 86,000 IoT devices, mainly security cameras and network video recorders (NVRs). Researchers from Nokia Deepfield Emergency Response Team (ERT) discovered a new botnet named Eleven11bot that has already infected over 86,000 IoT devices. Most infected devices are security cameras and network video recorders (NVRs), which are used to launch DDoS attacks. “On 26 Feb 2025, the Deepfield Emergency Response Team (ERT) identified a significant new Distribut

IoT 183
article thumbnail

We're Backfilling and Cleaning Stealer Logs in Have I Been Pwned

Troy Hunt

I think I've finally caught my breath after dealing with those 23 billion rows of stealer logs last week. That was a bit intense, as is usually the way after any large incident goes into HIBP. But the confusing nature of stealer logs coupled with an overtly long blog post explaining them and the conflation of which services needed a subscription versus which were easily accessible by anyone made for a very intense last 6 days.

article thumbnail

Opera is now the first major web browser with AI-based agentic browsing

Collaboration 2.0

If you've been waiting for a better conjunction of web browser and AI, the wait is almost over, thanks to Opera.

316
316
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Reported US Cyber Pause on Russia Raises Questions, Concerns

Data Breach Today

Hiatus Could Embolden Moscow Reports suggesting the U.S. federal government is going soft on Russia in cyberspace sent shockwaves through the cybersecurity community. Resuming computer network attacks and other exploitation efforts after a pause isn't as simple as flipping a switch.

article thumbnail

China-linked APT Silk Typhoon targets IT Supply Chain

Security Affairs

Microsoft warns that China-backed APT Silk Typhoon linked to US Treasury hack, is now targeting global IT supply chains, using IT firms to spy and move laterally. Microsoft reported that China-linked APT group Silk Typhoon has shifted tactics to target IT solutions like remote management tools and cloud apps for initial access. Silk Typhoon is a China-linked cyber espionage group involved in the cyber attack against the US Treasury.

article thumbnail

Q&A with Martin Kraemer on Information Sharing in Cybersecurity

KnowBe4

Recently, Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at Kings College London released a Whitepaper called: Cybersecurity Information Sharing as an Element of Sustainable Security Culture, which examines how people consume and share cybersecurity information, revealing the role that workplace training plays in fostering information sharing among colleagues.

article thumbnail

Opera unveils impressive preview of AI agentic browsing - see it in action

Collaboration 2.0

If you've been waiting for a better conjunction of web browser and AI, the wait is almost over, thanks to Opera.

IT 314
article thumbnail

Maximizing Profit and Productivity: The New Era of AI-Powered Accounting

Speaker: Yohan Lobo and Dennis Street

In the accounting world, staying ahead means embracing the tools that allow you to work smarter, not harder. Outdated processes and disconnected systems can hold your organization back, but the right technologies can help you streamline operations, boost productivity, and improve client delivery. Dive into the strategies and innovations transforming accounting practices.

article thumbnail

A Brand New Botnet Is Delivering Record-Size DDoS Attacks

WIRED Threat Level

Eleven11bot infects webcams and video recorders, with a large concentration in the US.

Security 188
article thumbnail

Breach Roundup: US Sanctions Iran-Based Nemesis Admin

Data Breach Today

Also, BianLian Ransomware Hackers Aren't Really Mailing You This week, the U.S. sanctioned the Nemesis admin, Poco RAT spotted in Latin America, Apple challenged a British order to weaken encryption and the FBI warned against scam letters purportedly from BianLian. Also, a Nigerian tax scammer extradited to the U.S., a new botnet and a Webex vulnerability.

article thumbnail

Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe

Krebs on Security

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation (FBI). Legal experts say the inquiry could be grounds to reopen a number of adjudicated cases in which the expert’s testimony may have been pivotal.

article thumbnail

Vishing attacks surged 442% last year - how to protect yourself

Collaboration 2.0

Phishing isn't limited to your inbox anymore.

Phishing 312
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Key Takeaways from the CSA Understanding Data Security Risk Survey

Thales Cloud Protection & Licensing

Key Takeaways from the CSA Understanding Data Security Risk Survey madhav Tue, 03/04/2025 - 04:32 As hybrid and multi-cloud environments become increasingly popular, identifying, prioritizing, and mitigating data security risks becomes increasingly complex. How can we tackle this complexity? By gaining insight into how organizations handle risk. Thats the goal of the latest Cloud Security Alliance (CSA) Understanding Data Security Risk survey , which Thales is a proud sponsor of.

Risk 71
article thumbnail

China's Silk Typhoon Tied to Cloud Service Provider Hacks

Data Breach Today

Microsoft Sees Cyberespionage Group Lifting API Keys and Credentials for Customers A prolific cyberespionage group tied to Beijing appears to have increased its targeting of widely used IT tools and service providers. Microsoft said the group's tactics now include stealing API keys and credentials from providers to gain access to providers' downstream customers' infrastructure.

Cloud 173
article thumbnail

How machine learning and generative AI transform threat detection and SOC operations

OpenText Information Management

The rapid evolution ofcyber threats hasnecessitated theadoption of advanced technologies toenhance threat detection andresponse capabilities. Supervised and unsupervised machine learning, andgenerative AIhave emerged astransformative tools in cybersecurity, significantly altering how Security Operations Centers (SOCs) operate. These technologies enable faster, moreaccurate threat detection andresponse , while reducing theworkload on human analysts.