Sat.Jan 11, 2025 - Fri.Jan 17, 2025

article thumbnail

Turning Information Into Outcomes: What Governance Really is About

Weissman's World

For years, youve heard me exhort you to implement information governance because you collected all that information for a reason, right? and infogov is how you get value from it. And while thats true, Im not sure I ever completely brought that sentiment to ground. So let me now close that gap. Over the next… Read More » Turning Information Into Outcomes: What Governance Really is About The post Turning Information Into Outcomes: What Governance Really is About appeared first on Holly

article thumbnail

Microsoft: Happy 2025. Here’s 161 Security Updates

Krebs on Security

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three “zero-day” weaknesses that are already under active attack. Redmond’s inaugural Patch Tuesday of 2025 bundles more fixes than the company has shipped in one go since 2017. Rapid7 ‘s Adam Barnett says January marks the fourth consecutive month where Microsoft has published zero-day vulnerabilities on Patch Tuesday without evaluating any of them

Security 273
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Enterprises Need to Know About Agentic AI Risks

Data Breach Today

Mitigating Cybersecurity, Privacy Risks for New Class of Autonomous Agents Many organizations are looking to artificial intelligence agents to autonomously perform tasks that surpass traditional automation. Tech firms are rolling out agentic AI tools that can handle customer-facing interactions, IT operations and a variety of other processes without human intervention, but experts are cautioning security teams to watch for cyber and privacy risks.

Risk 230
article thumbnail

I spent hours testing ChatGPT Tasks - and its refusal to follow directions was mildly terrifying

Collaboration 2.0

ChatGPT tasks offers AI prompt scheduling and automation, but what happens when things go wrong?

IT 356
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices

Security Affairs

A previously unknown threat actor released config files and VPN passwords for Fortinet FortiGate devices on a popular cybercrime forum. A previously unknown threat actor named Belsen Group published configuration files and VPN passwords for over 15,000 Fortinet FortiGate appliances. “2025 will be a fortunate year for the world. At the beginning of the year, and as a positive start for us, and in order to solidify the name of our group in your memory, we are proud to announce our first offi

Passwords 323

More Trending

article thumbnail

Microsoft Sues Harmful Fake AI Image Crime Ring

Data Breach Today

Guardrails Bypassed on Azure OpenAI to Generate 'Thousands of Harmful Images' Microsoft filed a lawsuit targeting a cybercrime service used to generate "thousands of harmful images" by subverting the guardrails built into its Azure generative artificial intelligence tools. The company said attackers built a tool that reverse-engineered the guardrails in its AI platform.

article thumbnail

The five biggest mistakes people make when prompting an AI

Collaboration 2.0

Ready to transform how you use AI tools?

article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” or “Trackin

article thumbnail

News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security

The Last Watchdog

Silver Spring, MD, Jan. 15, 2025, CyberNewswire — Aembit , the non-human identity and access management (IAM) company, unveiled the full agenda for NHIcon 2025, a virtual event dedicated to advancing non-human identity security, streaming live on Jan. 28 and headlined by industry luminary Kevin Mandia. NHIcon 2025 is co-presented by Aembit and Veza , alongside industry partners Identity Defined Security Alliance and Cloud Security Alliance.

Security 130
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

WIRED Threat Level

A breach of AT&T that exposed nearly all of the company's customers may have included records related to confidential FBI sources, potentially explaining the Bureau's new embrace of end-to-end encryption.

article thumbnail

CES 2025: The 25 best products that impressed us the most

Collaboration 2.0

ZDNET editors scoured the show floor for a week and identified all of this year's best products - including those that will make the biggest impact on the future.

357
357
article thumbnail

Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket

Security Affairs

The ransomware group Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C, Halcyon researchers warn. The ransomware group Codefinger has been spotted using compromised AWS keys to encrypt data in S3 buckets. The threat actor used AWSs Server-Side Encryption with Customer Provided Keys (SSE-C) for encryption, then demanded the payment of a ransom to the victim to recover the data using the attackers’ symmetric AES-256 keys required to decrypt data.

article thumbnail

Ministers mull allowing private firms to make profit from NHS data in AI push

The Guardian Data Protection

Anonymised data could help develop treatments, drugs and diagnostic tools but potential misuse worries experts What does AI plan mean for NHS patient data and is there cause for concern? Ministers are considering allowing private companies to make profits from NHS data as part of a push to revolutionise the health service using artificial intelligence, government officials have indicated.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

FBI Deletes PlugX Malware from Thousands of Computers

Schneier on Security

According to a DOJ press release , the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details : To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI , at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

Access 94
article thumbnail

Microsoft to force new Outlook app in Windows 10 with no way to block it

Collaboration 2.0

Designed to replace the current Mail and Calendar apps, the new Outlook can only be removed after it's been installed.

IT 345
article thumbnail

FBI deleted China-linked PlugX malware from over 4,200 US computers

Security Affairs

The FBI has removed Chinese PlugX malware from over 4,200 computers in networks across the United States, the U.S. Department of Justice reported. The Justice Department and FBI, along with international partners, announced they deleted PlugX malware from thousands of infected computers worldwide as part of a multi-month law enforcement operation. The malware was operated by a China-linked threat actor, known as Mustang Panda (aka Twill Typhoon, to steal sensitive information from victim compute

article thumbnail

US Identifies Hacking Firm Behind Salt Typhoon Telecom Hacks

Data Breach Today

Department of Treasury Imposes Sanctions The U.S. federal government said Friday it's traced the source of Chinese hacker intrusions into telecom networks to a government contractor located in hacking hotbed Sichuan. The Department of Treasury imposed sanctions on the firm, Sichuan Juxinhe Network Technology.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

2025 Will Be a Brave New Tokenized World

Data Matters

Tokenization of real-world assets (RWAs) is revolutionizing the way we perceive and manage assets. Tokenized RWAs, or more simply the digital representation of physical or intangible assets using a token recorded on a blockchain, allows for the efficient recording, trading, transferring, and managing of tangible assets in a digital format. The post 2025 Will Be a Brave New Tokenized World appeared first on Data Matters Privacy Blog.

article thumbnail

10 Linux apps I install on every new machine (and why you should, too)

Collaboration 2.0

If you're wondering which apps take priority on your new Linux machine, these 10 will help you get the most out of the OS.

338
338
article thumbnail

CVE-2024-44243 macOS flaw allows persistent malware installation

Security Affairs

Microsoft disclosed details of a vulnerability in Apple macOS that could have allowed an attacker to bypass the OS’s System Integrity Protection ( SIP ). Microsoft disclosed details of a now-patched macOS flaw, tracked as CVE-2024-44243 (CVSS score: 5.5), that allows attackers with “root” access to bypass System Integrity Protection ( SIP ).

Libraries 278
article thumbnail

Inside the Black Box of Predictive Travel Surveillance

WIRED Threat Level

Behind the scenes, companies and governments are feeding a trove of data about international travelers into opaque AI tools that aim to predict whos safeand whos a threat.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Thales Cloud Protection & Licensing

Fifteen Best Practices to Navigate the Data Sovereignty Waters josh.pearson@t Tue, 01/14/2025 - 08:04 Data sovereigntythe idea that data is subject to the laws and regulations of the country it is collected or stored inis a fundamental consideration for businesses attempting to balance harnessing the power of data analytics, ensuring compliance with increasingly stringent regulations, and protecting the privacy of their users.

article thumbnail

This hidden Pixel camera feature makes your photos more vibrant - how to enable it

Collaboration 2.0

Pixel phones are well known for their superior cameras. This feature makes them even better.

IT 334
article thumbnail

Prominent US law firm Wolf Haldenstein disclosed a data breach

Security Affairs

The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The law firm Wolf Haldenstein disclosed a 2023 data breach that exposed the personal information of nearly 3.5 million individuals. Wolf Haldenstein Adler Freeman & Herz LLP is a prominent U.S.-based law firm that specializes in complex class action litigation.

article thumbnail

Breach Roundup: Microsoft Makes Security Staff Cuts

Data Breach Today

Also: Intensified Russian Hacking in Ukraine, Spain's Telefnica Confirms Breach This week, Microsoft laid off security staff and released Patch Tuesday, Russian hackers intensified attacks on Ukraine in 2024, Telefnica confirmed a breach, a Tennessee mortgage leader reported a breach and the Texas AG sued Allstate over driver data collection.

Security 173
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The ‘Largest Illicit Online Marketplace’ Ever Is Growing at an Alarming Rate, Report Says

WIRED Threat Level

Huione Guarantee, a gray market researchers believe is central to the online scam ecosystem, now includes a messaging app, stablecoin, and crypto exchangewhile facilitating $24 billion in transactions.

Marketing 173
article thumbnail

How to create system restore points on Linux with Timeshift - and why you should

Collaboration 2.0

Concerned about something going wrong with your Linux system? If so, Timeshift can help return things to a working state should something go awry.

331
331
article thumbnail

A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls

Security Affairs

Experts warn of a new campaign targeting an alleged zero-day in Fortinet FortiGate firewalls with management interfaces exposed online. Arctic Wolf researchers observed a campaign targeting Fortinet FortiGate firewalls with exposed management interfaces, likely exploiting a zero-day vulnerability. Threat actors gained unauthorized access to network devices, created accounts, and modified configurations.

Access 203