Sat.Feb 22, 2025 - Fri.Feb 28, 2025

article thumbnail

UK Delays Plans for AI Regulation

Data Breach Today

Some Lawmakers Fear Regulation Could Stymie Innovation The British Labour Government has reportedly delayed plans to put forward a draft bill on artificial intelligence over concerns that binding AI regulation could stifle the country's AI growth potential. A spokesperson said the government remains "committed to bringing forward a legislation.

article thumbnail

10 bugs still haunt Windows 11 24H2 despite multiple patches

Collaboration 2.0

Microsoft's 24H2 update for Windows 11 has been hit with one bug after another. Many have been patched, but these remain.

325
325
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How AI co-pilots boost the risk of data leakage — making ‘least privilege’ a must

The Last Watchdog

The rise of AI co-pilots is exposing a critical security gap: sensitive data sprawl and excessive access permissions. Related: Weaponizing Microsoft’s co-pilot Until now, lackluster enterprise search capabilities kept many security risks in checkemployees simply couldnt find much of the data they were authorized to access. But Microsoft Copilot changes the game, turbocharging enterprise search and surfacing sensitive information that organizations didnt realize was exposed.

Risk 219
article thumbnail

A large botnet targets M365 accounts with password spraying attacks

Security Affairs

A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication. SecurityScorecard researchers discovered a botnet of over 130,000 devices that is conducting password-spray attacks against Microsoft 365 (M365) accounts worldwide. The attackers targeted accounts protected with basic authentication bypassing multi-factor authentication.

Passwords 298
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Elon Musk’s Starlink Is Keeping Modern Slavery Compounds Online

WIRED Threat Level

A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmarwhere tens of thousands of people are enslavedare using Starlink to get online.

Privacy 323

More Trending

article thumbnail

More Research Showing AI Breaking the Rules

Schneier on Security

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly impossible task: to win against Stockfish, which is one of the strongest chess engines in the world and a much better player than any human, or any of the AI models in the study. Researchers also gave the models what they call a “scratchpad:” a text box the AI could use to “think” before making its next

Paper 114
article thumbnail

SpyLend Android malware found on Google Play enabled financial cyber crime and extortion

Security Affairs

CYFIRMA researchers discovered that the SpyLend Android malware was downloaded 100,000 times from the official app store Google Play. CYFIRMA researchers discovered an Android malware, named SpyLend, which was distributed through Google Play as Finance Simplified. The malware targets Indian users with unauthorized loan apps, enabling predatory lending, blackmail, and extortion.

Access 294
article thumbnail

Elon Musk's Federal Worker Email Sparks 'Security Nightmare'

Data Breach Today

Federal Agencies and Experts Alike Say Musk's Email Request Poses Security Threat The Department of Government Efficiency-led effort to assess whether millions of federal jobs are necessary through a bulleted list of weekly activities is causing a major security threat, in addition to mass confusion across the federal government, experts told Information Security Media Group.

Security 252
article thumbnail

Google just made AI coding assistance free for everyone - with very generous limits

Collaboration 2.0

With 180,000 completions per month and deep IDE integration, Gemini Code Assist could change how developers write and review code. Here's what you need to know.

347
347
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

This Russian Tech Bro Helped Steal $93 Million and Landed in US Prison. Then Putin Called

WIRED Threat Level

In the epic US-Russian prisoner swap last summer, Vladimir Putin brought home an assassin, spies, and another prized ally: the man behind one of the biggest insider trading cases of all time.

Security 231
article thumbnail

A data leak exposes the operations of the Chinese private firm TopSec, which provides Censorship-as-a-Service

Security Affairs

A leak suggests that Chinese cybersecurity firm TopSec offers censorship-as-a-service services, it provided bespoke monitoring services to a state-owned enterprise facing a corruption scandal. SentinelLABS researchers analyzed a data leak that suggests that the Chinese cybersecurity firm TopSec offers censorship-as-a-service services. The origin of the data leak is unclear, the leak is large and inconsistently formatted, complicating the full analysis.

article thumbnail

Mishing Is the New Phishing — And It’s More Dangerous

eSecurity Planet

Cybercriminals are shifting their focus from emails to text messages, using mishing a more deceptive form of phishing to target mobile users and infiltrate corporate networks, according to new security research by Zimperium. The research found a sharp rise in mobile phishing attacks, with cybercriminals moving away from traditional email scams in favor of SMS-based attacks.

article thumbnail

Why Gmail is replacing SMS codes with QR codes - and what it means for you

Collaboration 2.0

With SMS an unsecure method of authentication, Google is eyeing a more robust solution with QR codes.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Home Office contractor collecting data on UK citizens while checking migrants’ finances

The Guardian Data Protection

Credit reporting firm Equifax accidentally sends email to a charity that suggests it has data on hundreds of thousands of unsuspecting Britons The Home Office has been accused of collecting data on hundreds of thousands of unsuspecting British citizens while conducting financial checks on migrants. A report by a private contractor for a routine immigration application was mistakenly sent to a charity by a government official, and contained information on more than 260 people including their name

article thumbnail

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails

Security Affairs

Belgian authorities are investigating Chinese hackers for breaching its State Security Service (VSSE), stealing 10% of emails from 2021 to May 2023. The Belgian federal prosecutor’s office is probing a possible security breach on its State Security Service (VSSE) by China-linked threat actors. Chinese hackers gained access to the VSSE’s email server between 2021 and May 2023, stealing 10% of staff incoming and outgoing emails. “For nearly two years, hackers working for Chinese

Security 176
article thumbnail

US Officials Recommend Using Encrypted Apps for Messaging

eSecurity Planet

Our cybersecurity expert discusses why officials are warning that unencrypted messaging apps are vulnerable to hacking, surveillance and cyberattacks. Explore the risks of popular apps and why switching to encrypted alternatives is crucial. Take control of your data and protect your privacy before its too late! The post US Officials Recommend Using Encrypted Apps for Messaging appeared first on eSecurity Planet.

article thumbnail

This 5-year tech industry forecast predicts some surprising winners - and losers

Collaboration 2.0

Here's what will be hot or not in technology markets over the next five years, as projected by ABI Research. Do you agree?

Marketing 324
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Black Basta Leaks Reveal Targeting, Planning, Escalation

Data Breach Today

Group Cross-Referenced Open-Source Victim Intelligence With Infostealer Hauls The leak of 200,000 internal chat messages for the Black Basta operation provides an overview of how a modern ransomware group organizes itself to take down victims in the most efficient, profit-maximizing manner possible, using a variety of tactics that should be, in theory, easy to repel.

article thumbnail

U.S. CISA adds Microsoft Power Pages flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Power Pages vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Microsoft Power Pages vulnerability, tracked as CVE-2025-24989 , to its Known Exploited Vulnerabilities (KEV) catalog. CVE-2025-24989 (CVSS score: 8.2) is an improper access control flaw in Power Pages, an unauthorized attacker could exploit the flaw to elevate privileges over

IT 163
article thumbnail

Carnegie Shadowing: Inspiring Teen Boys to Read for Pleasure

CILIP

Carnegie Shadowing: Inspiring Teen Boys to Read for Pleasure The Carnegies Shadowing programme is a beacon of hope for literacy, as reading for pleasure declines in children, through its unique, empowering approach, writes Mackenzie Warner, Carnegie Awards Manager. The joy of reading is not universal among children and young people in the UK today. According a 2024 report from the National Literacy Trust, only one in three children and young people aged eight to 18 enjoy reading in their free ti

article thumbnail

This $300 Motorola has a better display and battery life than iPhone 16e - at half the price

Collaboration 2.0

The Moto G Power (2025) undercuts the competition with its 6.8-inch Full HD+ display and multi-day battery life.

IT 328
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The noodle soup of B2B IAM and third-party identities

Thales Cloud Protection & Licensing

The noodle soup of B2B IAM and third-party identities madhav Wed, 02/26/2025 - 07:29 Introduction: A messy bowl of terminology Identity management is no longer just about employees. The B2B IAM The Hidden Value of Third-Party Identities research revealed that more external identities interact with an enterprises cloud, network, and devices than traditional employees.

B2B 71
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 34

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. You’ve Got Malware: FINALDRAFT Hides in Your Drafts Telegram Abused as C2 Channel for New Golang Backdoor Infostealing Malware Infections in the U.S. Military & Defense Sector: A Cybersecurity Disaster in the Making Analyzing ELF/Sshdinjector.A!

Security 163
article thumbnail

Breach Notification Service Tackles Infostealing Malware

Data Breach Today

'Have I Been Pwned' Flags Emails Found in Infostealer Malware Logs It Obtains How bad has the information stealing malware problem become? Here's a metric: The free breach-notification service Have I Been Pwned found a single infostealer service provided "284 million unique email addresses alongside the websites they were entered into and the passwords used.

Passwords 173
article thumbnail

Microsoft battles more bugs in Windows 11 24H2 with new round of patches

Collaboration 2.0

Released this week, the optional update also improves a number of features.

318
318
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

$1.4 Billion Stolen From ByBit in Biggest Crypto Theft Ever

WIRED Threat Level

Plus: Apple turns off end-to-end encrypted iCloud backups in the UK after pressure to install a backdoor, and two spyware apps expose victim dataand the identities of people who installed the apps.

article thumbnail

GitVenom campaign targets gamers and crypto investors by posing as fake GitHub projects

Security Affairs

GitVenom malware campaign targets gamers and crypto investors by posing as open-source projects on GitHub. Kaspersky researchers warn of a malware campaign, dubbed GitVenom, targeting GitHub users. The threat actors behind this campaign created hundreds of fake GitHub repositories with malicious code, disguising them as automation tools, crypto bots, and hacking utilities.

IT 172
article thumbnail

Leaked Black Basta Chats Expose Ransomware Secrets & Infighting

eSecurity Planet

Over 200,000 internal messages from the notorious ransomware group Black Basta have surfaced online exposing deep divisions, ransom negotiations, and internal dysfunction. The leak, spanning a years worth of communications, was posted online by an anonymous user, reportedly in retaliation for the groups attack on Russian financial institutions. Cybersecurity experts are now poring over the data, uncovering a rare inside look at how one of the most feared ransomware groups operates and potentia