Sat.Feb 08, 2025 - Fri.Feb 14, 2025

article thumbnail

Celebrating Information Management: Shell's Annual IG Week

AIIM

At Shell, we believe in the power of information management (IM) to drive business success. That's why, once a year, we host an Information Governance Week - a dedicated time to focus on the importance of IM across our organization.

article thumbnail

Security Researchers Warn of New Risks in DeepSeek AI App

Data Breach Today

Weak Encryption, Data Transfers to China, Hidden ByteDance Links Found Security researchers found DeepSeek AI has weak encryption, SQL injection flaws and sends user data to Chinese state-linked entities. Its AI model failed jailbreak tests, making it prone to manipulation. Regulators in Europe, South Korea, and Australia are investigating, with bans and warnings issued over security risks.

Risk 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Research: Ransomware Data Extortion Skyrocketing

KnowBe4

Data theft extortion attacks increased by 46% in the fourth quarter of 2024, according to a new report from Nuspire.

article thumbnail

News alert: Gcore Radar reveals 56% rise in DDoS attacks – gaming industry targeted the most

The Last Watchdog

Luxembourg, Luxembourg, Feb. 11, 2025, CyberNewswire — Gcore , the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2024, and businesses need to act fast to protect themselves from this evolving threat.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers

WIRED Threat Level

Despite high-profile attention and even US sanctions, the group hasnt stopped or even slowed its operation, including the breach of two more US telecoms.

IT 225

More Trending

article thumbnail

Cerebras CEO on DeepSeek: Every time computing gets cheaper, the market gets bigger

Collaboration 2.0

The economic breakthrough of DeepSeek's techniques will lead not only to an expansion of AI use but a continued arms race to achieve breakthroughs, says CEO Andrew Feldman.

Marketing 343
article thumbnail

Delivering Malware Through Abandoned Amazon S3 Buckets

Schneier on Security

Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize that they have been abandoned, and still ping them for patches, updates, and etc. The TL;DR is that this time, we ended up discovering ~150 Amazon S3 buckets that had previously been used across commercial and open source software

Libraries 116
article thumbnail

Top US Election Security Watchdog Forced to Stop Election Security Work

WIRED Threat Level

The US Cybersecurity and Infrastructure Security Agency has frozen efforts to aid states in securing elections, according to an internal memo viewed by WIRED.

Security 351
article thumbnail

Mental Health Provider Settles Fortra Hack Lawsuit for $7M

Data Breach Today

Breach of GoAnywhere File Transfer App at Brightline Affected 1 Million Patients Virtual mental health provider Brightline has agreed to pay $7 million to settle a proposed class action lawsuit involving a data breach affecting about 1 million individuals stemming from the 2023 hack by ransomware gang Clop on software vendor Fortra's GoAnywhere managed file transfer application.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Are we losing our critical thinking skills to AI? New Microsoft study raises red flags

Collaboration 2.0

As more workplaces embrace emerging technology, research warns that prolonged use of AI can erode our cognitive abilities.

331
331
article thumbnail

The Rise of Non-Ransomware Attacks on AWS S3 Data

Thales Cloud Protection & Licensing

The Rise of Non-Ransomware Attacks on AWS S3 Data madhav Thu, 02/13/2025 - 04:39 A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. Instead, they exploit the AWS server-side encryption with customer-provided keys (SSE-C), extorting payment in exchange for the encryption key.

article thumbnail

US Funding Cuts Are Helping Criminals Get Away With Child Abuse and Human Trafficking

WIRED Threat Level

Services supporting victims of online child exploitation and trafficking around the world have faced USAID and State Department cutsand children are suffering as a result, sources tell WIRED.

article thumbnail

The Alarming Backdoor Hiding in 2 Chinese Patient Monitors

Data Breach Today

Researcher Jason Sinchak on Recent Cyber Warnings About Contec CMS8000 Devices A hidden reverse backdoor in low-cost patient vital sign monitors used globally is hardcoded with an IP address connecting to a Chinese government-funded education and research network, which poses both privacy and potential safety concerns, said security researcher Jason Sinchak of ELTON.

Education 179
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Perplexity is the AI tool Gemini wishes it could be

Collaboration 2.0

Here's why I stick with Perplexity over Google's Gemini for AI assistance, even on my Android phone.

IT 331
article thumbnail

Microsoft Patch Tuesday security updates for February 2025 ficed 2 actively exploited bugs

Security Affairs

Microsoft Patch Tuesday security updates for February 2025 addressed four zero-day flaws, two of which are actively exploited in the wild. Microsoft Patch Tuesday security updates for February 2025 addressed 57 vulnerabilities in Windows and Windows Components, Office and Office Components, Azure, Visual Studio, and Remote Desktop Services. Two of these vulnerabilities are listed as publicly known, and two are actively exploited in the wild.

Security 167
article thumbnail

This Ad-Tech Company Is Powering Surveillance of US Military Personnel

WIRED Threat Level

In a letter to a US senator, a Florida-based data broker says it obtained sensitive data on US military members in Germany from a Lithuanian firm, revealing the global nature of online ad surveillance.

Military 189
article thumbnail

Altman Rejects Musk's $97.4B Offer for OpenAI

Data Breach Today

Offer Comes Amid Legal Battle Between the Former OpenAI Co-Founders Elon Musk has reportedly offered to buy OpenAI's operating assets for $97.4 billion, escalating his legal and business battle with the artificial intelligence company's CEO Sam Altman. Altman dismissed the offer and said he will buy Twitter for $9.74 billion - if Musk is interested.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

I tried to replace my laptop with the Galaxy S25 Ultra - and it changed how I work

Collaboration 2.0

A little-known Samsung feature lets you turn your phone into a desktop by connecting it to a monitor or TV. Just be sure your go-to apps are compatible.

IT 317
article thumbnail

Three ways to empower employee success with AI content management

OpenText Information Management

So much content, so little time. That was the situation facing RTVE Spain, a TV and radio broadcasting station, whose vast video archive was comprised of over 20 million assets dating back 50+ years. The state-owned company was sitting on a treasure trove of information, but when producers and journalists needed to find media assets for programming, quickly locating those hidden gems was next to impossible.

article thumbnail

The Loneliness Epidemic Is a Security Crisis

WIRED Threat Level

Romance scams cost victims hundreds of millions of dollars a year. As people grow increasingly isolated, and generative AI helps scammers scale their crimes, the problem could get worse.

Security 167
article thumbnail

Hackers Are Exploiting Trimble Cityworks, CISA Warns

Data Breach Today

Feds Order Agencies to Patch Critical Flaw in Widely Used Local Government System Hackers are exploiting a critical vulnerability in Trimble's Cityworks platform, an infrastructure management tool used by governments that enables remote code execution on Microsoft IIS web servers. CISA has ordered federal civilian agencies to patch a critical vulnerability by Feb. 28.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

A major Gemini feature is now free for all users - no Advanced subscription required

Collaboration 2.0

Google is making a very useful Gemini featur available to everyone for free. The AI is also getting a little smarter today.

310
310
article thumbnail

Threat Modeling the Genomic Data Sequencing Workflow (Threat Model Thursday)

Adam Shostack

An exciting new sample TM from MITRE For Threat Model Thursday, I want to provide some comments on NIST CSWP 35 ipd, Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow (Initial Public Draft). As always, my goal is to offer helpful feedback. This is a big, complex document. Its 50 pages of real content with 13 listed authors, and is a subset of a larger project.

Risk 59
article thumbnail

The Rise of the Drone Boats

WIRED Threat Level

Swarms of weaponized unmanned surface vessels have proven formidable weapons in the Black and Red Seas. Can the US military learn the right lessons from it?

Military 157
article thumbnail

Edge Devices Face Surge in Mass Brute-Force Password Attacks

Data Breach Today

Scale of Long-Running Attacks 'Unprecedented,' Warns The Shadowserver Foundation Honeypots designed to track malicious internet activity have detected a surge in brute-force password login attempts against edge devices, and especially - but not exclusively - targeting equipment manufactured by Palo Alto Networks, Ivanti and SonicWall, said The Shadowserver Foundation.

Passwords 165
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

5 ways AI can help with your taxes - and 10 major mistakes to avoid

Collaboration 2.0

AI and taxes: a perfect match or a disaster waiting to happen? Tax preparation is changing fast, but AI still has flaws. Here's where AI tax tools shine, where they fail, and how to use them wisely.

309
309
article thumbnail

Libraries Week: Libraries Change Lives in June and Green Libraries Week in October

CILIP

Libraries Week: Libraries Change Lives in June and Green Libraries Week in October SAVE THE DATES 2025: Libraries Change Lives will take place in June and Green Libraries Week in October. Through a new campaign approach and schedule, CILIP will lead two separate annual campaigns with partners promoting the impactful work delivered by all information professionals.

article thumbnail

Facebook Users Beware: Thousands Hit by New Phishing Scam

KnowBe4

Check Point warns that a large-scale phishing campaign is targeting Facebook accounts with phony copyright infringement notices.

Phishing 111