Sat.Feb 15, 2025 - Fri.Feb 21, 2025

article thumbnail

Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs

Data Breach Today

Rapid Patching Urged: Flaws Pose Man-in-the-Middle Attack, Denial of Service Risks Millions of servers are at risk from vulnerabilities in OpenSSH, a widely used, open source remote server management and file transfer tool. The flaws pose man-in-the-middle attack and denial of service exploit risks, and have been patched in the latest version of OpenSSH.

Risk 260
article thumbnail

The Future of Records Management: Breaking Down Silos and Building Bridges

AIIM

As someone who's been in the information management field for over 25 years, I've witnessed significant shifts in how organizations handle their information. One of the most notable changes I'm seeing is how records management is evolving and finding new homes within organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Windows 11 update breaks File Explorer - among other glitches

Collaboration 2.0

Microsoft's latest Patch Tuesday fixed several bugs but triggered several problems. Some users are struggling just to install the security update.

Security 336
article thumbnail

Clinical Trial Database Exposes 1.6M Records to Web

Data Breach Today

Researcher Says Firm Failed to Secure Sensitive Health Data From Survey Forms An unsecured database containing 2 terabytes of data allegedly exposed more than 1.6 million clinical research records to the internet, including sensitive personal and medical information of patients, said the security researcher who discovered the lapse. Why does this keep happening?

Security 257
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Knowledge management takes center stage in the AI journey

Collaboration 2.0

Without a strong knowledge management ability, customer experience leaders will be unable to realize the potential of AI.

More Trending

article thumbnail

DOGE Now Has Access to the Top US Cybersecurity Agency

WIRED Threat Level

DOGE technologists Edward Coristinethe 19-year-old known online as Big Ballsand Kyle Schutt are now listed as staff at the Cybersecurity and Infrastructure Security Agency.

article thumbnail

Information Governance: The Foundation of Responsible AI Systems

AIIM

The rise of artificial intelligence has sparked a digital renaissance, transforming how we process, analyze, and utilize data. But as AI systems become more sophisticated and pervasive, a critical question emerges: How do we ensure the data feeding these systems is accurate, secure, and ethically managed? This is where information governance takes center stage.

article thumbnail

Download your Kindle books ASAP - before Amazon kills this feature next week

Collaboration 2.0

The clock is ticking for Kindle users. After February 2025, a long-standing feature disappears. Will this change how you buy and store digital books? Read on to find out.

362
362
article thumbnail

Storm-2372 used the device code phishing technique since August 2024

Security Affairs

Russia-linked group Storm-2372 used the device code phishing technique since Aug 2024 to steal login tokens from governments, NGOs, and industries. Microsoft Threat Intelligence researchers warn that threat actor Storm-2372, likely linked to Russia, has been targeting governments, NGOs, and various industries across multiple regions since August 2024.

Phishing 282
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Elon Musk’s DOGE Is Being Sued Under the Privacy Act: What to Know

WIRED Threat Level

At least eight ongoing lawsuits related to the so-called Department of Government Efficiencys alleged access to sensitive data hinge on the Watergate-inspired Privacy Act of 1974. But its not airtight.

Privacy 270
article thumbnail

Infostealers Tied to Stolen AI and Defense Credentials

Data Breach Today

Information-Stealing Malware Continues to Feed Markets for Stolen Credentials Defense sector and military agency employees, and artificial intelligence service users, all show signs of having been infected by information-stealing malware, as the market for buying and selling stolen credentials continues to thrive, experts warn.

article thumbnail

If COBOL is so problematic, why does the US government still use it?

Collaboration 2.0

If you've gotten cash from an ATM, you've interacted with a COBOL-based system. Here's why this old programming language will probably outlive us all.

article thumbnail

Microsoft fixed actively exploited flaw in Power Pages

Security Affairs

Microsoft addressed a privilege escalation vulnerability in Power Pages, the flaw is actively exploited in attacks. Microsoft has addressed two critical vulnerabilities, tracked as CVE-2025-21355 (CVSS score: 8.6) and CVE-2025-24989 (CVSS score: 8.2), respectively impacting Bing and Power Pages. CVE-2025-21355 is a missing authentication for critical Function in Microsoft Bing, an unauthorized attacker could exploit the flaw to execute code over a network.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online

WIRED Threat Level

The cybersecurity lead for VA.gov was fired last week. He tells WIRED that the Veterans Affairs digital hub will be more vulnerable without someone in his role.

article thumbnail

Attackers Exploit Palo Alto Zero-Day Authentication Bypass

Data Breach Today

Surge in Attack Attempts Spotted After Palo Alto Networks Details and Patches Flaw Attackers have stepped up efforts to exploit a vulnerability in the software that runs Palo Alto Networks firewall appliances that could give them direct access to the underlying software. Unauthenticated hackers could use PHP scripts to bypass the PAN-OS management web interface.

article thumbnail

10 key reasons AI went mainstream overnight - and what happens next

Collaboration 2.0

Not long ago, AI seemed like a futuristic idea. Now, it's in everything. What happened?

IT 332
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 33

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.

Security 162
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A Signal Update Fends Off a Phishing Technique Used in Russian Espionage

WIRED Threat Level

Google warns that hackers tied to Russia are tricking Ukrainian soldiers with fake QR codes for Signal group invites that let spies steal their messages. Signal has pushed out new safeguards.

Phishing 225
article thumbnail

Centralised, Scalable, Compliant: Keeping Your Data Safer with Enterprise Key Management

Thales Cloud Protection & Licensing

Centralised, Scalable, Compliant: Keeping Your Data Safer with Enterprise Key Management madhav Tue, 02/18/2025 - 04:50 The rise of multi-cloud environments, hybrid infrastructures, and stricter regulatory requirements has made cryptographic key management a major priority for enterprises around the world. Without an effective enterprise key management (EKM) strategy, your organisation faces a higher risk of data breaches, non-compliance with regulations, and operational inefficiencies.

article thumbnail

4 Pixel phone tricks every user should know - including my favorite

Collaboration 2.0

Pixel Call Assist doesn't just help block spam anymore. Google's added calling features to please everyone - even if you hate talking on the phone.

329
329
article thumbnail

North Korea Stealing Cryptocurrency With JavaScript Implant

Data Breach Today

'Marstech1' Malware Targets Developers Through GitHub Respository New North Korean malware is targeting cryptowallets with an unconventional command-and-control infrastructure and through malware embedded into a GitHub repository that's apparently the account of a Pyongyang hacker. The implant appears to have emerged late last December.

165
165
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The Official DOGE Website Launch Was a Security Mess

WIRED Threat Level

Plus: Researchers find RedNote lacks basic security measures, surveillance ramps up around the US-Mexico border, and the UK ordering Apple to create an encryption backdoor comes under fire.

Security 224
article thumbnail

Go Beyond FIDO Standards: Best Practices When Deploying FIDO Security Keys in Enterprise

Thales Cloud Protection & Licensing

Go Beyond FIDO Standards: Best Practices When Deploying FIDO Security Keys in Enterprise madhav Thu, 02/20/2025 - 06:22 Initially designed for the consumer market, the FIDO (Fast IDentity Online) standard aims to replace passwords with more secure authentication methods for online services. While recent versions, like FIDO2.1, have begun to address enterprise needs, significant gaps remain that organizations must address to simplify, accelerate, and secure their deployment.

article thumbnail

9 ways to delete yourself from the internet (and hide your identity online)

Collaboration 2.0

If you need to lock down data or reduce your digital footprint, follow our step-by-step guide.

326
326
article thumbnail

Breach Roundup: FBI Publishes Ghost Warning

Data Breach Today

Also: Lee Enterprises Recovering From Ransomware Attack, an Ivanti POC This week, a FBI warning on Ghost ransomware, Lee Enterprises confirmed its ransomware attack, a proof-of-concept for Ivanti EPM flaws and a cybersecurity flaw in a Xerox machine. Also, a Chinese cyberespionage hacker apparently moonlighted as a ransomware attacker and NioCorp hit by a cyber heist.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases

WIRED Threat Level

Google enables marketers to target people with serious illnesses and crushing debtagainst its policiesas well as the makers of classified defense technology, a WIRED investigation has found.

Marketing 218
article thumbnail

A new era of advanced threat detection and response has arrived

OpenText Information Management

Why security needs to get smarter I have a problem with rules. Theyre simply not good enough on their own. Imagine youre the security guard of an office building. To keep intruders out, you create a rule: anyone without a badge gets stopped at the door. Seems effective until someone figures out, they can clone a badge or tailgate behind an employee.

article thumbnail

How to run DeepSeek AI locally to protect your privacy - 2 easy ways

Collaboration 2.0

If you're curious about DeepSeek but reluctant to try it because of privacy issues, this is the solution for you.

Privacy 326