Trending Articles

article thumbnail

Millions of SK Telecom customers are potentially at risk following USIM data compromise

Security Affairs

SK Telecom warned that threat actors accessed customer Universal Subscriber Identity Module (USIM) info through a malware attack. SK Telecom is South Koreas largest wireless telecom company, a major player in the countrys mobile and tech landscape. It holds about 48% of the market share for mobile services, meaning around 34 million subscribers use its network.

Risk 208
article thumbnail

Your Meta Ray-Bans just got a big update for free - and it feels like science fiction

Collaboration 2.0

Previously limited to early access in certain countries, this new out-of-this-world feature is expanding to all owners.

IT 343
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Protect Yourself From Phone Searches at the US Border

WIRED Threat Level

Customs and Border Protection has broad authority to search travelers devices when they cross into the United States. Heres what you can do to protect your digital life while at the US border.

Privacy 360
article thumbnail

Doge Worker's Code Supports NLRB Whistleblower

Krebs on Security

A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE) siphoned gigabytes of data from the agency's sensitive case files in early March.

article thumbnail

Going Beyond Chatbots: Connecting AI to Your Tools, Systems, & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

If AI agents are going to deliver ROI, they need to move beyond chat and actually do things. But, turning a model into a reliable, secure workflow agent isn’t as simple as plugging in an API. In this new webinar, Alex Salazar and Nate Barbettini will break down the emerging AI architecture that makes action possible, and how it differs from traditional integration approaches.

article thumbnail

Hackers Hijack NFC for Instant Payment Fraud

Data Breach Today

Attack Combines Social Engineering and Card Emulation to Execute Real-Time Theft Hackers are using Chinese-speaking Android malware-as-a-service SuperCard X to carry out near-field communication relay attacks, siphoning payment card data and executing live point of sale and ATM transactions. Victims receive spoofed SMS or WhatsApp alerts purporting to originate from their bank.

Sales 165

More Trending

article thumbnail

Protecting Your Phone—and Your Privacy—at the US Border

WIRED Threat Level

In this episode of Uncanny Valley, our hosts explain how to prepare for travel to and from the United Statesand how to stay safe.

Privacy 281
article thumbnail

I changed 10 Samsung phone settings to instantly improve the user experience

Collaboration 2.0

Samsung phones are full of features - are you using them all? These settings could be the upgrade you didn't know you needed.

308
308
article thumbnail

Lotus Panda Hackers Strike Southeast Asian Governments With Browser Stealers, Sideloaded Malware

eSecurity Planet

A notorious Chinese-linked hacking group, known in cybersecurity circles as Lotus Panda, has once again been tied to a wave of cyberattacks that hit several Southeast Asian government and private sector organizations, according to fresh findings from Broadcoms Symantec Threat Hunter Team. The months-long intrusion campaign, which ran from August 2024 through February 2025, targeted various institutions, including a government ministry, air traffic control, a telecom provider, and a construction

article thumbnail

Whistleblower Warns DOGE Secretly Building 'Master Database'

Data Breach Today

Top Democrat Sounds Alarm Over Whistleblower Report of DOGE's Master Database A top Democrat on the House Oversight Committee sounded the alarm after a whistleblower provided information to Congress warning that staffers for the Department of Government Efficiency violated federal data laws while building a "master database" of sensitive information across federal agencies.

article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

MY TAKE: Notes on how GenAI is shifting tension lines in cybersecurity on the eve of RSAC 2025

The Last Watchdog

By Byron V. Acohido SAN FRANCISCO — The first rule of reporting is to follow the tension linesthe places where old assumptions no longer quite hold. Related: GenAI disrupting tech jobs Ive been feeling that tension lately. Just arrived in the City by the Bay. Trekked here with some 40,000-plus cyber security pros and company execs striving heading to RSAC 2025 at Moscone Center.

130
130
article thumbnail

Pete Hegseth’s Signal Scandal Spirals Out of Control

WIRED Threat Level

Plus: Cybercriminals stole a record-breaking fortune from US residents and businesses in 2024, and Google performs its final flip-flop in its yearslong quest to kill tracking cookies.

IT 193
article thumbnail

This 360-degree camera is my ultimate travel accessory - with AI features that creatives would want

Collaboration 2.0

Insta360 continues to update its great 360-degree cameras offering an all-around great vlogging tool.

IT 307
article thumbnail

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia

Thales Cloud Protection & Licensing

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia madhav Thu, 04/24/2025 - 04:56 Enhance remote digital signing security with an eIDAS-compliant Qualified Signature Creation Device (QSCD) for digital signatures and seals As business processes and government services become increasingly digital, remote signing has become a secure and efficient way to confirm the authenticity of digital documents, transactions, and identities through the

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Two Ransomware Hacks Affect 1.1 Million Patients

Data Breach Today

Hackers Hit Maryland Medical Group and California Hospital, Claim 480 GB Data Theft Two separate ransomware hacks of a Maryland medical group and a California hospital resulted in data thefts affecting more than 1.1 million patients, according to recent reports to regulators. Cybercriminals claim to have leaked 480 gigabytes of data from one of the attacks.

article thumbnail

AI, Information, and the Environment: Balancing Automation and Sustainability in the Age of GenAI

AIIM

Earth Day 2025: Intelligent Information Management and Its Growing Power Requirements Earth Day is an excellent opportunity to pause and reflect on our power needs in our private lives and businesses, particularly the growing and changing needs triggered by Generative AI (GenAI) technologies.

IT 132
article thumbnail

Gmail’s New Encrypted Messages Feature Opens a Door for Scams

WIRED Threat Level

Google is rolling out an end-to-end encrypted email feature for business customers, but it could spawn phishing attacks, particularly in non-Gmail inboxes.

article thumbnail

How much energy does a single chatbot prompt use? This AI tool can show you

Collaboration 2.0

That question you just asked ChatGPT might've used as much energy as an LED bulb running for 45 minutes.

290
290
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Warning: Ransomware Remains a Top Threat for SMBs

KnowBe4

A new report from Sophos found that ransomware attacks accounted for over 90% of incident response cases involving medium-sized businesses in 2024, as well as 70% of cases involving small businesses.

article thumbnail

UK Retailer Marks & Spencer Plays Incident Response Straight

Data Breach Today

Expert Lauds 'Textbook Cyber Crisis Communications' as M&S Details Some Disruption It's rare to see a corporation lauded for its hacking incident communications, but British retailer Marks and Spencer has executed an admirable version of what informing the world of bad news should look like. M&S notified customers directly about the cybersecurity incident.

Retail 147
article thumbnail

Android Improves Its Security

Schneier on Security

Android phones will soon reboot themselves after sitting idle for three days. iPhones have had this feature for a while; it’s nice to see Google add it to their phones.

IT 87
article thumbnail

Jamf School: A Secure Mobile Device Management Solution for Schools

Jamf

A recent DPIA confirms Jamf Schools MDM solution is secure for schools. Learn how Jamf enhances digital safety and supports compliance in education.

MDM 52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The 4 types of people interested in AI agents - and what businesses can learn from them

Collaboration 2.0

Consumers want agentic AI to simplify their daily lives. This research identifies four personality types who are interested in AI agents.

277
277
article thumbnail

How Organizational Culture Shapes Cyber Defenses

KnowBe4

Recently, I received an email at work from a company with whom I've had previous interactions. The email lacked context and contained an attachment, immediately raising suspicion.

article thumbnail

Cyber Firm CEO Accused of Placing Malware on Hospital Device

Data Breach Today

Faces Two Counts of Oklahoma Computer Crime Act Violations The CEO of a small cybersecurity firm is facing two counts of violating Oklahoma's Computer Crimes Act in a case alleging that he walked into an Oklahoma City hospital and installed malware on employee computers. The case echoes other alleged hospital security incidents.

article thumbnail

Cryptocurrency Thefts Get Physical

Schneier on Security

Long story of a $250 million cryptocurrency theft that, in a complicated chain events, resulted in a pretty brutal kidnapping.

73
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Revealed: 10 Secrets Behind High-Performing Facial Recognition Systems

HID Global

Learn what sets advanced facial recognition cameras apart and how to select the ideal system for security, speed, and performance across environments.

article thumbnail

This video of humanoid robots running a half marathon is amazing, hilarious, and a little creepy

Collaboration 2.0

Despite lost limbs, overheating, and a crash or two, a few of the 20 robots competing in China over the weekend did quite well. See for yourself.

272
272
article thumbnail

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

KnowBe4

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsofts latest Cyber Signals report.