Thu.Jan 16, 2025

article thumbnail

Breach Roundup: Microsoft Makes Security Staff Cuts

Data Breach Today

Also: Intensified Russian Hacking in Ukraine, Spain's Telefnica Confirms Breach This week, Microsoft laid off security staff and released Patch Tuesday, Russian hackers intensified attacks on Ukraine in 2024, Telefnica confirmed a breach, a Tennessee mortgage leader reported a breach and the Texas AG sued Allstate over driver data collection.

Security 173
article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” or “Trackin

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Law Office Wolf Haldenstein Says Hack Affected 3.4 Million

Data Breach Today

Legal Firm Joins Other Class Action Litigators Targeted by Hackers Wolf Haldenstein Adler Freeman & Herz LLP, a law firm that represents consumers in data breach lawsuits, has reported to regulators its own 2023 hack affecting more than 3.4 million individuals. The incident isn't the first time a law firm that handles data breach litigation reported a major hack.

article thumbnail

How to sign up for the next TikTok - and why you should do it right away

Collaboration 2.0

The TikTok alternative many users are recommending is called Neptune. Join the waitlist now to snag the username you want. Here's what to do.

IT 125
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Cryptohack Roundup: BitMEX's $100M Penalty

Data Breach Today

Also: US Govt Seeks Return of Hack Funds to Bitfinex; Mango Markets Shuts This week, BitMEX fined $100M, prosecutors sought return of Bitfinex funds, Mango Markets shut, a Web3 attack method; pastor charged in crypto scam, CFPB proposed firms refund hack victims, 2024 crime stats, Wolf Capital co-founder's guilty plea, Thai Bitcoin miners seized and a New York AG lawsuit.

Marketing 147

More Trending

article thumbnail

Researchers Spot Serious UEFI Secure Boot Bypass Flaw

Data Breach Today

Attackers Can Employ a Vulnerable Driver to Target Most Windows and Linux Systems Researchers are warning Microsoft Windows as well as many Linux distribution users to install updates that revoke permissions for a vulnerable driver that attackers can use to target most systems, allowing them to bypass UEFI Secure Boot and install a bootkit to take full control of a system.

Security 147
article thumbnail

How to screen record in Windows 10 or 11 with built-in tools

Collaboration 2.0

Windows 10 and 11 each offer a built-in screen-recording tool for gaming, though it can record just about any screen activity. And Windows 11 has an even better option. Here's what to know.

IT 122
article thumbnail

Prove Purchases Portabl to Advance Identity Authentication

Data Breach Today

Acquisition Boosts Standardized Consent Frameworks, Identity Data Interoperability Proves acquisition of Philadelphia-based startup Portabl focuses on enhancing interoperability and reusable identity solutions. The move supports emerging industry standards, bridging gaps between identity verification, authentication, and payments for seamless customer experiences.

article thumbnail

I gave away my Kindle and iPad within hours of testing this Android tablet

Collaboration 2.0

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G has become my favorite e-reader tablet for several reasons.

120
120
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to Manage Cyber Risk of Medical Devices - for Life

Data Breach Today

Experts Offer Advice for Managing Growing Inventories, Resources for Providers Faced with this onslaught of smart, connected medical equipment, many healthcare providers are looking for device cybersecurity strategies and ways to help make these products more secure. Experts say it requires ongoing commitment to device security - something many providers haven't yet done.

Risk 130
article thumbnail

Super Productivity is the ultimate task manager for your time management goals

Collaboration 2.0

When a regular task manager just isn't enough, you need something a bit more 'super' that can not only help you keep track of tasks but also time spent on tasks and much more.

116
116
article thumbnail

Abandoned Online Domains Unlock Services with Google Sign On

Data Breach Today

Google Says Platforms Shouldn't Use Emails as Unique Identifiers A security researcher purchased abandoned online domains belonging to failed startups and found he could recreate email addresses and access third party services containing sensitive information collected by the shuttered companies by signing onto the platforms using "Sign in with Google.

Access 130
article thumbnail

These Beyerdynamic headphones deliver impressively accurate sound and all-day comfort

Collaboration 2.0

Looking for a brilliant pair of studio-quality, open-back headphones? The Beyerdynamic DT 1990 Pro are some of the best that I've tested.

116
116
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

US Sanctions North Korean Remote IT Worker Front Companies

Data Breach Today

Treasury Also Sanctions Chinese Company for Supplying Tech Equipment The U.S. federal government targeted for sanctions a network of North Korean front companies and a Chinese supplier that support a Pyongyang program of planting remote IT workers into Western corporations. The front companies are Korea Osong Shipping and Chonsurim Trading Corporation.

IT 130
article thumbnail

Android Automotive users are about to see a lot more apps in their vehicles

Collaboration 2.0

Google is making efforts to push more apps to the Android infotainment system without extra work from developers.

112
112
article thumbnail

Apple Joins the UALink Consortium for AI Chip Connectivity

Data Breach Today

UALink Crafts Alternative to Nvidia NVLink to Speed AI Accelerator Links Device-maker Apple joined the board of a recently incorporated industry group that aims to establish open standards for directly connecting AI accelerator chip clusters in data centers. The direct connection optimizes the parallel computing and high data throughput that make GPUs efficient.

130
130
article thumbnail

This 11-in-1 docking station delivered all the ports I needed - and then some

Collaboration 2.0

Need more ports? This easy-to-use docking station from one of my favorite tech brands can help.

111
111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Your KnowBe4 Fresh Content Updates from December 2024

KnowBe4

Check out the 52 new pieces of training content added in December, alongside the always fresh content update highlights, new features and events.

article thumbnail

It's official: All your Office apps are getting AI and a price increase

Collaboration 2.0

Every Microsoft 365 Personal and Family subscription is about to get Copilot AI features, along with a price increase of at least 30%. The global rollout comes after months of testing and is certain to be controversial.

IT 106
article thumbnail

First Ever Magic Quadrant™ for Email Security Platforms by Gartner®

KnowBe4

In cybersecurity, email has always been a critical concern. However, we feel the new 2024 Gartner Magic Quadrant for Email Security Platforms has signaled a shift in how we approach email protection.

Security 104
article thumbnail

Linux Mint 22.1 is primed and ready for release - and I'm excited

Collaboration 2.0

The latest update of the best Linux desktop distro is out and ready to go. Here's what to expect.

103
103
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Russia-linked APT Star Blizzard targets WhatsApp accounts

Security Affairs

The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “ Callisto “, Seaborgium , ColdRiver , and TA446, targeted government officials, military personnel,journalists and think tanks since at least 2015.

article thumbnail

The best password manager for families in 2025: Expert tested and reviewed

Collaboration 2.0

The best password managers provide security, privacy, and ease of use for a reasonable price. We tested the best ones to help you find what's best for your family.

Passwords 101
article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” or “Trackin

article thumbnail

Can Gemini ever catch ChatGPT in the AI race? Here's where it stands now

Collaboration 2.0

Though growing in capability, Gemini still isn't as popular as competing AI apps and services.

IT 100
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Prominent US law firm Wolf Haldenstein disclosed a data breach

Security Affairs

The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The law firm Wolf Haldenstein disclosed a 2023 data breach that exposed the personal information of nearly 3.5 million individuals. Wolf Haldenstein Adler Freeman & Herz LLP is a prominent U.S.-based law firm that specializes in complex class action litigation.

article thumbnail

The best AI for coding in 2025 (and what not to use)

Collaboration 2.0

I've been subjecting chatbots to a set of real-world programming tests for 18 months now. There are two I recommend if you're looking for AI coding help - and several to avoid.

99
article thumbnail

FBI Deletes PlugX Malware from Thousands of Computers

Schneier on Security

According to a DOJ press release , the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details : To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI , at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

Access 94