Wed.Apr 23, 2025

article thumbnail

Android spyware hidden in mapping software targets Russian soldiers

Security Affairs

A new Android spyware was discovered in a fake Alpine Quest app, reportedly used by Russian soldiers for war zone planning. Doctor Web researchers uncovered a new spyware, tracked as Android.Spy.1292.origin, targeting Russian military personnel. The malicious code was hidden in a trojanized Alpine Quest app and spread via Russian Android catalogs. The malware steals contacts, geolocation, and file info, it can also download extra modules to exfiltrate stored data when instructed. “Alpine Q

Military 216
article thumbnail

Your Meta Ray-Bans just got a big update for free - and it feels like science fiction

Collaboration 2.0

Previously limited to early access in certain countries, this new out-of-this-world feature is expanding to all owners.

IT 347
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Doge Worker's Code Supports NLRB Whistleblower

Krebs on Security

A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE) siphoned gigabytes of data from the agency's sensitive case files in early March.

article thumbnail

The 4 types of people interested in AI agents - and what businesses can learn from them

Collaboration 2.0

Consumers want agentic AI to simplify their daily lives. This research identifies four personality types who are interested in AI agents.

299
299
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

UK Retailer Marks & Spencer Plays Incident Response Straight

Data Breach Today

Expert Lauds 'Textbook Cyber Crisis Communications' as M&S Details Some Disruption It's rare to see a corporation lauded for its hacking incident communications, but British retailer Marks and Spencer has executed an admirable version of what informing the world of bad news should look like. M&S notified customers directly about the cybersecurity incident.

Retail 147

More Trending

article thumbnail

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia

Thales Cloud Protection & Licensing

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia madhav Thu, 04/24/2025 - 04:56 Enhance remote digital signing security with an eIDAS-compliant Qualified Signature Creation Device (QSCD) for digital signatures and seals As business processes and government services become increasingly digital, remote signing has become a secure and efficient way to confirm the authenticity of digital documents, transactions, and identities through the

article thumbnail

I changed 10 settings on my Pixel phone to instantly improve the user experience

Collaboration 2.0

Pixel phones have some seriously cool features - but these settings take your phone to a whole new level.

247
247
article thumbnail

Health System Pays Feds $600K to Settle HIPAA Breach Case

Data Breach Today

2019 Phishing Incident at California-Based PIH Health Affected Nearly 190,000 A regional healthcare network with three California hospitals serving Los Angeles and Orange Counties has agreed to pay federal regulators $600,000 and implement a corrective action plan to resolve potential HIPAA violations identified during an investigation into a 2019 phishing breach.

Phishing 130
article thumbnail

Your Roku TV is getting several free updates - including a big one for Roku City

Collaboration 2.0

If you often struggle to find something to watch, Roku has a few new features to help you.

246
246
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

Chainguard Raises $356M to Protect Open-Source Supply Chain

Data Breach Today

Series D Round Comes at $3.5B Valuation, Fuels Product Expansion Beyond Containers Chainguards $356 million Series D haul will help it push beyond securing containers to protecting virtual machines and language libraries. CEO Dan Lorenc says customers want security that scales with open-source adoption, especially amid rising software supply chain threats.

Libraries 130
article thumbnail

Your Roku TV is getting several updates for free - including a big one for Roku City

Collaboration 2.0

If you often struggle to find something to watch, Roku has a few new features to help you.

246
246
article thumbnail

Why Container Security Experts Are in Such High Demand

Data Breach Today

AI-Powered Tools Protect Containerized Environments Against Sophisticated Attacks Container security experts skilled in AI-driven defense tools are becoming critical as organizations rely more on containerized applications. These experts must contend with ephemeral workloads, secure CI/CD pipelines and implement real-time anomaly detection to protect cloud-native environments.

Security 130
article thumbnail

Smarty Pants or Life-Hacker: What type of AI agent user are you?

Collaboration 2.0

Consumers want agentic AI to simplify their daily lives. This research identifies four personality types who are interested in AI agents.

246
246
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

Kelly Benefits Notifying Nearly 264,000 of Data Theft Hack

Data Breach Today

Breach Victim Tally Soars Since Firm Filed an Initial Breach Report in Early April Kelly Benefits is notifying nine large clients and nearly 264,000 individuals that their sensitive personal information was potentially compromised in a December data theft incident. The tally of affected people has climbed eight-fold since the companys first estimate earlier this month.

130
130
article thumbnail

You'll soon manage a team of AI agents, says Microsoft's Work Trend report

Collaboration 2.0

We'll all be working for 'Frontier Firms' soon, according to Microsoft.

242
242
article thumbnail

Meta Fined 200 Million Euros for its 'Pay or Consent' Model

Data Breach Today

European Commission Also Fines Apple 500 Million Euros European regulators said Facebook conducted an end run around privacy regulations by requiring users to pay a monthly subscription fee or else accept that their personal data would be fed to advertisers. The European Commission fined the social media giant 200 million euros.

article thumbnail

How to clear your Android phone's cache and make it feel like new

Collaboration 2.0

You won't believe how much better your device will run.

IT 240
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

FBI Pushes Global Crackdowns as Cybercrime Losses Soar

Data Breach Today

Bureau Endorses Enhanced Information Sharing With Global Allies to Curb Cybercrime The FBI strongly supported recent efforts to expand information sharing with international partners and launch new efforts to curb global cybercrime, including working with Indian authorities to combat cyber-enabled financial crimes and transnational call center fraud.

130
130
article thumbnail

I tried to break this 10,000mAh power bank - it backfired in the most impressive way

Collaboration 2.0

The Poseidon Pro shrugs off abuse that would destroy other tech, including full submersion, 50-foot drops, and even explosives.

IT 236
article thumbnail

Socket Acquires Startup Coana to Boost Code Risk Precision

Data Breach Today

Acquisition Adds Expert Team, Reachability Analysis Tech to Socket's Security Stack With Coana's team and tools, Socket aims to strengthen its platform's ability to identify actionable vulnerabilities. The integration will help security teams eliminate busywork, focusing on high-impact issues using precomputed reachability data from open source codebases.

Risk 130
article thumbnail

Gmail is making it a whole lot easier to clean out your inbox on Android

Collaboration 2.0

You can view all the pesky email lists you want to unsubscribe from in one convenient place.

IT 230
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Warning: Ransomware Remains a Top Threat for SMBs

KnowBe4

A new report from Sophos found that ransomware attacks accounted for over 90% of incident response cases involving medium-sized businesses in 2024, as well as 70% of cases involving small businesses.

article thumbnail

How to set up remote desktop access on your Linux computers

Collaboration 2.0

Want to access your Linux PCs remotely? You can set up RDP the hard way, or you can make those connections the easy way. I'll step you through the easy option.

Access 224
article thumbnail

Breaking the Stigma: 90% of Employees Agree that Phishing Simulations Improve their Security Awareness

KnowBe4

According to our independent survey of individuals across the UK, USA, Netherlands, France, Denmark, Sweden, the DACH region, and Africa who use a laptop as part of their work, 90.1% find simulated phishing tests relevant. Whats more, 90.7% agreed that these simulations improve their awareness of real phishing attacks.

article thumbnail

I dropped a brick on this 10,000mAh power bank - it survived in the most stylish way

Collaboration 2.0

The Poseidon Pro shrugs off punishment that would wreck most tech - from full submersion and 50-foot drops to blasts from explosives.

IT 222
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Crypto mining campaign targets Docker environments with new evasion technique

Security Affairs

New malware campaign targets Docker environments using unknown methods to secretly mine cryptocurrency, researchers warn. Researchers from Darktrace and Cado Security have spotted a malware campaign that targets Docker environments with a novel technique to mine cryptocurrency. The malware campaign targets Docker environments to deploy a malicious node connected to Teneo, a decentralized infrastructure network.

Mining 297
article thumbnail

Why I just added Gemini 2.5 Pro to the very short list of AI tools I pay for

Collaboration 2.0

I refuse to pay for most AI tools but a new one just made the cut - here's why I'm stunned.

219
219
article thumbnail

The popular xrpl.js Ripple cryptocurrency library was compromised in a supply chain attack

Security Affairs

The xrpl.js Ripple cryptocurrency library was compromised in a supply chain attack aimed at stealing users’ private keys. Threat actors compromised the Ripple cryptocurrency npm JavaScript library xrpl.js to harvest users’ private keys. xrpl.js is the recommended library for integrating a JavaScript/TypeScript app with the XRP, it has more than 140.000 weekly downloads.

Libraries 279