Sun.Apr 13, 2025

article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell C is the fourth-largest mobile network operator in South Africa, , after Vodacom, MTN, and Telkom. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and international calling, SIM-only plans and device deals.

article thumbnail

An affordable Windows laptop with great specs for work travel? I found the one to buy

Collaboration 2.0

The Asus Vivobook S 15 is an impressive ultraportable on its own, but the OLED display and excellent battery life make it hard to overlook at this price.

IT 188
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure

Security Affairs

China admitted in a secret meeting with U.S. officials that it conducted Volt Typhoon cyberattacks on U.S. infrastructure, WSJ reports. China reportedly admitted in a secret meeting with U.S. officials that it carried out cyberattacks on U.S. infrastructure, linked to the Volt Typhoon campaign. According to the Wall Street Journal, at a December Geneva summit, Chinese officials indirectly admitted to Volt Typhoon cyberattacks on U.S. infrastructure, reportedly linked to U.S.

IT 313
article thumbnail

This is the most customizable smart home accessory I didn't know I needed

Collaboration 2.0

Govee's new Neon Rope Light 2 makes it easy to decorate your home and has quickly become a staple in my household.

IT 182
article thumbnail

Going Beyond Chatbots: Connecting AI to Your Tools, Systems, & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

If AI agents are going to deliver ROI, they need to move beyond chat and actually do things. But, turning a model into a reliable, secure workflow agent isn’t as simple as plugging in an API. In this new webinar, Alex Salazar and Nate Barbettini will break down the emerging AI architecture that makes action possible, and how it differs from traditional integration approaches.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 41

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Lazarus Expands Malicious npm Campaign: 11 New Packages Add Malware Loaders and Bitbucket Payloads BadBazaar: iOS and Android Surveillanceware by Chinas APT15 Used to Target Tibetans and Uyghurs GOFFEE continues to attack organizations in Russia Atomic and Exodus crypto wallets targeted in malicious npm campaign Malicious VSCode extensions infect Windows with cryp

Security 174