Wed.Jan 15, 2025

article thumbnail

Ransomware Leak Sites Suggest Attacks Reached Record High

Data Breach Today

RansomHub, Play and Akira Appear to Dominate; Numerous Newcomers Join the Fray While ransomware groups' data-leak sites regularly lie, if taken at face value, in December 2024 they collectively listed the largest number of victims ever seen in a one-month period, dominated by RansomHub, Play and Akira operations, plus a bevy of newcomers, researchers report.

article thumbnail

The five biggest mistakes people make when prompting an AI

Collaboration 2.0

Ready to transform how you use AI tools?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia Targets Kazakhstan in Espionage Campaign

Data Breach Today

Hackers Exploit Malicious Macros in Diplomatic Documents to Target Asian Nations Hackers possibly from the Russian Main Intelligence Directorate have been spying on neighboring government of Kazakhstan using legitimate documents that have been booby-trapped with malicious macros. The latest campaign, dubbed "Double-Tap," emerged in October 2024.

article thumbnail

Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices

Security Affairs

A previously unknown threat actor released config files and VPN passwords for Fortinet FortiGate devices on a popular cybercrime forum. A previously unknown threat actor named Belsen Group published configuration files and VPN passwords for over 15,000 Fortinet FortiGate appliances. “2025 will be a fortunate year for the world. At the beginning of the year, and as a positive start for us, and in order to solidify the name of our group in your memory, we are proud to announce our first offi

Passwords 127
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

GoDaddy Pledges Improved Cybersecurity in US FTC Settlement

Data Breach Today

Hackers Repeatedly Compromised GoDaddy's Web Hosting Environment Internet registrar and web host GoDaddy agreed to two decades worth of third-party assessments over its cybersecurity practices in a settlement with the U.S. FTC. GoDaddy in February 2023 attributed a run of hacking incidents that began in 2019 to a "sophisticated threat actor group.

More Trending

article thumbnail

Turning Curiosity into a Career: The Power of OSINT

Data Breach Today

Working in Open Source Intelligence: Get Paid for Something You Do Every Day Open source intelligence, commonly referred to as OSINT, is the collection, analysis and use of publicly available information from open sources. These sources include websites, social media, news articles, public records, forums and even multimedia content such as videos and photos.

130
130
article thumbnail

News alert: Sweet Security’s LLM-powered detection engine reduces cloud noise to 0.04%

The Last Watchdog

Tel Aviv, Israel, Jan. 15, 2025, CyberNewswire — Sweet Security , a leader in cloud runtime detection and response, today announced the launch of its groundbreaking patent-pending Large Language Model (LLM)-powered cloud detection engine. This innovation enhances Sweet’s unified detection and response solution, enabling it to reduce cloud detection noise to an unprecedented 0.04%.

Cloud 130
article thumbnail

CISA First Spotted Salt Typhoon Hackers in Federal Networks

Data Breach Today

US Cyber Defense Agency Was Not Initially Aware Hackers Were Part of Salt Typhoon The U.S. federal government's first hint that Chinese hackers penetrated American telecommunications infrastructure came from telemetry on government networks, said Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency.

article thumbnail

How to keep Linux optimized (and save time) with Stacer

Collaboration 2.0

If you want to get the most out of your system while keeping it clean, free of junk, and running smoothly, Stacer is the tool for you.

IT 128
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cloud 3.0 Is Here: What CISOs Must Do Now

Data Breach Today

CSA's Jim Reavis on Why Generative AI Requires a Shift in Data Security Strategy Over the past two years, AI enabled by a cloud interface has ushered in the age of cloud 3.0. The industry is evolving faster than anyone could predict, forcing organizations to rethink their security and risk strategies, said Jim Reavis, CEO and co-founder at Cloud Security Alliance.

Cloud 130
article thumbnail

Microsoft Office support in Windows 10 ends in October too - what that really means

Collaboration 2.0

The end of support is near for more than just Windows 10. But there's no need to panic.

127
127
article thumbnail

Cisco Unveils AI Defense to Stand Against Model Safety Risks

Data Breach Today

Product Head Jeetu Patel on How AI Defense Ensures Secure LLM Operations at Runtime Cisco's AI Defense platform addresses emerging safety and security risks in AI. By leveraging insights from Robust Intelligence, it offers model validation, threat prevention and integrated guardrails to protect against evolving challenges such as hallucinations and prompt injection attacks.

Risk 130
article thumbnail

How to install Arch Linux without losing your mind

Collaboration 2.0

If you've ever wanted to try Arch Linux but were afraid of the installation process, there's a handy script to help ease this task.

127
127
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

AI and Applied Security Dominate Nullcon Paper Submissions

Data Breach Today

CFP Board Members Discuss AI, Hardware Access and Emerging Trends for Nullcon 2025 Cybersecurity research submissions for the Nullcon 2025 CFP Review Board reflect prominent trends and challenges in the field. Nullcon CFP Review Board members Anant Shrivastava and Neelu Tripathi noted a growing focus on AI, supply chain and applied security.

Paper 130
article thumbnail

How to delete Facebook, Messenger, or Instagram - if you want Meta out of your life

Collaboration 2.0

Peace out, Meta. It's been weird.

IT 125
article thumbnail

News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security

The Last Watchdog

Silver Spring, MD, Jan. 15, 2025, CyberNewswire — Aembit , the non-human identity and access management (IAM) company, unveiled the full agenda for NHIcon 2025, a virtual event dedicated to advancing non-human identity security, streaming live on Jan. 28 and headlined by industry luminary Kevin Mandia. NHIcon 2025 is co-presented by Aembit and Veza , alongside industry partners Identity Defined Security Alliance and Cloud Security Alliance.

Security 130
article thumbnail

PC running slow? This tiny storage drive gave mine an instant speed boost

Collaboration 2.0

Instead of buying an all-new processor, this thumb-sized 1TB storage drive gave my old PC a much-needed speed boost.

Mining 122
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-44243 macOS flaw allows persistent malware installation

Security Affairs

Microsoft disclosed details of a vulnerability in Apple macOS that could have allowed an attacker to bypass the OS’s System Integrity Protection ( SIP ). Microsoft disclosed details of a now-patched macOS flaw, tracked as CVE-2024-44243 (CVSS score: 5.5), that allows attackers with “root” access to bypass System Integrity Protection ( SIP ).

Libraries 109
article thumbnail

Need a TikTok alternative? How to get started with Neptune - and why you should

Collaboration 2.0

This app may be the next TikTok, and if you join the waitlist, you can reserve your username handle.

112
112
article thumbnail

U.S. CISA adds Fortinet FortiOS to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Fortinet FortiOS authorization bypass vulnerability, tracked as CVE-2024-55591 (CVSS score: 9.6) to its Known Exploited Vulnerabilities (KEV) catalog.

IT 102
article thumbnail

This battery-powered floodlight camera is exactly what my dark yard needed

Collaboration 2.0

The Blink Outdoor 4 with a Floodlight mount is the perfect security camera for the unlit side of my yard.

Security 111
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Phishing False Alarm

Schneier on Security

A very security-conscious company was hit with a (presumed) massive state-actor phishing attack with gift cards, and everyone rallied to combat it—until it turned out it was company management sending the gift cards.

Phishing 104
article thumbnail

ChatGPT can carry out daily recurring tasks for you now - how to get started

Collaboration 2.0

ChatGPT inches closer to agentic AI with its news Tasks feature. Here's what it can do for you.

IT 108
article thumbnail

Japan Attributes More Than 200 Cyberattacks to China Threat Actor "MirrorFace"

KnowBe4

Japans National Police Agency (NPA) has attributed more than 200 cyber incidents over the past five years to the China-aligned threat actor MirrorFace, Infosecurity Magazine reports.

article thumbnail

Agents have entered the Microsoft 365 Copilot Chat

Collaboration 2.0

If you use Microsoft 365 Copilot for work, you'll like this upgrade.

106
106
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Microsoft Patch Tuesday updates for January 2025 fixed three actively exploited flaws

Security Affairs

Microsoft Patch Tuesday security updates for January 2025 addressed 161 vulnerabilities, including three actively exploited issues. Microsoft Patch Tuesday security updates for January 2025 addressed 161 vulnerabilities in Windows and Windows Components, Office and Office Components, Hyper-V, SharePoint Server,NET and Visual Studio, Azure, BitLocker, Remote Desktop Services, and Windows Virtual Trusted Platform Module. 11 of these vulnerabilities are rated Critical, and the other are rated Impor

article thumbnail

CES 2025: The 25 best products that we're still thinking about a week later

Collaboration 2.0

ZDNET editors scoured the show floor last week and identified all of this year's best products, including those that will have the biggest impact on the future.

106
106
article thumbnail

Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices

Security Affairs

A previously unknown threat actor released config files and VPN passwords for Fortinet FortiGate devices on a popular cybercrime forum. A previously unknown threat actor named Belsen Group published configuration files and VPN passwords for over 15,000 Fortinet FortiGate appliances. “2025 will be a fortunate year for the world. At the beginning of the year, and as a positive start for us, and in order to solidify the name of our group in your memory, we are proud to announce our first offi