Thu.Jan 09, 2025

article thumbnail

Breach Roundup: Finland Detains Tanker Tied to Cable Sabotage

Data Breach Today

Also, Alleged Gravy Analytics Breach Exposes Location Data This week, a Russian tanker linked to cable sabotage detained in Finland, a claimed Gravy Analytics breach exposed location data, a Mirai-based botnet exploited zero-day flaws, Dell updated framework flaws and a court sentenced a Florida woman for laundering millions in romance scams.

Analytics 162
article thumbnail

10 Linux apps I always install first - and you should too

Collaboration 2.0

If you're just now jumping onto the Linux train, you might be wondering what apps to install first. Here are the first 10 I find should be installed by all.

145
145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Florida Firm Fined $337K by Feds for Data Deleted in Hack

Data Breach Today

Behavioral Health Company Lost Electronic PHI for Nearly 3,000 Patients in Breach A Florida-based behavioral health holding company has paid federal regulators a $337,750 HIPAA settlement for a 2018 incident involving the deletion of electronic protected health information pertaining to nearly 3,000 patients. How should other entities avoid these data loss situations?

147
147
article thumbnail

Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location

WIRED Threat Level

A hack of location data company Gravy Analytics has revealed which apps areknowingly or notbeing used to collect your information behind the scenes.

Analytics 135
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Darktrace Acquires Cado Security as AI Meets Cloud Forensics

Data Breach Today

Cado Security Deal Brings Enhanced Forensics, Automation, and AI-Powered Analytics By acquiring Cado Security, Darktrace strengthens its ability to secure multi-cloud environments. The transaction brings together Cado's forensic capabilities with Darktrace's AI analytics to deliver comprehensive threat detection and response to organizations in regulated industries.

Cloud 147

More Trending

article thumbnail

Exit Interview: CISA's Nitin Natarajan on Threats to Watch

Data Breach Today

Deputy Director Reflects on Term and Offers Advice to Successors From application security to zero trust, it's been a busy four years for the current leaders of the U.S. Cybersecurity and Infrastructure Security Agency. Deputy Director Nitin Natarajan discusses the agency's accomplishments and the threats that await the next administration's cyber leaders.

article thumbnail

The Best of CES 2025 awards are in, as selected by ZDNET and the rest of CNET Group

Collaboration 2.0

Our experts sifted through the thousands of CES exhibitors to find the best tech.

122
122
article thumbnail

Cryptohack Roundup: Kwon's Trial, China's Blockchain Plan

Data Breach Today

Also: Penalty on Illegal Cryptomining in Siberia This week's roundup includes Do Kwon's trial, penalty on a Siberian firm over illegal cryptomining, 2024 drainer attack statistics, U.S. bank regulator's crypto stance, Gemini's CFTC settlement, China's blockchain plans and Hong Kong's push for DLT in banks.

article thumbnail

The School Shootings Were Fake. The Terror Was Real

WIRED Threat Level

The inside story of the teenager whose swatting calls sent armed police racing into hundreds of schools nationwideand the private detective who tracked him down.

Security 116
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Zero-Day Patch Alert: Ivanti Connect Secure Under Attack

Data Breach Today

Suspected Chinese Attackers Again Tied to Active Exploitation of VPN Appliances VPN appliance maker Ivanti has begun releasing updates to patch a zero-day vulnerability being actively exploited by suspected nation-state attackers. Experts are warning users to immediately update their devices, after factory resetting them to flush any malware attackers may have installed.

Security 147
article thumbnail

I rescued my dying 2017 MacBook Pro with Ubuntu and it works like a charm (mostly)

Collaboration 2.0

If you have an older MacOS device lying around, why not install Linux to give it a new life?

IT 116
article thumbnail

European Court Fines European Commission for Privacy Breach

Data Breach Today

Transfer of German Man's IP Address Wins Him 400 Euros European privacy regulation - bane of American technology companies and a favorite cudgel of activists - came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.

Privacy 147
article thumbnail

The Linux Foundation launches an initiative to support open-source Chromium-based browsers

Collaboration 2.0

Google's Chromium source code will be used as the basis for new open-source web browsers.

111
111
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

WatchGuard Strengthens MDR Services With ActZero Acquisition

Data Breach Today

ActZero Purchase Adds Artificial Intelligence, Open Platform and Process Maturity With its acquisition of ActZero, WatchGuard gains advanced machine learning capabilities and expertise to improve its MDR service. ActZero's mature processes and open platform enable seamless integration of WatchGuard products as well as third-party tools like Microsoft Defender.

article thumbnail

The best robot vacuum of CES 2025 - and 4 others that impressed us

Collaboration 2.0

Robot vacuums are getting some outstanding upgrades this year, and ZDNET has picked the best ones of them all.

111
111
article thumbnail

Meta's Fact-Checking Pullback Could Help Scammers Thrive

Data Breach Today

Facebook Unveils Community Notes Program But Has Done Little to Curb Fraud Meta has decided to end its fact-checking program. Meta CEO Mark Zuckerberg announced significant changes to the company's moderation policies and practices on Tuesday, attributing the shift to a renewed commitment to free speech. Some fear the move will embolden financial scammers.

IT 130
article thumbnail

These headphones may look they play music but they actually clean your ears - and you can watch them do it

Collaboration 2.0

The Bebird EarSight Flow gently shoots water into your ears to clean them and has a special camera that allows you to watch the process in real time from the app.

IT 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

UN Cybercrime Treaty Faces Long Odds to US Passage

Data Breach Today

US Senate Unlikely to Ratify Contentious Cybercrime Treaty Amid Mounting Concerns Experts tell Information Security Media Group that a controversial United Nations cybercrime convention is unlikely to be ratified in the U.S. Senate due to mounting concerns from technology, human rights and privacy advocates over its potential impact on internet security and privacy protections.

Privacy 130
article thumbnail

How to encrypt any email - in Outlook, Gmail, and other popular services

Collaboration 2.0

If you ever send emails that contain sensitive or private information, consider email encryption. Getting started is a lot easier than you'd expect.

article thumbnail

Zero-Day Vulnerability in Ivanti VPN

Schneier on Security

It’s being actively exploited.

IT 93
article thumbnail

Finally! A robot vacuum that can climb stairs (well, kind of)

Collaboration 2.0

At CES 2025, Dreame introduced its premium X50 Ultra, which aspires to go where no robot vac has gone before.

IT 104
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

How the US TikTok Ban Would Actually Work

WIRED Threat Level

The fate of TikTok now rests in the hands of the US Supreme Court. If a law banning the social video app this month is upheld, it wont disappear from your phonebut it will get messy fast.

IT 91
article thumbnail

CES 2025: The 22 most impressive products you don't want to miss

Collaboration 2.0

We're at the final stretch of CES 2025, and we've seen major announcements from the likes of TCL, Roborock, Samsung, and more. Here's our roundup of the best stuff we've seen at the show.

102
102
article thumbnail

Phishing Campaign Abuses Legitimate Services to Send PayPal Requests

KnowBe4

A phishing campaign is abusing Microsoft 365 test domains to send legitimate payment requests from PayPal, according to Fortinets CISO Dr. Carl Windsor.

article thumbnail

Is prompt engineering a 'fad' hindering AI progress?

Collaboration 2.0

A principal scientist at Google DeepMind thinks prompting is the wrong user interface for generative AI, not to mention bad for AI researchers. Here's why.

99
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Malicious WordPress Plugin Assists in Phishing Attacks

KnowBe4

Researchers at SlashNext warn that cybercriminals are using a WordPress plugin called PhishWP to spoof payment pages and steal financial information.

article thumbnail

I saw the first smart lock with UWB at CES 2025 - and it feels like a keyfob for your front door

Collaboration 2.0

The Ultraloq Bolt Mission is a UWB and NFC-enabled smart lock that allows you to unlock it hands-free as you approach the door. And it's the official Best of CES winner in Privacy & Security.

IT 98
article thumbnail

Mac endpoint telemetry with Jamf

Jamf

Discover how Jamf Mac endpoint telemetry enables threat hunting, incident response & compliance analysis by collecting system-level events across your macOS fleet.