Fri.Jan 10, 2025

article thumbnail

ISMG Editors: The Coming Battle Over Chinese Cyberthreats

Data Breach Today

Also: Cybersecurity Tech Leader Amit Yorans Life, Leadership and Legacy In this week's update, ISMG editors discussed the escalating geopolitical cyberthreats expected in 2025, including advanced and persistent campaigns linked to Chinese actors. Panelists also paid tribute to Amit Yoran, one of the cybersecurity industry's most influential leaders.

article thumbnail

Banshee macOS stealer supports new evasion mechanisms

Security Affairs

Experts found a new version of the Banshee macOS information stealer which was enhanced with new evasion mechanisms. Check Point researchers discovered a new version of the Banshee macOS infostealer which is distributed through phishing websites and fake GitHub repositories, often masqueraded as popular software. In August 2024, Russian crooks advertised a macOS malware called BANSHEE Stealer that can target both x86_64 and ARM64 architectures.

Archiving 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Biden Administration Releases 'AI Strategic Plan' for HHS

Data Breach Today

Days Are Dwindling, But Biden White House Unveils New AI Roadmap for HHS With 10 days left in office, the Biden administration released an artificial intelligence strategic plan for the U.S. Department of Health and Human Service. HHS called the plan a "comprehensive roadmap" outlining the departments "commitment to trustworthy, ethical and equitable AI use.

article thumbnail

My favorite TV at CES 2025 is this battery-powered display that you can lug around

Collaboration 2.0

It's no G5 OLED, but the LG StanbyMe 2 strikes the right balance of quirkiness, innovation, and performance -- making it my CES standout.

IT 111
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Report: Chinese Hackers Breached CFIUS

Data Breach Today

Cyberespionage Campaign Reached Treasury Office that Reviews Foreign Investment Chinese hackers reportedly breached a U.S. government office responsible for reviewing foreign investments for national security threats as part of a cyberespionage campaign targeting the Department of Treasury. Hackers gained access to the Committee on Foreign Investment in the U.S.

More Trending

article thumbnail

Cloud Security, APT Threats, AI Risks Loom Large in 2025

Data Breach Today

Google Mandiant's Jamie Collier on the Biggest Cloud Security Challenges To combat AI threats in 2025, security teams are set to enter the second phase of AI innovation in security by deploying semi-autonomous operations such as alert parsing, creation of high-priority item lists and risk remediation, said Jamie Collier, senior threat intelligence advisor at Mandiant.

Cloud 147
article thumbnail

5 Google Lens tricks to level up your image search

Collaboration 2.0

From shopping and taking notes to verifying images or simply satisfying your curiosity, Google Lens has some cool tricks you'll want to try.

111
111
article thumbnail

Three Russian Cryptomixer Masterminds Indicted in US

Data Breach Today

Blender and Sinbad Were Favorites of Ransomware and North Korean Hackers Three Russian nationals behind cryptocurrency mixers favored by ransomware hackers and North Korean crypto thieves face criminal charges in U.S. federal court: Roman Vitalyevich Ostapenko, 55, Alexander Evgenievich Oleynik, 44, and Anton Vyachlavovich Tarasov, 32.

article thumbnail

AI agents may soon surpass people as primary application users

Collaboration 2.0

A 'binary big bang' occurred when AI foundation models cracked the natural language barrier, kickstarting a shift in our technology systems: how we design them, use them, and how they operate.

110
110
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

PowerSchool's Breach Fallacy: Paying Criminals for Promises

Data Breach Today

Cybercrime History Teaches That Paying a Ransom for Data Deletion Is Foolish Data breach victim PowerSchool, maker of a widely used K-12 student information system platform, has been attempting to assure schools, and parents and guardians, by saying its attacker has promised to delete the stolen data. What's the old saying about those who fail to learn from history?

article thumbnail

How AI will transform cybersecurity in 2025 - and supercharge cybercrime

Collaboration 2.0

From AI-driven defense to evolving ransomware tactics, here's what cybersecurity industry leaders and experts are preparing for this year.

article thumbnail

Google DeepMind's Consolidation, World Modelling Initiatives

Data Breach Today

Firm Folds AI Studio, Gemini API Into DeepMind; Sets up World Model Team Google is restructuring its artificial intelligence teams and forming a new division under its DeepMind unit. Both the AI Studio team and the Gemini API team will now be run under DeepMind, a shift Google says will make DeepMind's work more accessible to the public.

article thumbnail

The fastest growing jobs in the AI-powered economy

Collaboration 2.0

This report says about 170 million new jobs will be created by 2030 and AI will play a key role.

107
107
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Phishers abuse CrowdStrike brand targeting job seekers with cryptominer

Security Affairs

CrowdStrike warns of a phishing campaign that uses its recruitment branding to trick recipients into downloading a fake application, which finally installs the XMRig cryptominer. CrowdStrike discovered a phishing campaign using its recruitment branding to trick recipients into downloading a fake application, which acts as a downloader for the XMRig cryptominer.

Phishing 110
article thumbnail

I tested an ink pen that records your handwriting and makes a digital copy. Spoiler: It works

Collaboration 2.0

The Nuwa Pen utilizes three tiny cameras to capture what you write - on paper! - and save your notes in an accompanying app. I demoed the game-changing device at CES 2025.

Paper 105
article thumbnail

Navy Warship USS Manchester Installed Starlink for Illegal Wi-Fi Connection

eSecurity Planet

Military officials installed Starlink on a Navy warship, not for operations but to provide high-speed internet for sports and Netflix. Watch to learn more. The post Navy Warship USS Manchester Installed Starlink for Illegal Wi-Fi Connection appeared first on eSecurity Planet.

article thumbnail

Finally, I found a robot vacuum at CES 2025 that can climb stairs - sort of

Collaboration 2.0

At the Las Vegas trade show, Dreame introduced its premium X50 Ultra, which aspires to go where no robot vac has gone before.

IT 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

China-linked APT group MirrorFace targets Japan

Security Affairs

Japanese authorities attributed a cyber-espionage campaign targeting the country to the China-linked APT group MirrorFace. The National Police Agency (NPA) and the Cabinet Cyber Security Center in Japan have linked a long-running cyber-espionage campaign targeting local entities to the China-linked group MirrorFace (aka Earth Kasha). The campaign has been active since at least 2019, it targets Japanese technology and national security, evolving methods to steal advanced tech and intelligence.

article thumbnail

Using a VPN is no longer enough. Protect your entire network with WireGuard - here's how

Collaboration 2.0

Want to bypass geo-restrictions and secure your entire network? Pair the WireGuard protocol with your favorite VPN. I use privacy-oriented Proton to show you how.

Privacy 105
article thumbnail

Apps That Are Spying on Your Location

Schneier on Security

404 Media is reporting on all the apps that are spying on your location, based on a hack of the location data company Gravy Analytics: The thousands of apps, included in hacked files from location data company Gravy Analytics, include everything from games like Candy Crush to dating apps like Tinder, to pregnancy tracking and religious prayer apps across both Android and iOS.

article thumbnail

These ear-cleaning headphones I saw at CES 2025 sound weird - but make so much sense

Collaboration 2.0

The Bebird EarSight Flow streams water into your ears to wash them, with a special camera that allows you to watch the cleaning process in real time.

105
105
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Researchers disclosed details of a now-patched Samsung zero-click flaw

Security Affairs

Researchers at Google Project Zero disclosed a now-patched zero-click vulnerability that affects Samsung devices. Google Project Zero researchers disclosed details about a now-patched zero-click vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), in Samsung devices. The flaw is an out-of-bound write issue in libsaped.so prior to SMR Dec-2024 Release 1, it allows remote attackers to execute arbitrary code.

article thumbnail

I tried Hypershell's X-series exoskeleton at CES, and it was a fascinating experience

Collaboration 2.0

The exoskeleton is designed with weekend warrior athletes in mind. It's built to offer assistance in physical activities such as hiking or biking. Here's what it's like to wear.

IT 104
article thumbnail

Why supply chains require an ecosystem mindset

CGI

Behind every item lies a complex, interconnected global supply chain ecosystem that must work in perfect harmony to ensure that the products and services we rely on are always within reach.

52
article thumbnail

How to clear your Android phone's cache and make it feel like new for 2025

Collaboration 2.0

Start the new year by adding this simple process to your Android maintenance routine. You'll be glad you did.

IT 102
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

AI Startup Secures £1 Million to Enhance UK Port Safety Through Smart Surveillance

Information Matters

A Cambridge artificial-intelligence startup has secured 1.1 million in government funding to develop technology that aims to prevent accidents and improve efficiency at British ports and warehouses by. The post AI Startup Secures 1 Million to Enhance UK Port Safety Through Smart Surveillance appeared first on Information Matters - AI-Driven Business Transformation.

article thumbnail

Thanks to Nvidia, there's a new generation of PCs coming, and they'll be running Linux

Collaboration 2.0

OK, maybe you wouldn't pay three grand for a Project DIGITS PC. But what about a $1,000 Blackwell PC from Acer, Asus, or Lenovo?

102
102
article thumbnail

AI Startup Raises £1.5 Million to Modernize Hospital Operating Rooms

Information Matters

VitVio, a London-based artificial intelligence startup, has secured 1.5 million in pre-seed funding to deploy AI-powered monitoring systems in hospital operating rooms, as healthcare facilities seek. The post AI Startup Raises 1.5 Million to Modernize Hospital Operating Rooms appeared first on Information Matters - AI-Driven Business Transformation.