Thu.Jan 30, 2025

article thumbnail

Breach Roundup: DeepSeek Leaked Sensitive Data

Data Breach Today

Also: Infostealer Malware Compromises Mexican Government Computers This week, DeepSeek exposed sensitive data, hackers exploited unpatched Zyxel flaws, infostealer malware on Mexican government computers, Smiths Group incident, PowerSchool breach notifications, an Apple zero-day, XWorm RAT backdoor, and Credit Control Corporation settled a lawsuit.

article thumbnail

Good Governance is About the “Why”

Weissman's World

I get inquiries all the time from people seeking support as they ready to tackle what sound like fairly specific records and information governance issues. Lately, these types of inquiries have fallen into these three general areas: Getting rid of paper Moving to the cloud Preparing for AI These descriptors which well use throughout… Read More » Good Governance is About the Why The post Good Governance is About the Why appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nation State Groups Exploit Gemini AI App

Data Breach Today

Google Says Iranian and Chinese Threat Group the Most Active Iranian and Chinese threat actors are using Google's artificial intelligence application Gemini for vulnerability scanning and reconnaissance activities, with some attempting to bypass security guardrails of the application, the computing giant disclosed.

article thumbnail

This $300 Samsung phone looks as good as the Galaxy S25 - at a fraction of the price

Collaboration 2.0

For a limited time, the Samsung Galaxy A35 is available for a fraction of the cost of the S25 series. It's also discounted when you bundle a pair of Buds FE.

IT 122
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Federal Cybersecurity Contractors Whiplashed By Uncertainty

Data Breach Today

'There's A Lot of Confusion Going On' A halt on new contract awards by the federal governments top procurement agency has thrown vendors into confusion, raising concerns about its ripple effects. White House announcements are "definitely causing confusion" among cybersecurity contractors and officials, an industry analyst said.

More Trending

article thumbnail

NY Blood Center Attack Disrupts Suppliers in Several States

Data Breach Today

Ransomware Attack on Center Is Latest Assault on Blood Supply Chain A New York blood center and its divisions that serves hospitals in several states are dealing with ransomware attack disrupting donations and other activities. The attack - the latest assault on a blood supplier - comes just days after the center declared a blood shortage emergency.

article thumbnail

The Convergence of AI, Data Privacy, and Information Governance

AIIM

Looking ahead at information management trends, I see three key areas converging: AI governance, data governance, and information governance. This convergence isn't just theoretical - it's reshaping how we handle information at the Central Bank of the Bahamas.

article thumbnail

Attackers Could Gain Control of 2 Flawed Patient Monitors

Data Breach Today

Feds Warn Flaws Could Lead to 'Simultaneous Exploitation' of All Devices U.S. federal authorities are warning that cybersecurity vulnerabilities in two brands of patient monitors used in healthcare settings and in patients' homes can allow remote attackers to take over control the devices when connected to the internet, posing safety and data privacy concerns.

article thumbnail

Beware: Mobile Phishing Mimicking the USPS Is On the Rise

KnowBe4

Researchers at Zimperium warn that a large phishing campaign is impersonating the US Postal Service (USPS) to target mobile devices with malicious PDF files.

Phishing 116
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Got EI? Emotional Intelligence Makes Cyber Leaders Stronger

Data Breach Today

Tips on Relationships and Empathy That CISOs Should Know Before the Next Crisis Emotional Intelligence is the ability to recognize, understand, manage and influence both your own emotions and those of others. It encompasses five key areas: self-awareness, self-regulation, motivation, empathy and social skills that enable leaders to build trust and manage teams effectively.

IT 130
article thumbnail

DeepSeek database exposed highly sensitive information

Security Affairs

Chinese AI platform DeepSeek has publicly exposed two databases containing highly sensitive user and backend details. Wiz Research discovered a publicly accessible ClickHouse database belonging to DeepSeek, exposing chat history, secret keys, and backend details. After responsible disclosure, DeepSeek promptly secured the issue. “Within minutes, we found a publicly accessible ClickHouse database linked to DeepSeek, completely open and unauthenticated, exposing sensitive data.

Metadata 117
article thumbnail

These low-latency earbuds seamlessly switched between my devices (and they sound great)

Collaboration 2.0

Steelseries' Arctis Gamebuds have tons of game-specific presets to bring your titles to life, then let you swap back to your phone with a tap.

111
111
article thumbnail

TeamViewer fixed a vulnerability in Windows client and host applications

Security Affairs

TeamViewer has patched a high-severity privilege escalation vulnerability affecting its Windows client and host applications. TeamViewer released security patches for a high-severity elevation of privilege vulnerability, tracked as CVE-2025-0065 (CVSS score of 7.8), in its remote access solutions for Windows. The vulnerability is an improper neutralization of argument delimiters in the TeamViewer_service.exe component of TeamViewer Full Client & Host prior to version 15.62 for Windows.

Access 109
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

AI agents will match 'good mid-level' engineers this year, says Mark Zuckerberg

Collaboration 2.0

Autonomous software engineering agents will take over significant programming tasks, predicts Meta's CEO. And he's counting on Llama to achieve that goal.

105
105
article thumbnail

Fake Reddit and WeTransfer Sites are Pushing Malware

Schneier on Security

There are thousands of fake Reddit and WeTransfer webpages that are pushing malware. They exploit people who are using search engines to search sites like Reddit. Unsuspecting victims clicking on the link are taken to a fake WeTransfer site that mimicks the interface of the popular file-sharing service. The ‘Download’ button leads to the Lumma Stealer payload hosted on “weighcobbweo[.]top.” Boingboing post.

92
article thumbnail

Microsoft's latest optional patch is a bug-fix bonanza for Windows 11 24H2

Collaboration 2.0

The new preview update resolves some persistent and annoying problems with Windows 24H2, but you may need to download and install it manually.

IT 104
article thumbnail

Italy’s Data Protection Authority Garante requested information from Deepseek

Security Affairs

Italys data privacy regulator Garante has requested information from Chinese AI company DeepSeek regarding its data practices. Italys Data Protection Authority Garante has asked the AI firm DeepSeek to clarify its data collection, sources, purposes, legal basis, and storage, citing potential risks to user data. “The Italian Data Protection Authority has sent a request for information to Hangzhou DeepSeek Artificial Intelligence and Beijing DeepSeek Artificial Intelligence, the companies th

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

I found the most complete wireless charging accessory yet - and it has a useful cooling system

Collaboration 2.0

If you're not a fan of wireless chargers that overheat and reach less-than-optimal speeds, the Torras PolarCircle I tested has your name on it.

IT 104
article thumbnail

PHP package Voyager flaws expose to one-click RCE exploits

Security Affairs

The open-source PHP packageVoyageris affected by three vulnerabilities that could be exploited to achieve one-click remote code execution on affected instances. Voyager is a popular open-source PHP package for managing Laravel applications, offering an admin interface, BREAD operations, media, and user management. During an ordinary scan activity, SonarSource researchers reported an arbitrary file write vulnerability in Voyager.

article thumbnail

My favorite ultraportable laptop makes the ThinkPad and MacBook Air feel underwhelming

Collaboration 2.0

The Asus Vivobook S 15 is a fantastic ultraportable laptop with fast performance and a brilliant OLED screen. It's on sale for a limited time.

Sales 102
article thumbnail

Operation Talent: An international law enforcement operation seized Cracked, Nulled and other cybercrime websites

Security Affairs

An international law enforcement operation targeted several major cybercrime websites, including Cracked, Nulled, Sellix, and StarkRDP. An international law enforcement operation led by Europol, code-named Operation Talent, dismantled several major cybercrime sites, including Cracked, Nulled, Sellix, and StarkRDP. The message displayed on the targeted cybercrime websites states that authorities have seized the platforms, along with information about their customers and victims.

article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Microsoft's new Copilot+ Surface devices are built for business with Intel inside

Collaboration 2.0

For business buyers, last year's opening salvo of AI-ready PCs was a nonstarter due to compatibility issues with Qualcomm's processors. Those Surface Pro and Surface Laptop devices will soon be available with Intel's Lunar Lake processors. You can preorder now.

100
100
article thumbnail

The Rising Tide of Cybercrime Concerns in Africa

KnowBe4

Our recent Africa Cybersecurity Awareness survey has revealed a startling surge in cybersecurity concerns among African users, with 58% of respondents expressing high levels of worry about cybercrime - a figure that has nearly doubled from 29% in 2023.

article thumbnail

OpenAI's Sora generates 600 videos a minute worldwide: Top 5 cities may surprise you

Collaboration 2.0

Just over a month since its launch, Sora is booming.

IT 98
article thumbnail

Hoarding, Debt and Threat Modeling

Adam Shostack

The psychology of getting started threat modeling During a recent threat modeling course, one of our students, Aleksei*, made a striking comparison that resonated with a lot of us: starting security analysis is like tackling a hoarders house. That visceral image of looking at mountains of accumulated issues, feeling overwhelmed by where to begin, captures a challenge many engineering leaders face when they first attempt to systematically assess their systems security.

Paper 59
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

App fatigue is real: Users are downloading fewer apps than ever

Collaboration 2.0

The competition for mobile screen space is intense. Here are ways to gain more retention for mobile apps.

97
article thumbnail

White Paper: The Benefits of Adding JPEG-XL to the ISO PDF

Info Source

Introduction As digital document workflows evolve, there is a growing need for more efficient and higher quality image compression methods. The PDF format, while established as the standard for document exchange, has historically been limited by its reliance on older image formats like JPEG, PNG, and JPEG 2000. Despite advancements in imaging technology, the PDF standard has not incorporated new image codecs for over 20 years, resulting in inefficiencies in both file size and image quality.

Paper 52
article thumbnail

The best AI for coding in 2025 (and what not to use - including DeepSeek R1)

Collaboration 2.0

I've been subjecting chatbots to a set of real-world programming tests for two years now. There are two I recommend if you're looking for AI coding help - and several to avoid.

96