Sat.Jan 04, 2025 - Fri.Jan 10, 2025

article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications to their users, including emails, automated phone calls and system-level messages sent to all signed-in devices.

Phishing 334
article thumbnail

Breach Roundup: Finland Detains Tanker Tied to Cable Sabotage

Data Breach Today

Also, Alleged Gravy Analytics Breach Exposes Location Data This week, a Russian tanker linked to cable sabotage detained in Finland, a claimed Gravy Analytics breach exposed location data, a Mirai-based botnet exploited zero-day flaws, Dell updated framework flaws and a court sentenced a Florida woman for laundering millions in romance scams.

Analytics 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The one feature Bluesky really needs

Collaboration 2.0

You just followed a fascinating new account on Bluesky. But does that account really belong to who you think it does?

IT 143
article thumbnail

Movie From 1983 Had AI and InfoGov Right

Weissman's World

Who here has seen the 1983 movie WarGames? In it, a high school teenager seeking the newest, hottest prerelease videogame hacks into a NORAD computer by mistake, and the simulation he triggers nearly causes WWIII because the soldierly decision-making was intentionally left to the machine, not the military. Watching with the family the other day,… Read More » Movie From 1983 Had AI and InfoGov Right The post Movie From 1983 Had AI and InfoGov Right appeared first on Holly Group.

Military 282
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

The Evolution from Physical to Digital Records Management: A Central Bank Perspective

AIIM

The Digital Transformation Challenge As Chief Information Assets Officer at the Central Bank of the Bahamas, I've witnessed firsthand the complex transition from physical to digital records. The shift isn't as simple as scanning documents - it requires a complete transformation in how we think about and manage information.

More Trending

article thumbnail

10 Linux apps I always install first - and you should too

Collaboration 2.0

If you're just now jumping onto the Linux train, you might be wondering what apps to install first. Here are the first 10 I find should be installed by all.

145
145
article thumbnail

Banshee macOS stealer supports new evasion mechanisms

Security Affairs

Experts found a new version of the Banshee macOS information stealer which was enhanced with new evasion mechanisms. Check Point researchers discovered a new version of the Banshee macOS infostealer which is distributed through phishing websites and fake GitHub repositories, often masqueraded as popular software. In August 2024, Russian crooks advertised a macOS malware called BANSHEE Stealer that can target both x86_64 and ARM64 architectures.

Archiving 117
article thumbnail

News alert: CyTwist launches threat detection engine tuned to identify AI-driven malware in minutes

The Last Watchdog

Ramat Gan, Israel, January 7th, 2025, CyberNewswire — CyTwist , a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to develop advanced and evasive threats.

article thumbnail

ISMG Editors: The Coming Battle Over Chinese Cyberthreats

Data Breach Today

Also: Cybersecurity Tech Leader Amit Yorans Life, Leadership and Legacy In this week's update, ISMG editors discussed the escalating geopolitical cyberthreats expected in 2025, including advanced and persistent campaigns linked to Chinese actors. Panelists also paid tribute to Amit Yoran, one of the cybersecurity industry's most influential leaders.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Autonomous businesses will be powered by AI agents

Collaboration 2.0

The Accenture Technology Vision 2025 report explores how AI-powered autonomy is shaping technology development, customer experience, the physical world, and the future workforce, where people and AI agents work together to drive customer success.

article thumbnail

PLAYFULGHOST backdoor supports multiple information stealing features

Security Affairs

PLAYFULGHOST is a new malware family with capabilities including keylogging, screen and audio capture, remote shell access, and file transfer/execution. Google researchers analyzed a new malware family called PLAYFULGHOST that supports multiple features, including keylogging, screen and audio capture, remote shell, and file transfer/execution. The PLAYFULGHOST backdoor shares functionality with Gh0stRAT whose source code was publicly released in 2008.

article thumbnail

Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location

WIRED Threat Level

A hack of location data company Gravy Analytics has revealed which apps areknowingly or notbeing used to collect your information behind the scenes.

Analytics 126
article thumbnail

Meta's Fact-Checking Pull Back Could Help Scammers Thrive

Data Breach Today

Facebook Unveils Community Notes Program But Has Done Little to Curb Fraud Meta has decided to end its fact-checking program. Meta CEO Mark Zuckerberg announced significant changes to the company's moderation policies and practices on Tuesday, attributing the shift to a renewed commitment to free speech. Some fear the move will embolden financial scammers.

IT 162
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CES 2025: The 10 most impressive products so far

Collaboration 2.0

CES is in full swing, and we've seen major announcements from the likes of Samsung, Roborock, MSI, and more. Here's our roundup of the new tech you don't want to miss.

138
138
article thumbnail

US Treasury Department sanctioned Chinese cybersecurity firm linked to Flax Typhoon APT

Security Affairs

The U.S. Treasury Department sanctioned Chinese cybersecurity firm Integrity Tech for its involvement in attacks attributed to the Flax Typhoon group. The U.S. Treasury sanctioned a Chinese cybersecurity firm, Integrity Tech, for links to cyberattacks by Chinas state-backed Flax Typhoon APT group (also called Ethereal Panda or RedJuliett). The China-linked APT group used Integrity Tech’s infrastructure to launch cyberattacks on European and U.S. networks since the summer of 2022. “To

article thumbnail

License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data

WIRED Threat Level

Misconfigured license-plate-recognition systems reveal the livestreams of individual cameras and the wealth of data they collect about every vehicle that passes by them.

Privacy 122
article thumbnail

FDA Warns of Cyber Risks in Guidance for AI-Enabled Devices

Data Breach Today

New Non-Binding Recommendations Target Medical Device Makers, Software Developers Manufacturers are eager to incorporate AI into a wide range of medical devices, from cardiac monitors that can spot developing heart problems to medical imaging systems that can find malignancies a radiologist might miss. The FDA released new guidance this week on how to secure these devices.

Risk 162
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Update Chrome and Firefox now to patch these critical security flaws

Collaboration 2.0

The latest updates for both browsers squash several high-severity security bugs. Here's how to grab them.

Security 134
article thumbnail

Credential Phishing Increased by 703% in H2 2024

KnowBe4

Credential phishing attacks surged by 703% in the second half of 2024, according to a report by SlashNext. Phishing attacks overall saw a 202% increase during the same period.

Phishing 113
article thumbnail

News Alert: Security Risk Advisors joins Microsoft Intelligent Security Association (MISA)

The Last Watchdog

Philadelphia, Pa., Jan. 7, 2025, CyberNewswire — Security Risk Advisors today announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their solutions with Microsoft Security technology to better defend mutual customers against a world of increasing cyber threats.

Risk 130
article thumbnail

T-Mobile Sued by Washington State Over 2021 Data Breach

Data Breach Today

Attorney General Accuses Telecom of Failing to Correctly Notify Millions of Victims Washington state's attorney general filed a consumer protection lawsuit against T-Mobile over a massive 2021 data breach that exposed personally identifiable information for more than 79 million consumers, alleging in part the telecom failed to correctly notify victims.

article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

How to install an LLM on MacOS (and why you should)

Collaboration 2.0

If you like the idea of AI but don't want to share your content or information with a third party, you can always install an LLM on your Apple desktop or laptop. You'll be surprised at how easy it is.

IT 134
article thumbnail

The School Shootings Were Fake. The Terror Was Real

WIRED Threat Level

The inside story of the teenager whose swatting calls sent armed police racing into hundreds of schools nationwideand the private detective who tracked him down.

Security 110
article thumbnail

Malicious WordPress Plugin Assists in Phishing Attacks

KnowBe4

Researchers at SlashNext warn that cybercriminals are using a WordPress plugin called PhishWP to spoof payment pages and steal financial information.

Phishing 109
article thumbnail

Staten Island Hospital Notifying 674,000 of May 2023 Hack

Data Breach Today

Data Theft Incident Also Disrupted IT Systems for Nearly a Month Richmond University Medical Center, a 440-bed teaching hospital on Staten Island, N.Y, is notifying 674,000 people of a data theft that happened 18 months ago. The breach was part of a ransomware attack that disrupted the organization's IT systems for several weeks in spring 2023.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Two OTC continuous glucose monitors won awards at CES - and you can try them now

Collaboration 2.0

These over-the-counter CGMs from health brands Dexcom and Abbott make glucose monitoring affordable and accessible. Here's how they can help you - no prescription necessary.

Access 133
article thumbnail

Gayfemboy Botnet targets Four-Faith router vulnerability

Security Affairs

Gayfemboy, a Mirai botnet variant, has been exploiting a flaw in Four-Faith industrial routers to launch DDoS attacks since November 2024. The Gayfemboy botnet was first identified in February 2024, it borrows the code from the basic Mirai variant and now integrates N-day and 0-day exploits. By November 2024, Gayfemboy exploited 0-day vulnerabilities in Four-Faith industrial routers and Neterbit routers and Vimar smart home devices, with over 15,000 daily active nodes.

Cloud 115
article thumbnail

Zero-Day Vulnerability in Ivanti VPN

Schneier on Security

It’s being actively exploited.

IT 105