March, 2025

article thumbnail

Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies

Security Affairs

A data breach suffered by the Japanese telecom giant NTT exposed information of nearly 18,000 corporate customers. Japanese telecom giant NTT suffered a data breach that exposed information of nearly 18,000 corporate customers. On February 5th, the security team detected suspicious activity in its ‘Order Information Distribution System,’ and immediately restricted access to device A. “NTT Communications Corporation (NTT Com) discovered that its facilities had been illegally acc

article thumbnail

What Really Happened With the DDoS Attacks That Took Down X

WIRED Threat Level

Elon Musk said a massive cyberattack disrupted X on Monday and pointed to IP addresses originating in the Ukraine area as the source of the attack. Security experts say that's not how it works.

Security 363
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Worried about DeepSeek? Turns out, Gemini is the biggest data offender

Collaboration 2.0

It's an AI privacy showdown. How much data does your favorite chatbot collect?

Privacy 338
article thumbnail

Knockout of X Tied to Pro-Palestinian Hacktivists' Botnet

Data Breach Today

Experts Express Surprise Over Major Social Platform Falling Victim to DDoS Attacks One of the world's biggest social networks continued to face intermittent outages Tuesday, apparently due to unsophisticated, distributed denial-of-service attacks. Experts said the attacks were traced to malware-infected devices - many based in the U.S. - and pro-Palestinian hacktivists.

289
289
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

News alert: Aptori’s AI-driven platform reduces risk, ensures compliance — now on Google Marketplace

The Last Watchdog

San Jose, Calif., Mar. 12, 2025, CyberNewswire — Aptori , a leader in AI-driven application security, today announced the launch of its AI-driven AppSec Platform on Google Cloud Marketplace as part of graduating from Google Clouds ISV Startup Springboard program. This new agentic AI solution leverages semantic reasoning to analyze application code and logic in real time, delivering deterministic vulnerability detection, contextual risk prioritization, and automated remediation.

More Trending

article thumbnail

Hunters International gang claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies

Security Affairs

Ransomware group Hunters International claims to have hacked Tata Technologies, threatening to leak 1.4 TB of stolen data. The Hunters International ransomware group claimed to have breached the Indian multinational technology company Tata Technologies, a Tata Motors subsidiary. The group claims the theft of 1.4 terabytes of data and is threatening to leak it.

article thumbnail

The Violent Rise of ‘No Lives Matter’

WIRED Threat Level

No Lives Matter has emerged in recent months as a particularly violent splinter group within the extremist crime network known as Com and 764, and experts are at a loss for how to stop its spread.

IT 54
article thumbnail

The Firefox I loved is gone - how to protect your privacy on it now

Collaboration 2.0

With Mozilla's recent data and privacy waffling, Firefox users need to be cautious with their data.

Privacy 361
article thumbnail

US Eases Off Russia in Cyberspace

Data Breach Today

Reports: Cyber Command Ordered to Halt Offensive Operations Against Russia Russia won't have to United States to worry about in cyberspace in an apparent concession to Moscow meant to grease talks between the two capitals over the fate of Ukraine. Defense Secretary Pete Hegseth ordered U.S. Cyber Command to halt offensive cyber operations against Russia.

252
252
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

We're Backfilling and Cleaning Stealer Logs in Have I Been Pwned

Troy Hunt

I think I've finally caught my breath after dealing with those 23 billion rows of stealer logs last week. That was a bit intense, as is usually the way after any large incident goes into HIBP. But the confusing nature of stealer logs coupled with an overtly long blog post explaining them and the conflation of which services needed a subscription versus which were easily accessible by anyone made for a very intense last 6 days.

article thumbnail

Key Takeaways from the CSA Understanding Data Security Risk Survey

Thales Cloud Protection & Licensing

Key Takeaways from the CSA Understanding Data Security Risk Survey madhav Tue, 03/04/2025 - 04:32 As hybrid and multi-cloud environments become increasingly popular, identifying, prioritizing, and mitigating data security risks becomes increasingly complex. How can we tackle this complexity? By gaining insight into how organizations handle risk. Thats the goal of the latest Cloud Security Alliance (CSA) Understanding Data Security Risk survey , which Thales is a proud sponsor of.

Risk 71
article thumbnail

Polish Space Agency POLSA disconnected its network following a cyberattack

Security Affairs

The Polish space agency POLSA announced it has disconnected its network from the internet following a cyberattack. The Polish space agency POLSA was forced to disconnect its network from the internet in response to a cyberattack. The agency revealed that it has disconnected its infrastructure to contain the attack and secure data, a circumstance that suggests it was the victim of a ransomware attack. “A cybersecurity incident has occurred at POLSA.

IT 256
article thumbnail

1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers

WIRED Threat Level

New research shows at least a million inexpensive Android devicesfrom TV streaming boxes to car infotainment systemsare compromised to allow bad actors to commit ad fraud and other cybercrime.

Security 246
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Your Android phone just got a major audio upgrade for free - Google and Samsung models included

Collaboration 2.0

Ever been at a crowded restaurant or bar and wanted to hear that one muted TV? Now you can with Auracast.

331
331
article thumbnail

Reported US Cyber Pause on Russia Raises Questions, Concerns

Data Breach Today

Hiatus Could Embolden Moscow Reports suggesting the U.S. federal government is going soft on Russia in cyberspace sent shockwaves through the cybersecurity community. Resuming computer network attacks and other exploitation efforts after a pause isn't as simple as flipping a switch.

article thumbnail

Elastic patches critical Kibana flaw allowing code execution

Security Affairs

Elasticfixed a critical flaw inthe Kibanadata visualization dashboard software forElasticsearchthat could lead to arbitrary code execution. Elasticreleased security updates to address a critical vulnerability, tracked asCVE-2025-25012 (CVSS score of 9.9), impacting the Kibana data visualization dashboard software forElasticsearch. Kibana provides visualization capabilities on top of the content indexed on an Elasticsearch cluster.

Security 195
article thumbnail

GitLab addressed critical auth bypass flaws in CE and EE

Security Affairs

GitLab addressed two critical authentication bypass vulnerabilities in Community Edition (CE) and Enterprise Edition (EE). GitLab released security updates to address critical vulnerabilities in Community Edition (CE) and Enterprise Edition (EE). The company addressed nine vulnerabilities, including the two critical ruby-saml authentication bypass issues respectively tracked as CVE-2025-25291 and CVE-2025-25292.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

U.S. CISA adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds six Microsoft Windowsflaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2025-24983 Microsoft Windows Win32k Use-After-Free Vulnerability CVE-2025-24984 Microsoft Windows NTFS Information Disclosure Vulnerability CVE-2025-24985 Microsoft Windows Fast FAT File System Drive

IT 169
article thumbnail

New Eleven11bot botnet infected +86K IoT devices

Security Affairs

The Eleven11bot botnet has infected over 86,000 IoT devices, mainly security cameras and network video recorders (NVRs). Researchers from Nokia Deepfield Emergency Response Team (ERT) discovered a new botnet named Eleven11bot that has already infected over 86,000 IoT devices. Most infected devices are security cameras and network video recorders (NVRs), which are used to launch DDoS attacks. “On 26 Feb 2025, the Deepfield Emergency Response Team (ERT) identified a significant new Distribut

IoT 188
article thumbnail

China-linked APT Silk Typhoon targets IT Supply Chain

Security Affairs

Microsoft warns that China-backed APT Silk Typhoon linked to US Treasury hack, is now targeting global IT supply chains, using IT firms to spy and move laterally. Microsoft reported that China-linked APT group Silk Typhoon has shifted tactics to target IT solutions like remote management tools and cloud apps for initial access. Silk Typhoon is a China-linked cyber espionage group involved in the cyber attack against the US Treasury.

article thumbnail

Ubuntu vs. Debian: 7 key differences help determine which distro is right for you

Collaboration 2.0

Ubuntu is based on Debian, but they're not the same. To help you choose which to install, we compare support, pre-installed software, release cycle, user-friendliness, and more.

321
321
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The 5 best rolling release Linux distributions - and why you should be using one

Collaboration 2.0

If you're looking for a new Linux distribution, maybe it's time you tried a rolling release distribution. Here are my top five options.

IT 309
article thumbnail

Google Chrome is killing more extensions than you think - is your old favorite on the list?

Collaboration 2.0

Google's Manifest V3 platform is clobbering many popular extensions. Here's why and what you can do about it.

IT 318
article thumbnail

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Collaboration 2.0

AI-powered cyber threats are reshaping security landscapes. Businesses that don't evolve will be vulnerable to increasingly sophisticated attacks - here's how to stay ahead.

Security 307
article thumbnail

Employers want workers with AI skills, but what exactly does that mean?

Collaboration 2.0

Almost one in four tech jobs in the US need people with AI skills, according to recent job data.

312
312
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Goodbye Skype, hello Teams: How Microsoft is making the switch easy

Collaboration 2.0

Microsoft confirms it's shutting down Skype, but it has a plan to ease your transition to Teams.

IT 322
article thumbnail

What is vishing? Voice phishing is surging - expert tips on how to spot it and stop it

Collaboration 2.0

Phishing isn't limited to your inbox anymore.

Phishing 321
article thumbnail

I replaced my Windows PC with a Mac Studio - here are my takeaways after 24 hours

Collaboration 2.0

The M4 Max Mac Studio is a compact powerhouse that seamlessly fits on my desk - and outperforms my PC tower in several ways.

304
304