2025

article thumbnail

Turning Information Into Outcomes: What Governance Really is About

Weissman's World

For years, youve heard me exhort you to implement information governance because you collected all that information for a reason, right? and infogov is how you get value from it. And while thats true, Im not sure I ever completely brought that sentiment to ground. So let me now close that gap. Over the next… Read More » Turning Information Into Outcomes: What Governance Really is About The post Turning Information Into Outcomes: What Governance Really is About appeared first on Holly

article thumbnail

Apple's AI Photo Analyzer Faces Privacy Backlash

Data Breach Today

iPhone Maker Introduced Feature Without Explicit Consent Apple's artificial intelligence-led photo analyzer is raising privacy concerns months after the company appears to have enabled the feature by default. It uses a combination of on-device machine learning and encrypted cloud-based processing.

Privacy 281
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang

Krebs on Security

The FBI and authorities in The Netherlands this week seized dozens of servers and domains for a hugely popular spam and malware dissemination service operating out of Pakistan. The proprietors of the service, who use the collective nickname “ The Manipulaters ,” have been the subject of three stories published here since 2015. The FBI said the main clientele are organized crime groups that try to trick victim companies into making payments to a third party.

Phishing 226
article thumbnail

Why rebooting your phone daily is your best defense against zero-click hackers

Collaboration 2.0

Mobile spyware attacks are on the rise globally. That's why you should treat your phone like a computer, according to this cybersecurity expert.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

DOGE Teen Owns ‘Tesla.Sexy LLC’ and Worked at Startup That Has Hired Convicted Hackers

WIRED Threat Level

Experts question whether Edward Coristine, a DOGE staffer who has gone by Big Balls online, would pass the background check typically required for access to sensitive US government systems.

More Trending

article thumbnail

My Take: Will decentralizing connected systems redistribute wealth or reinforce Big Tech’s grip?

The Last Watchdog

For the past 25 years, Ive watched the digital world evolve from the early days of the Internet to the behemoth it is today. Related: Self-healing devices on the horizon What started as a decentralized, open platform for innovation has slowly but surely been carved up, controlled, and monetized by a handful of tech giants. Now, a new wave of technological developmentedge computing, decentralized identity, and privacy-first networkingis promising to reverse that trend.

130
130
article thumbnail

The Evolution from Physical to Digital Records Management: A Central Bank Perspective

AIIM

The Digital Transformation Challenge As Chief Information Assets Officer at the Central Bank of the Bahamas, I've witnessed firsthand the complex transition from physical to digital records. The shift isn't as simple as scanning documents - it requires a complete transformation in how we think about and manage information.

article thumbnail

Breach Roundup: DeepSeek Leaked Sensitive Data

Data Breach Today

Also: Infostealer Malware Compromises Mexican Government Computers This week, DeepSeek exposed sensitive data, hackers exploited unpatched Zyxel flaws, infostealer malware on Mexican government computers, Smiths Group incident, PowerSchool breach notifications, an Apple zero-day, XWorm RAT backdoor, and Credit Control Corporation settled a lawsuit.

article thumbnail

Movie From 1983 Had AI and InfoGov Right

Weissman's World

Who here has seen the 1983 movie WarGames? In it, a high school teenager seeking the newest, hottest prerelease videogame hacks into a NORAD computer by mistake, and the simulation he triggers nearly causes WWIII because the soldierly decision-making was intentionally left to the machine, not the military. Watching with the family the other day,… Read More » Movie From 1983 Had AI and InfoGov Right The post Movie From 1983 Had AI and InfoGov Right appeared first on Holly Group.

Military 282
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft Sues Harmful Fake AI Image Crime Ring

Data Breach Today

Guardrails Bypassed on Azure OpenAI to Generate 'Thousands of Harmful Images' Microsoft filed a lawsuit targeting a cybercrime service used to generate "thousands of harmful images" by subverting the guardrails built into its Azure generative artificial intelligence tools. The company said attackers built a tool that reverse-engineered the guardrails in its AI platform.

article thumbnail

Japanese Businesses Hit By a Surge In DDoS Attacks

Data Breach Today

DDoS Attacks Primarily Target Logistics, Government and Financial Entities A spate of distributed denial-of-service attacks during the end-of-year holiday season disrupted operations at multiple Japanese organizations, including the country's largest airline, wireless carrier and prominent banks. The effect of the attacks has been temporary.

article thumbnail

DeepSeek AI Models Vulnerable to JailBreaking

Data Breach Today

Researchers uncovered flaws in large language models developed by Chinese artificial intelligence company DeepSeek, including in its flagship R1 reasoning application. The security concerns come as Microsoft and OpenAI investigate whether DeepSeek developed used data scraped from an OpenAI API.

article thumbnail

Moss on AI Disruption: 'Everything, Everywhere, All at Once'

Data Breach Today

The pace of change including the rise of artificial intelligence and a sense of accelerating chaos can make cybersecurity professionals feel like "things are kind of everything, everywhere, all at once," said Black Hat conference founder Jeff Moss. How should they respond?

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Good Governance is About the “Why”

Weissman's World

I get inquiries all the time from people seeking support as they ready to tackle what sound like fairly specific records and information governance issues. Lately, these types of inquiries have fallen into these three general areas: Getting rid of paper Moving to the cloud Preparing for AI These descriptors which well use throughout… Read More » Good Governance is About the Why The post Good Governance is About the Why appeared first on Holly Group.

article thumbnail

DeepSeek Blocked In US Federal Agencies

Data Breach Today

Security Concerns, Chinese Ownership Drive Concerns U.S. federal agencies and corporations with ties to the government are blocking employees from using Chinese chatbot DeepSeek over security and privacy concerns. China could potentially use DeepSeek AI models to spy on American citizens, acquire proprietary secrets and conduct influence campaigns.

Privacy 233
article thumbnail

What Enterprises Need to Know About Agentic AI Risks

Data Breach Today

Mitigating Cybersecurity, Privacy Risks for New Class of Autonomous Agents Many organizations are looking to artificial intelligence agents to autonomously perform tasks that surpass traditional automation. Tech firms are rolling out agentic AI tools that can handle customer-facing interactions, IT operations and a variety of other processes without human intervention, but experts are cautioning security teams to watch for cyber and privacy risks.

Risk 230
article thumbnail

Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’?

Krebs on Security

The FBI joined authorities across Europe last week in seizing domain names for Cracked and Nulled , English-language cybercrime forums with millions of users that trafficked in stolen data, hacking tools and malware. An investigation into the history of these communities shows their apparent co-founders quite openly operate an Internet service provider and a pair of e-commerce platforms catering to buyers and sellers on both forums.

Archiving 184
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Announcing My Spring 2025 ARMA National Tour!

Weissman's World

Im very happy to invite you to my Spring 2025 ARMA National Tour! So far, it includes these dates and cities*: Mar 5-7 ARMA Southeast Sunshine Conference Kissimmee, FLThe Perils and Pitfalls of Public AI (Or, Keep Your Data to Yourself) Mar 12 Greater Kansas City ARMA chapter virtualAI… Read More » Announcing My Spring 2025 ARMA National Tour!

IT 240
article thumbnail

US Identifies Hacking Firm Behind Salt Typhoon Telecom Hacks

Data Breach Today

Department of Treasury Imposes Sanctions The U.S. federal government said Friday it's traced the source of Chinese hacker intrusions into telecom networks to a government contractor located in hacking hotbed Sichuan. The Department of Treasury imposed sanctions on the firm, Sichuan Juxinhe Network Technology.

article thumbnail

Hackers Are Exploiting Trimble Cityworks, CISA Warns

Data Breach Today

Feds Order Agencies to Patch Critical Flaw in Widely Used Local Government System Hackers are exploiting a critical vulnerability in Trimble's Cityworks platform, an infrastructure management tool used by governments that enables remote code execution on Microsoft IIS web servers. CISA has ordered federal civilian agencies to patch a critical vulnerability by Feb. 28.

article thumbnail

Breach Roundup: Researchers Find Flaws in Palo Alto Firewalls

Data Breach Today

Also: US Prosecutors Charge Suspected North Korean IT Worker Collaborators This week, researchers spied Palo Alto firewall flaws, a North Korean IT worker conspiracy, ChatGPT as DDoS vector. Chinese hackers targeted a VPN maker, a fake PyPi package and a Russian threat actor shifted tactics. BreachForums admin faces prison and scammers used the release of Ross Ulbricht.

IT 173
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Attackers Exploit Cryptographic Keys for Malware Deployment

Data Breach Today

3,000 Exposed ASP.NET Keys Put Web Applications at Risk of Code Injection Attacks Threat actors are using publicly exposed cryptographic keys - ASP.NET machine keys - to manipulate authentication tokens, decrypt protected information, and insert harmful code into susceptible web servers, creating opportunities for unauthorized control and long-term access.

article thumbnail

Encryption Debate: Britain Reportedly Demands Apple Backdoor

Data Breach Today

Secret Order Seeks to Compel Apple to Weaken Encryption, Washington Post Reports The British government has unexpectedly reignited the long-running encryption debate, reportedly issuing a secret order to Apple requiring that it provide direct access to global users' fully encrypted cloud backups and prohibited the technology giant from alerting any targeted accountholders.

article thumbnail

Breach Roundup: Microsoft Makes Security Staff Cuts

Data Breach Today

Also: Intensified Russian Hacking in Ukraine, Spain's Telefnica Confirms Breach This week, Microsoft laid off security staff and released Patch Tuesday, Russian hackers intensified attacks on Ukraine in 2024, Telefnica confirmed a breach, a Tennessee mortgage leader reported a breach and the Texas AG sued Allstate over driver data collection.

Security 173
article thumbnail

Ransomware Campaign Targets Amazon S3 Buckets

Data Breach Today

Threat Actor 'Codefinger' Targets Cloud Environments A ransomware group is targeting Amazon S3 buckets, exploiting the data stored there using AWSs server-side encryption with customer keys and demanding a ransom in exchange for the encryption key needed to unlock the data. The group uses compromised or publicly exposed AWS account credentials.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Breach Roundup: Hacker Claims 20 Million OpenAI Logins Taken

Data Breach Today

Also: Researchers Bypass GitHub Copilot's Protections, Deloitte Pays $5M for Breach This week: A hacker claims to have 20 million OpenAI logins, Sweden clears ship in Baltic cable damage, researchers find ways to bypass GitHub Copilot's protections, Netgear patches router flaws, undetectable Mac backdoor raises alarms, Spain nabs hacker, and Deloitte pays $5M for RIBridges breach.

162
162
article thumbnail

Cryptohack Roundup: Critical Ethereum Vulnerability

Data Breach Today

Also: Conviction in 1.5M Fraud, Sentencing in Torture and Theft Case This week's stories include a critical Ethereum vulnerability, conviction in a 1.5M fraud, sentencing in a torture and crypto theft case, SEC's new roadmap, Jan crypto stats, Coinbase social engineering victims, and U.S. lawmakers' digital assets working group.

162
162
article thumbnail

Still-Lucrative Ransomware's Profits Plunged 35% Last Year

Data Breach Today

Collapse of LockBit and BlackCat/ALPHV Tied to Ongoing Decline in Big-Game Hunting Ransomware may still be raking in massive cryptocurrency profits for practitioners, but 2024 turned out to be less of a banner year than predicted, with blockchain researchers reporting that the sum total of known ransom payments to ransomware groups in 2024 plummeted by 35%.