Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records

Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records

A massive IoT data breach has exposed 2.7 billion records, compromising sensitive information such as Wi-Fi network names, passwords, IP addresses and device IDs.  Jeremiah Fowler, a cybersecurity researcher, reported the unprotected database linked to Mars Hydro, a China-based IoT grow light company, and LG-LED Solutions, a California-registered firm. Fowler disclosed the findings to vpnMentor, which shared them exclusively with Infosecurity. The database, comprising 1.17 terabytes of unprotected data, contained 13 folders with over 100 million…

Read More

I love the Galaxy S25 Ultra, but the Pixel 9 Pro XL for $200 off right now is the better deal

I love the Galaxy S25 Ultra, but the Pixel 9 Pro XL for 0 off right now is the better deal

Kerry Wan/ZDNET This review was originally published on September 12, 2024, and was updated on February 11, 2025. What’s the deal? On Amazon, every single configuration of Google’s Pixel 9 Pro XL has seen a $200 discount. Prices now start at $899. ZDNET’s key takeaways The Google Pixel 9 Pro XL has a starting price of $1,099, while the Pixel 9 Pro starts at $999. For the price, you’re getting a larger, brighter-than-ever 6.8-inch display, exclusive…

Read More

10 common dangers VPNs won't protect you from online – and how to avoid them

10 common dangers VPNs won't protect you from online – and how to avoid them

Yuliya Taba/Getty Images VPNs are a hot topic among ZDNET readers. Many of you use VPNs to protect your communications, protect your privacy or location, or to location-shift your apparent physical address (which may or may not violate various sites’ terms of service). Also: Is a VPN-ready router the ultimate Wi-Fi upgrade? I tested one to find out If you’re not familiar with what a VPN does, my VPN explainer will give you a really…

Read More

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Amid the rising pace of digitization, a growing number of organizations are managing their workloads based on a hybrid model. A hybrid model by design leads to dispersion of corporate data across different environments. Against this backdrop, it has become more difficult than ever to secure and protect the data from many digital identities that are used to access various systems. While security components like multifactor authentication (MFA), Single Sign-On (SSO), and Password Vaulting, among…

Read More

From data to decisions: Graham Construction's digital journey

From data to decisions: Graham Construction's digital journey

The importance of diversity in teams  As an immigrant, a woman, and a member of the LGBTQ community, I understand the value of diverse perspectives. Technology, like many industries, has historically been male-dominated. However, I am passionate about fostering diversity because it brings different viewpoints and approaches to problem-solving. Diverse teams are more innovative, and they produce better outcomes.  In the context of product development, diversity plays a critical role. By bringing together individuals from…

Read More

The billion-dollar AI company no one is talking about – and why you should care

The billion-dollar AI company no one is talking about – and why you should care

Galeanu Mihai/Getty Images What if I told you that the biggest winner in this AI arms race isn’t OpenAI, Meta, Google… or even DeepSeek? This company is quietly winning, and nobody’s talking about it. 🫣 Also: From zero to millions? How regular people are cashing in on AI And when I say winning, I don’t mean hype. “One day, a magical company will change the world and revolutionize AI blah blah blah…” Nah!!! This ain’t hypothetical….

Read More

What Is GRC? Understanding Governance, Risk, and Compliance

What Is GRC? Understanding Governance, Risk, and Compliance

Governance, risk, and compliance, often called GRC, is a blanket term that describes the strategies and technologies used to manage an organization’s compliance with regulatory mandates and corporate governance standards. The concept of GRC can be traced back to 2003, but the topic was first extensively discussed in a peer-reviewed paper by Scott L. Mitchell, published in the International Journal of Disclosure and Governance in 2007. This guide discusses what GRC is and what it…

Read More

Security Detection Tech Failing, Say Cyber Leaders

Security Detection Tech Failing, Say Cyber Leaders

Almost three-quarters (74%) of IT security directors in regulated industries in the US and UK believe detection-based security technologies are outdated and inadequate. This surprising finding comes from Everfox’s latest CYBER360 report, a survey of 1000 IT and security leaders in government, defense and financial services across the US and UK. The report, published on February 12, 2025, lays bare the exceptionally high volume of cyber-attacks suffered by regulated organizations, with 97% of respondents saying…

Read More

CIS Control 02: Inventory and Control of Software Assets

CIS Control 02: Inventory and Control of Software Assets

Today, I will be going over Control 2 from version 8.1 of the top 18 CIS Controls – Inventory and Control of Software Assets. I will go over the seven safeguards and offer my thoughts on what I’ve found. Key Takeaways for Control 2 Reusability. The tools that were mentioned in Control 1 will be used in Control 2 as well. Reusing tools that accomplish goals for both Controls 1 and 2 can help cut…

Read More

Holding the Tide Against the Next Wave of Phishing Scams

Holding the Tide Against the Next Wave of Phishing Scams

By now, we should all be pretty well acquainted with phishing scams. They’ve been around for a very long time—nearly 30 years, in fact—and are the primary focus of most security awareness training programs and initiatives. Despite this, phishing remains remarkably effective, with over 90% of successful cyberattacks beginning with a phishing email. Why? Because these scams are constantly evolving. To protect against the next wave of phishing scams, it’s important to understand them. As…

Read More
1 110 111 112 113 114 3,800