article thumbnail

Don’t use AI-based apps, Philippine defense ordered its personnel

Security Affairs

Teodoro ordered “to refrain from using AI photo generator applications and practice vigilance in sharing information online” At this time, it remains unclear whether the order was issued in response to a specific event or to address potential attacks aimed at exploiting the data collected by these applications.

article thumbnail

Threat actors scrape 600 million LinkedIn profiles and are selling the data online – again

Security Affairs

For the third time in the past four months, LinkedIn seems to have experienced another massive data scrape conducted by a malicious actor. Once again, an archive of data collected from hundreds of millions of LinkedIn user profiles surfaced on a hacker forum, where it’s currently being sold for an undisclosed sum.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

How cars became the worst product category for privacy Session Covers the extensive data collection (and subsequent sharing with car manufacturers and their affiliates) enabled by modern vehicles; they can collect way beyond location data. These probably don't affect most users reading this. CVE-2025-21308.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

For several years beginning around 2010, a lone teenager in Vietnam named Hieu Minh Ngo ran one of the Internet’s most profitable and popular services for selling “ fullz ,” stolen identity records that included a consumer’s name, date of birth, Social Security number and email and physical address.

article thumbnail

Influence Tactics in Marketing and Sales

Security Through Education

According to Rob Sanders , digital marketing expert, social media platforms supply marketers with a vast amount of data to know what content is working and what isn’t. Marketers utilize aggregate data , collected from online purchases and website visits, alongside social engineering to keep you purchasing, downloading, and revisiting.

article thumbnail

IT threat evolution Q3 2024

SecureList

CloudSorcerer is a sophisticated cyber-espionage tool used for stealth monitoring, data collection and exfiltration via Microsoft, Yandex and Dropbox cloud infrastructures. The data collected about the targets’ companies and contact information could be used to spy on people of interest and lay the groundwork for future attacks.

article thumbnail

Cybercriminals Are Targeting AI Conversational Platforms

Security Affairs

Bots can collect valuable data from user interactions, which can be analyzed to gain insights into customer preferences and behaviors. At the same time, it creates a major risk in terms of data protection, as the data collected from users may reveal sensitive information due to personalized interactions.