Thu.Feb 13, 2025

article thumbnail

Are we losing our critical thinking skills to AI? New Microsoft study raises red flags

Collaboration 2.0

As more workplaces embrace emerging technology, research warns that prolonged use of AI can erode our cognitive abilities.

331
331
article thumbnail

The Loneliness Epidemic Is a Security Crisis

WIRED Threat Level

Romance scams cost victims hundreds of millions of dollars a year. As people grow increasingly isolated, and generative AI helps scammers scale their crimes, the problem could get worse.

Security 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You can now speak to Microsoft's Copilot Voice in 40 languages, for free

Collaboration 2.0

The differences between ChatGPT's Advanced Voice, Google's Gemini Live, and Microsoft's Copilot Voice are narrowing.

265
265
article thumbnail

New Phishing Kit Bypasses Two-Factor Protections

Data Breach Today

Astaroth Kit Offered for $2,000 on Telegram, Intercepts Authentication in Real Time A new phishing kit called Astaroth bypasses two-factor authentication through session hijacking and real-time credential interception from services like Gmail, Yahoo, AOL and Microsoft 365. Acting as a man-in-the-middle, it captures login credentials, tokens and session cookies in real time.

Phishing 147
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

How to create a Windows recovery drive in 4 easy steps - before it's too late

Collaboration 2.0

If your PC is operating perfectly right now, great! But getting ahead of any future PC fiascos with a recovery drive may save you from a major tech-induced headache later.

IT 252

More Trending

article thumbnail

This $160 Samsung Galaxy Watch deal is hard to beat - especially for all the features you get

Collaboration 2.0

Samsung's Galaxy Watch FE is a great entry point into smartwatches, and the base model is available for $40 off.

251
251
article thumbnail

Breach Roundup: Microsoft Patches Two Zero-Days in February

Data Breach Today

Also: Google Fixes YouTube Vulnerabilities That Could Have Exposed User Emails This week: Microsoft, Ivanti and Google release fixes for critical vulnerabilities and urge priority patching; Lee Enterprises confirms a cyberattack disrupted newspaper operations; and thousands of KerioControl Firewalls exposed to critical remote code execution flaws.

147
147
article thumbnail

I brought my aging PC back to life with this lightweight Linux OS - and it's easy to use

Collaboration 2.0

If your PC can't upgrade to Windows 11, switching to Linux can extend its life past 2025. WattOS is one of the best options I've tested.

IT 240
article thumbnail

New Australian Law Makes Banks, Telecoms Liable for Scams

Data Breach Today

Social Platforms Also Could Face Stiff Fines for Failing to Protect Users The Australian government passed the Scams Prevention Framework law in Parliament to make social media companies, banks and telecommunication companies accountable for scammers using their networks, subjecting them to a maximum of AU$50 million in fines for violations.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The end of data silos? How SAP is redefining enterprise AI with Joule and Databricks

Collaboration 2.0

SAP's new AI-driven data platform integrates SAP and non-SAP data, breaks silos, and enables next-gen automation with Joule AI agents. Is your business ready?

239
239
article thumbnail

CyberArk Bolsters Identity Governance With $175M Zilla Buy

Data Breach Today

Acquisition of Startup Adds Modern Identity Governance to CyberArks Identity Suite CyberArk has acquired Zilla Security for up to $175 million, adding modern identity governance and administration capabilities with AI-driven automation for faster deployments, streamlined access reviews, and efficient provisioning to secure human and machine identities.

article thumbnail

How I feed my files to a local AI for better, more relevant responses

Collaboration 2.0

Msty is one of the best apps for interacting with the Ollama local AI tool and it contains a feature you'll want to use to help provide contextuality to its responses.

IT 238
article thumbnail

CISA Cuts Expose US Critical Infrastructure to New Threats

Data Breach Today

Could CISA's Uncertain Future Embolden Nation-State Attackers? As the future of the Cybersecurity and Infrastructure Security Agency becomes increasingly uncertain in the wake of a massive federal overhaul, experts warn that key U.S. infrastructure sectors, including energy, financial services and election infrastructure, are at a heightened risk of cyberattacks and cyberespionage.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Apple has a humanoid robot in the works, according to a report

Collaboration 2.0

iPhones, iPads, MacBooks, and robots?

232
232
article thumbnail

APT Groups Using Ransomware 'Smokescreen' for Espionage

Data Breach Today

Russian, Iranian and Chinese APTs Among Most Active Ransomware Collaborators Security researchers are increasingly finding it challenging to attribute cyberattacks due to surging cooperation between nation-state hackers and ransomware groups, especially for espionage purposes. They say it reflects the blurring of the lines between state-directed and criminal activities.

article thumbnail

Gemini Live just got much easier to talk to - here's how

Collaboration 2.0

Google's AI assistant now understands more languages and accents, making it easier to have a conversation.

IT 229
article thumbnail

Unpatched Cisco Devices Still Getting Popped by Salt Typhoon

Data Breach Today

Telecoms Still Falling to Chinese Nation-State Hacking Group, Researchers Warn A Chinese cyber espionage group tracked as Salt Typhoon and tied to the mass hacking of telecommunications networks in the U.S. and dozens of other countries has been continuing to seek and hack unpatched equipment, including exploiting two long-patched vulnerabilities in Cisco gear.

130
130
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

I tested 10 AI content detectors - and these 3 correctly identified AI text every time

Collaboration 2.0

Some detectors are better at spotting AI-written text than others. Here's why these mixed results matter.

225
225
article thumbnail

Future-Proofing Information Management Through Talent Development

AIIM

The evolution of information management demands a new approach to talent development. As someone who transitioned from traditional librarianship to leading digital transformation initiatives, I understand the importance of continuous learning and adaptation.

article thumbnail

The OnePlus Open 2 is a no-go for 2025: Is this the end of an era?

Collaboration 2.0

Ahead of the Oppo Find N5 launch early next week, OnePlus took to its community forums to announce that it will not launch a foldable this year.

IT 219
article thumbnail

New Phishing Campaign Targets The X Accounts of Politicians, Tech Companies, Cryptocurrency, And More

KnowBe4

SentinelOne warns that a phishing campaign is targeting high-profile X accounts, including those belonging to US political figures, leading journalists, major technology companies, cryptocurrency organizations, and owners of coveted usernames.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

If Amazon doesn't sell the product, you may soon be taken to another site

Collaboration 2.0

When a shopper clicks on a product available only on a brand's site, they'll be notified that they're about to leave Amazon. It looks like Google Shopping has some competition.

IT 219
article thumbnail

Using Mac Endpoint Telemetry for Compliance with Regulatory Frameworks

Jamf

Ensure compliance with regulatory frameworks using Jamfs Mac Endpoint Telemetry.

article thumbnail

iOS 18.3 still kills my iPhone's battery if I enable this feature

Collaboration 2.0

I noticed that my iPhone's battery was being hit hard after installing iOS 18. I tracked this down to a new feature.

214
214
article thumbnail

China-linked APTs’ tool employed in RA World Ransomware attack

Security Affairs

A November 2024 RA World ransomware attack on an Asian software firm used a tool linked to China-linked threat actors. Broadcom researchers reported that threat actors behind an RA World ransomware attack against an Asian software and services firm employed a tool that was explosively associated in the past with China-linked APT groups. “Tools that are usually associated with China-based espionage actors were recently deployed in an attack involving the RA World ransomware against an Asian

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Apple finally lets you migrate purchases between two accounts - here's how

Collaboration 2.0

Just a heads up: The migration process can be a bit of a headache, with a long checklist -- but the option is finally here for those who've been waiting forever.

211
211
article thumbnail

Valve removed the game PirateFi from the Steam video game platform because contained a malware

Security Affairs

Valve removed a game from Steam because it contained malware, the company also warned affected users to reformat their operating systems. Valve removed the game PirateFi from the Steam video game platform because it contained a Windows malicious code to steal browser cookies and hijack accounts. The company also warned affected users to fully reformatting the operating systems to remove the threat.

IT 271
article thumbnail

This SSD docking station is one of the best investments I've made for my iMac - here's why

Collaboration 2.0

If you are running out of room on your internal drive, why not expand it with a few 2.5" SSD drives and this handy docking station by Sabrent.

IT 210