Fri.Nov 22, 2024

article thumbnail

U.S. CISA adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-44308 Apple Multiple Products Code Execution Vulnerability CVE-2024-44309 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability CVE-2024-21287 Oracle Agile Product Lifecycle Man

IT 159
article thumbnail

Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack

WIRED Threat Level

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

Security 337
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Days Top Cybersecurity Agencies' Most-Exploited List

Data Breach Today

Cybersecurity Officials Urge to Prioritize Fixing These 15 Most-Exploited Flaws Which vulnerabilities need fixing first to best block nation-state and other hacking attempts? Enter the latest Five Eyes intelligence partnership list of the 15 flaws most targeted by attackers, of which 11 were zero-days. Many organizations have yet to patch them all.

article thumbnail

This new YouTube tool adds AI backgrounds to your videos instantly - for free

Collaboration 2.0

YouTube's AI-generated feature enables users to add images or videos to the background of their Shorts using text-to-image prompts.

297
297
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

US Cyber Force Surges Global Operations Amid Rising Threats

Data Breach Today

US Cyber Command Says National Mission Force was Deployed Over 85 Times in 2024 A secretive U.S. military unit has surged its support to partner nations across the globe in 2024 while combatting escalating threats from foreign adversaries like China and North Korea, a top official from Cyber Command told the Cyberwarcon summit on Friday.

Military 280

More Trending

article thumbnail

ISMG Editors: China-Linked Espionage Targets U.S. Telecoms

Data Breach Today

Also: Highlights from ISMG's Financial Services Summit and Key Insights on AI Adoption On the 200th episode of the ISMG Editors' Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG's Financial Services Summit in New York, and unpacked the top findings from ISMG’s annual Generative AI Survey.

article thumbnail

Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle

Collaboration 2.0

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $55 for a limited time.

Access 278
article thumbnail

Google AI Tool Finds 26 Bugs in Open-Source Projects

Data Breach Today

One Vulnerability Had Been Undiscovered for Two Decades, Researchers Said Google researchers used an AI-powered fuzzing tool to identify 26 vulnerabilities in open-source code repositories, some of which had been lurking undiscovered for several decades. Each was found with AI, using AI-generated and enhanced fuzz targets, Google said.

264
264
article thumbnail

This gadget can help you drive safer and save money (and get 20% off for Black Friday)

Collaboration 2.0

Maintaining the correct tire pressure on your vehicle not only helps you save on gas, but also makes driving safer. Stay properly inflated with the Syncwire Tire Inflator.

278
278
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

North Korean IT Workers Using Fake Sites to Evade Detection

Data Breach Today

Researches Find Deep Ties to North Korea Among Fake IT Services Firms Websites North Korean state actors are using fake websites of foreign technology services firms sidestep sanctions and raise funding for Kim Jong-un regime's weapons development programs. SentinelLabs found many of these sites shared similar infrastructure, owners and locations.

IT 254
article thumbnail

AI isn't hitting a wall, it's just getting too smart for benchmarks, says Anthropic

Collaboration 2.0

As their self-correction and self-reasoning improve, the latest LLMs find new capabilities at a rate that makes it harder to measure everything they can do.

IT 274
article thumbnail

Haveli Purchases AppViewX to Strengthen Identity Automation

Data Breach Today

PE Firm Takes Majority Stake to Drive Certificate Lifecycle Management Innovation Private equity firm Haveli has purchased a majority stake in AppViewX to scale globally, targeting automation in certificate lifecycle management and public key infrastructure. CEO Gregory Webb says the acquisition will fund international expansion and next-gen technology investments.

246
246
article thumbnail

Two free ways to get a Perplexity Pro subscription for one year

Collaboration 2.0

You can get free access to this top AI chatbot if you fall into one of two categories.

Access 255
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

NIST IoT Device Security Framework to Get an Update

Data Breach Today

Revised Framework to Address Emerging IoT Risks and Technologies The U.S. National Institute of Standards and Technology plans to revise its Internet of Things cybersecurity framework to address evolving risks posed by emerging technologies and use cases, such as AI and immersive tech. The proposed updates will broaden the focus to entire product ecosystems.

IoT 242
article thumbnail

Claude AI can analyze your Google Docs and offer feedback now

Collaboration 2.0

There are a few caveats to consider but this could be a major productivity enhancer for people who use Claude and Docs.

244
244
article thumbnail

China's DeepSeek Aims to Rival OpenAI's 'Reasoning' Model

Data Breach Today

DeepSeek-R1 Struggles with Logic Tests and Is Vulnerable to Jailbreaks Chinese artificial intelligence research company DeepSeek, funded by quantitative trading firms, introduced what it says is one of the first reasoning models to rival OpenAI o1. Reasoning models engage in self-fact checking and perform multi-step reasoning tasks.

article thumbnail

I tried Google's suggested uses of Gemini Live - and one immediately stood out

Collaboration 2.0

Some use cases are good, while others fall short. Here is a ranked list of the most to least helpful use cases for Gemini Live.

244
244
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

It’s a wrap! Highlights from OpenText World 2024

OpenText Information Management

It was a banner year for the premier information management conference. OpenText World 2024 took place in Las Vegas this week and offered more innovation, product announcements, training, learning, and networking than ever before. Here are some of the highlights: Information is the heartbeat “This is the new era of AI. It’s a new era of human potential,” said Mark J.

Cloud 75
article thumbnail

Can your old PC even handle the Windows 11 upgrade? Here's how to tell

Collaboration 2.0

Does your PC have a future or is it time to consider retirement options? Here's what to look for.

IT 235
article thumbnail

Build easy applications to manage your supply chain

OpenText Information Management

Today, integrating technology into supply chain management isn’t just a nice-to-have—it’s a necessity. Whether you're sourcing materials for an EV battery, authenticating luxury sneakers, or ensuring the quality of a high-end water cooler, digital tools can streamline your operations, reduce errors, and protect your brand reputation. The good news? Building customized applications to tackle supply chain challenges is easier than you think, even for complex systems.

article thumbnail

OpenAI and Wharton launch free ChatGPT course for teachers. Here's how to access it

Collaboration 2.0

ChatGPT can boost your productivity. This course shows educators how they can benefit.

Access 235
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

The US Is Calling Out Foreign Influence Campaigns Faster Than Ever

WIRED Threat Level

The 2024 elections were a high-water mark for naming and shaming threat actors from foreign governments. There’s still work to be done, though, on how to attribute disinformation campaigns most effectively.

article thumbnail

Windows 11 24H2 hit by a brand new bug, but there's a workaround

Collaboration 2.0

You can't change the time zone the usual way unless you have admin rights. Here's how to sneak past this glitch.

235
235
article thumbnail

Phishing Attacks Exploits the Open Enrollment Period

KnowBe4

A phishing campaign is impersonating HR to target employees who are making annual insurance changes during the open enrollment period, according to researchers at Abnormal Security.

Phishing 119
article thumbnail

The 55+ best Black Friday gaming PC deals 2024: Sales live now

Collaboration 2.0

Black Friday sales are live, which means you can take advantage of early holiday discounts on prebuilt rigs from Alienware, HP, and more.

Sales 231
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Threat Group Use AI Adult-Based “Deepnude” Image Generator Honeypots to Infect Victims

KnowBe4

Appealing to the most depraved of society, threat group FIN7 use the lure of generating nude images of favorite celebrities to get victims to download their NetSupport RAT.

Honeypots 116
article thumbnail

This MagSafe phone holder survived my 850-mile road trip (and it's half price for Black Friday)

Collaboration 2.0

I needed a phone holder for a long road trip that had to be completed within 24 hours. This one from Syncwire exceeded all of my expectations.

IT 230
article thumbnail

Phishing Emails Use SVG Files to Avoid Detection

KnowBe4

Phishing emails are increasingly using Scalable Vector Graphics (SVG) attachments to display malicious forms or deliver malware, BleepingComputer reports.

Phishing 115