Mon.Jan 13, 2025

article thumbnail

Microsoft Sues Harmful Fake AI Image Crime Ring

Data Breach Today

Guardrails Bypassed on Azure OpenAI to Generate 'Thousands of Harmful Images' Microsoft filed a lawsuit targeting a cybercrime service used to generate "thousands of harmful images" by subverting the guardrails built into its Azure generative artificial intelligence tools. The company said attackers built a tool that reverse-engineered the guardrails in its AI platform.

article thumbnail

Microsoft to force new Outlook app in Windows 10 with no way to block it

Collaboration 2.0

Designed to replace the current Mail and Calendar apps, the new Outlook can only be removed after it's been installed.

IT 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Enterprises Need to Know About Agentic AI Risks

Data Breach Today

Mitigating Cybersecurity, Privacy Risks for New Class of Autonomous Agents Many organizations are looking to artificial intelligence agents to autonomously perform tasks that surpass traditional automation. Tech firms are rolling out agentic AI tools that can handle customer-facing interactions, IT operations and a variety of other processes without human intervention, but experts are cautioning security teams to watch for cyber and privacy risks.

Risk 230
article thumbnail

How to create system restore points on Linux with Timeshift - and why you should

Collaboration 2.0

Concerned about something going wrong with your Linux system? If so, Timeshift can help return things to a working state should something go awry.

128
128
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

FRAML Reality Check: Is Full Integration Really Practical?

Data Breach Today

Experts Weigh the Pros and Cons of Work Culture and Merging AML and Fraud Teams A recent report found that more than 57,000 Americans fall victim to scams every day. Financial fraud is rising globally. In response, the National Automated Clearinghouse Association is pushing for real-time fraud monitoring by 2026, requiring closer collaboration between fraud and AML teams.

147
147

More Trending

article thumbnail

British Prime Minister Starmer Unveils New AI Plan

Data Breach Today

Proposals Calls for AI Growth Zones and National Data Library British Prime Minister Keir Starmer unveiled a plan for converting the United Kingdom into an artificial intelligence "world leader," allowing it to shape the next phase of the "AI revolution." Key recommendations include creating multiple AI growth zones and a national data library.

article thumbnail

This mini SSD enclosure transformed my data management - and I never leave home without it

Collaboration 2.0

The Satechi Mini NVMe SSD Enclosure is a useful accessory for transferring big files, moving 20GB of data in less than a minute.

IT 113
article thumbnail

Chainalysis Expands Fraud Detection With Alterya Acquisition

Data Breach Today

Alterya's AI-Powered Data Will Combat Scams Across Traditional Financial Ecosystems Alterya's AI agents now power Chainalysis' fraud prevention, integrating off-chain data sources like Venmo and Zelle with blockchain analytics. This acquisition marks a significant step in detecting and stopping scams earlier in the fraud cycle, said CEO Jonathan Levin.

article thumbnail

U.S. CISA adds BeyondTrust PRA and RS and Qlik Sense flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds BeyondTrust PRA and RS and Qlik Sense flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-12686 (CVSS score of 6.6) The flaw is an OS Command Injection Vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS).

IT 110
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Feds Tell Health Sector to Watch for Bias in AI Decisions

Data Breach Today

HHS OCR Letter Also Reminds Entities That AI Tool Use Must Comply with HIPAA Federal regulators are reminding healthcare providers, insurers and other regulated firms of their duty to ensure that AI and other emerging technologies for clinical decision making and patient support are not used in a discriminatory manner - and comply with HIPAA.

Insurance 130
article thumbnail

This iPhone bug is particularly alarming

Collaboration 2.0

A photo circulating on Reddit, showing an iPhone alarm going off several hours late, has reignited claims of a long-standing iOS bug that Apple has yet to address.

103
103
article thumbnail

White House Moves to Restrict AI Chip Exports

Data Breach Today

New Export Rules Limit AI Chip Access Globally, Sparking Industry Criticism U.S. export controls slated for publication Monday aim to block foreign adversaries from accessing American advanced computing chips and blueprints for machine learning models. Nvidia and industry leaders have criticized the policy, warning it may harm innovation.

Access 130
article thumbnail

'How to quit Facebook?' searches spike after Meta's fact-checking ban

Collaboration 2.0

Google searches on removing Instagram and Threads accounts also rose in the wake of Mark Zuckerberg's announcement last week.

100
100
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Inside the Black Box of Predictive Travel Surveillance

WIRED Threat Level

Behind the scenes, companies and governments are feeding a trove of data about international travelers into opaque AI tools that aim to predict whos safeand whos a threat.

article thumbnail

Do wind power generators actually work at home? My firsthand experience says it all

Collaboration 2.0

Solar generators have become all the rage lately, but what happens when the skies turn cloudy? This device ensures your power stays on.

IT 98
article thumbnail

Ministers mull allowing private firms to make profit from NHS data in AI push

The Guardian Data Protection

Anonymised data could help develop treatments, drugs and diagnostic tools but potential misuse worries experts What does AI plan mean for NHS patient data and is there cause for concern? Ministers are considering allowing private companies to make profits from NHS data as part of a push to revolutionise the health service using artificial intelligence, government officials have indicated.

article thumbnail

This new Linux handheld PC could be a tinkerer's dream come true

Collaboration 2.0

Currently in development, the Debian-powered Mecha Comet could be a Linux phone, drone controller, or interface for your car. If you dream it, you can make it.

IT 96
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Thales Cloud Protection & Licensing

Fifteen Best Practices to Navigate the Data Sovereignty Waters josh.pearson@t Tue, 01/14/2025 - 08:04 Data sovereigntythe idea that data is subject to the laws and regulations of the country it is collected or stored inis a fundamental consideration for businesses attempting to balance harnessing the power of data analytics, ensuring compliance with increasingly stringent regulations, and protecting the privacy of their users.

article thumbnail

Proton Pass review: A highly secure password manager with easy to overlook flaws

Collaboration 2.0

Proton Pass offers interoperability with Proton VPN and Proton Mail, along with a host of security features compatible with most devices and operating systems.

article thumbnail

Deepfakes, Shallow Morals: The Real Issue Behind the UK's Crackdown

KnowBe4

The UK government decided to wage war on explicit deepfakes. About time, right? But before we start celebrating, let's take a closer look.

article thumbnail

$450 and 19 hours is all it takes to rival OpenAI's o1-preview

Collaboration 2.0

UC Berkeley released an open-source model that's on par with o1's math and coding abilities - for a fraction of the cost.

IT 94
article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Credit Card Skimmer campaign targets WordPress via database injection

Security Affairs

Stealthy credit card skimmer targets WordPress e-commerce sites, injecting malicious JavaScript into CMS database tables to evade detection. Sucuri researchers warn of a stealthy credit card skimmer campaign targeting WordPress e-commerce sites by injecting malicious JavaScript into CMS database tables. The attackers hide the malicious code in the WordPress wp_options table, injecting obfuscated JavaScript into widget_block to evade file scans and maintain persistence. “The malicious code

CMS 65
article thumbnail

How AI could supercharge your glucose monitor - and catch other health issues

Collaboration 2.0

Stanford researchers built an algorithm to predict subtypes of Type 2 diabetes that works right from your home.

93
article thumbnail

Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme

Schneier on Security

Not sure this will matter in the end, but it’s a positive move : Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed to allow the creation of harmful and illicit content using the company’s platform for AI-generated content. The foreign-based defendants developed tools specifically designed to bypass safety guardrails Microsoft has erected to prevent the creation of harmful content through its generative AI services, said S

article thumbnail

Three CES 2025 products I'd buy as soon as they're available for purchase

Collaboration 2.0

CES is officially over, so I'm reflecting on the products that left the biggest impression on me - and that I'd spend my money on.

92
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Collibra named a Leader in the Gartner® Magic Quadrant™ for Data and Analytics Governance Platforms

Collibra

Were excited to share that Gartner has identified Collibra as a Leader in the inaugural Magic Quadrant for Data and Analytics Governance Platforms. This announcement follows a series of recent accomplishments that we believe reinforce our position as a market leader in the data and AI governance space. Gartner describes a data and analytics (D&A) governance platform as having a set of integrated business and technology capabilities that help business leaders and users to develop and deploy a

article thumbnail

Wanted: Humans to build robots for OpenAI - and not everyone is thrilled

Collaboration 2.0

A series of job listings for the ChatGPT maker's robotics team suggest the company is finally ready to leap into hardware.

92
article thumbnail

What does AI plan mean for NHS patient data and is there cause for concern?

The Guardian Data Protection

Key questions answered around potential use of health data to train AI models under Labours proposals Ministers mull allowing private firms to make profit from NHS data in AI push UK ministers have committed to creating a National Data Library for building artificial intelligence models, as part of an AI action plan. The library will comprise state-controlled data with at least five high-impact public datasets being compiled.