Wed.Oct 30, 2024

article thumbnail

QNAP fixed NAS backup zero-day demonstrated at Pwn2Own Ireland 2024

Security Affairs

QNAP fixed critical zero-day CVE-2024-50388 which was demonstrated against a TS-464 NAS device during the Pwn2Own Ireland 2024 competition. QNAP addressed a critical zero-day vulnerability, tracked as CVE-2024-50388, which was exploited by white hat hackers against a TS-464 NAS device during the recent Pwn2Own Ireland 2024 hacking competition. The flaw is an OS command injection vulnerability in HBS 3 Hybrid Backup Sync , a remote attacker could exploit it to execute arbitrary code commands on

article thumbnail

This Lenovo laptop is my surprise pick for best MacBook Pro alternative (even for Apple users)

Collaboration 2.0

Lenovo's Yoga Slim 7i Aura Edition pairs several unique and helpful features with the high-performing and efficient Intel Core Ultra 7 (Series 2).

312
312
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Warns of Ongoing Russian Intelligence Campaign

Data Breach Today

Russian SVR Targeting Government, Academia, Defense Organizations Globally A Russian-state hacking group is posing as Microsoft employees and sending malicious configuration files as email attachments to target organizations across the world. The campaign has the hallmarks of a Midnight Blizzard phishing campaign although its use of an RDP configuration file is novel.

Phishing 303
article thumbnail

This $99 Android phone is no Pixel 9 Pro, but performs better than handsets twice the price

Collaboration 2.0

Not everyone needs a $1,000 phone​. If you're on a tight budget or you're shopping for the kids, the NUU N10 is a truly impressive budget handset.

306
306
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Delta Air Lines' IT Outage Lawsuit: CrowdStrike Countersues

Data Breach Today

Vendor Blames Delta's Outage Severity on Its 'Own Response and IT Infrastructure' CrowdStrike has countersued customer Delta Air Lines, accusing the airline of employing a lawsuit and seeking damages in "a desperate attempt to shift blame" for Delta's own IT inadequacies having exacerbated its outage, unlike "other major airlines" that quickly resumed operations.

IT 302

More Trending

article thumbnail

Career Advice: Cybersecurity Means Business

Data Breach Today

Understanding the Impact of Security on the Business Makes You More Effective With cybersecurity now embedded across all industries and functions, the importance of aligning security measures with business objectives has never been greater. Here’s why being business savvy is crucial in cybersecurity - and how you can cultivate it to become a more effective professional.

article thumbnail

I tested sleep earbuds made by ex-Bose engineers, and they worked like a charm

Collaboration 2.0

The Ozlo Sleepbuds, with their calming audio output and comforting fit, are the best sleep earbuds I've ever used.

290
290
article thumbnail

Filigran Expands AI-Driven Threat Intel With $35M Series B

Data Breach Today

Insight Partners-Led Round Boosts US Growth, Fuels Threat Intelligence for Filigran Filigran’s $35 million Series B funding, led by Insight Partners, positions the company to scale its threat intelligence and proactive security capabilities while expanding its U.S. footprint. Plans include doubling the engineering team and strengthening breach and attack simulation capabilities.

Security 292
article thumbnail

We have an official open-source AI definition now, but the fight is far from over

Collaboration 2.0

Which of the three sides are you on?

274
274
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

CISA Opens Election War Room to Combat Escalating Threats

Data Breach Today

United States’ Top Cyber Defense Agency Mobilizes Nationwide Election Support Hub The director of the Cybersecurity and Infrastructure Security Agency said Wednesday the agency is establishing an election operations room to help counter foreign interference and support state officials amid escalating cyber and physical threats to the 2024 vote.

article thumbnail

Gen AI as a software quality tool? Skepticism is fading as more organizations implement it

Collaboration 2.0

IT pros' attitudes toward using generative AI as a quality assurance and testing vehicle have shifted significantly over the past 12 months, a new survey found.

IT 262
article thumbnail

Do Leading AI Models Comply With the EU AI Act?

Data Breach Today

New Compliance Tool Say Many AI Firms Fail to Meet Security, Fairness Standards Large language models developed by Meta and Mistral AI are among a dozen artificial intelligence models that fail to meet the cybersecurity and fairness requirements of the European Union AI Act, which went into effect on Aug. 1, said developers of a new open-source AI evaluation tool.

article thumbnail

Apple Watch lets you translate your conversations in real-time. Here's how

Collaboration 2.0

WatchOS 11's Translate app lets you have a live conversation in two languages with another person - right from your wrist.

259
259
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

State Forces ENT Practice to Spend $2.25M on Better Security

Data Breach Today

NY AG Action and $1M Fine Follow Back-to-Back Hacks That Affected 224,500 in 2023 An upstate New York-based medical practice must spend $2.25 million to improve its data security practices over the next five years, plus pay state regulators up to a $1 million fine following an investigation into two ransomware attacks days apart in 2023 that affected nearly 224,500 people.

Security 286
article thumbnail

How to make LibreOffice look more like Microsoft Office

Collaboration 2.0

If you've been using Microsoft Office for years but want to switch to LibreOffice, here's how to get a more familiar UI to make the transition seamless.

259
259
article thumbnail

New version of Android malware FakeCall redirects bank calls to scammers

Security Affairs

The latest FakeCall malware version for Android intercepts outgoing bank calls, redirecting them to attackers to steal sensitive info and bank funds. Zimperium researchers spotted a new version of the FakeCall malware for Android that hijacks outgoing victims’ calls and redirects them to the attacker’s phone number. The malware allows operators to steal bank users’ sensitive information and money from their bank accounts.

Phishing 246
article thumbnail

48% of people have been scammed while holiday shopping online - what to watch for

Collaboration 2.0

Almost half of Americans will do most of their holiday shopping between Black Friday and Cyber Monday. But that's also the busiest time of the year for scammers. Here's how to protect yourself.

257
257
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Google fixed a critical vulnerability in Chrome browser

Security Affairs

Google addressed a critical vulnerability in its Chrome browser, tracked as CVE-2024-10487, which was reported by Apple. Google has patched a critical Chrome vulnerability, tracked as CVE-2024-10487, reported by Apple Security Engineering and Architecture (SEAR) on October 23, 2024. The vulnerability is an out-of-bounds write issue that resides in the Dawn implementation.

Security 246
article thumbnail

Can Apple's new AI photo 'Clean up' tool beat Google's Magic Editor? For some users, yes

Collaboration 2.0

On my iPhone, I used these rival tools to fix the busy backgrounds of some vacation pics. Compare the respective results here.

250
250
article thumbnail

Energizing business outcomes: How data-driven AI and cybersecurity shape the future of Energy & Utilities

CGI

The Energy and Utilities sector is undergoing rapid transformation, driven by decarbonization goals, changing consumer demands and technological advancements. In this changing environment, the sector is confronted with new market pressures, heightened competition, an increased risk of cyberattacks, and pricing pressures imposed by competition, governments and regulators.

article thumbnail

GitHub Copilot goes 'multi-model' with support for four new LLMs

Collaboration 2.0

The coding assistant is no longer OpenAI-exclusive. See what will be supported and when.

244
244
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Is RIOT Data Undermining Your Information Governance? Here’s What You Need to Know 

Gimmal

In today’s landscape, organizations accumulate vast amounts of information daily. While data is a cornerstone of modern business, not all of it serves a purpose. In fact, a significant portion could be working against you. Enter RIOT data : Redundant, Inaccessible , Obsolete, and Trivial data that clogs systems, inflates costs, and exposes organizations to compliance risks.

article thumbnail

OpenAI's AI transcription tool hallucinates excessively - here's a better alternative

Collaboration 2.0

A researcher 'found hallucinations in eight out of every 10 audio transcriptions he inspected' from Whisper.

240
240
article thumbnail

QR Code Phishing is Growing More Sophisticated

KnowBe4

Sophos describes a QR code phishing (quishing) campaign that targeted its employees in an attempt to steal information.

Phishing 119
article thumbnail

How to use a PPA in Linux to install applications safely

Collaboration 2.0

Linux has many ways to install applications, including Personal Package Archives in Debian and Ubuntu-based distributions. Here's how they work.

Archiving 240
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Why Apple Intelligence and Private Cloud Compute are so different and secure

Jamf

Learn about the security and privacy controls in Apple Intelligence and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.

Cloud 45
article thumbnail

Apple just gave the MacBook Air a big performance upgrade - at no extra cost

Collaboration 2.0

The M2 and M3 MacBook Air lines will now sport a base memory of 16GB RAM. But don't mistake the free performance boost for Apple generosity.

230
230
article thumbnail

Lower Your E-Discovery Costs with CloudNine Review

eDiscovery Daily

By Jacob K Hesse When it comes to e-Discovery processing and hosting for analysis, review, and production, you need a platform that is intuitive, fast, and that all data and processes are completely contained in one platform. You also need price predictability and the core features and functions that will lead you to successful outcomes, from collection through production.