Mon.Jan 27, 2025

article thumbnail

DeepSeek’s Popular AI App Is Explicitly Sending US Data to China

WIRED Threat Level

Amid ongoing fears over TikTok, Chinese generative AI platform DeepSeek says its sending heaps of US user data straight to its home country, potentially setting the stage for greater scrutiny.

IT 337
article thumbnail

Furious over the Pixel 4a update fiasco? You may be entitled to compensation

Collaboration 2.0

If Google's update ruined your phone's battery life, you can choose a battery replacement, a Google store credit, or a cash payment. Here's how.

295
295
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scammers Are Creating Fake News Videos to Blackmail Victims

WIRED Threat Level

Yahoo Boy scammers are impersonating CNN and other news organizations to create videos that pressure victims into making blackmail payments.

Privacy 182
article thumbnail

Is this the iPhone SE 4? Leaked photos reveal major changes coming in 2025

Collaboration 2.0

Rumored to launch in April, the SE 4 sports a single camera, a notch, a USB-C port, and no more Home button, according to photos and a video shared by a known leaker.

289
289
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Swedish Authorities Seize Vessel in Cable Sabotage Probe

Data Breach Today

Undersea Cable Damage in Baltic Sparks Concerns of Russian 'Shadow Fleet' Activity Swedish authorities seized a vessel in the Baltic Sea as part of a criminal investigation into sabotage of an undersea cable between Sweden and Latvia after a series of regional cable disruptions, including one involving suspected Russian shadow fleet activity, raising security concerns.

Security 147

More Trending

article thumbnail

SonicWall's Zero-Day Provokes Patch Alerts

Data Breach Today

Preauthentication Deserialization Flaw Could Result in Remote Code Execution Software vendors and national security agencies are urging immediate patching of a critical SonicWall flaw days after the security device manufacturer disclosed that hackers are actively exploiting a zero-day. The flaw doesn't require user authentication.

article thumbnail

How to remove Copilot from your Microsoft 365 plan

Collaboration 2.0

Copilot has muscled its way into Microsoft 365 with a price hike to boot. But you can remove the AI from Word and revert to the classic plan. Here's how.

IT 259
article thumbnail

DeepSeek's New AI Model Shakes American Tech Industry

Data Breach Today

AI Startup's R1 Model Draws Praise and Skepticism An open reasoning model from Chinese artificial intelligence startup DeepSeek has the tech industry assessing its potential impact as shares of U.S. technology mainstays plummeted in trading on Monday. Hangzhou-based DeepSeek released its R1 model on Jan. 20.

article thumbnail

This versatile HP laptop will satisfy business professionals and creatives alike

Collaboration 2.0

HP's EliteBook x360 1040 has an adaptable form factor with one of the best video conferencing experiences I've tested on a laptop.

255
255
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Change Healthcare Now Counts 190 Million Data Breach Victims

Data Breach Today

Cost of Attack Has Reached $3.1 Billion for Parent Company UnitedHealth Group One of the biggest data breaches of 2024 is even worse than previously reported, as the tally of Change Healthcare breach victims has now reached 190 million individuals. The cost tied to the attack is $3.1 billion, according to its owner, U.S. health insurance giant UnitedHealth Group.

article thumbnail

Why China's DeepSeek could burst our AI bubble

Collaboration 2.0

The startup's open-source reasoning model R1 is clobbering AI rivals and panicking investors. But there's more.

250
250
article thumbnail

Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000

Data Breach Today

RansomHub Theft Hit Patients of 2 Dozen HCF Facilities and Home Healthcare Unit A chain of more than two dozen skilled nursing and rehabilitation facilities is notifying tens of thousands of patients whose information was compromised in a hacking incident last fall. Russian-speaking cybercriminal gang RansomHub claims to have published 250 gbytes of data stolen in the heist.

130
130
article thumbnail

Enterprises are hitting a 'speed limit' in deploying Gen AI - here's why

Collaboration 2.0

Many C-suite executives have been cheerleaders for their company's work in AI despite slow progress, finds Deloitte's latest survey.

243
243
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Fenix24 Buys vArmour IP to Boost Cyber Resilience, Recovery

Data Breach Today

Focus on Pre-Breach Resilience and Post-Breach Recovery Via Mapping Dependencies By acquiring vArmours intellectual property, Phoenix 24 will enhance its recovery services with advanced application visualization and dependency mapping. CEO Mark Grazman said the move will streamline recovery processes during ransomware attacks and improve organizational readiness.

article thumbnail

This robot vacuum performs as well as some flagship models for a fraction of the cost

Collaboration 2.0

Ecovacs' Deebot N30 Omni is a mid-range robot vacuum with high-end features worth way more than its cost, especially with this deal.

IT 240
article thumbnail

Maybe AI Hallucinations Aren't So Bad After All

Data Breach Today

Scientists Say Fabricated AI Responses Could Lead to New Discoveries and Innovation Hallucinations are considered one of the most worrisome flaws of emerging artificial intelligence technology. But some scientists see the tendency of AI and large language models to fabricate responses is tool for discovery in fields such as chemistry and pharmaceuticals.

article thumbnail

Apple releases iOS 18.3 with AI-powered Apple Intelligence on by default

Collaboration 2.0

The move means that people who don't want to use Apple's AI tech will need to manually disable it.

IT 239
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Nearly Three-Quarters of UK Education Orgs Have Sustained Cyberattacks

KnowBe4

73% of educational institutions in the UK have sustained at least one cyberattack or breach in the past five years, according to researchers at ESET.

Education 102
article thumbnail

My favorite ChatGPT feature just got way more powerful

Collaboration 2.0

ChatGPT Canvas just got easier to access and smarter (hint: it can now code better than ever). Here's how to use it.

Access 239
article thumbnail

Beware of Toll Scam Texts: How Cybercriminals are Targeting U.S. Drivers

KnowBe4

Drivers across the U.S. are being bombarded with fraudulent text messages claiming to come from toll operators like E-ZPass.

article thumbnail

The Galaxy S25 Ultra S Pen is losing its Bluetooth superpowers - but Samsung has a pricey fix

Collaboration 2.0

While the Bluetooth-enabled S Pen doesn't come with the new phone, Samsung may be offering it separately for users who really want it.

IT 222
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Privacy by design: Integrating data protection best practices in AI solutions development

CGI

While Data Privacy Day is a great opportunity to reinforce data protection best practices, privacy by design needs to be practiced 24/7 throughout the year.

Privacy 64
article thumbnail

Your Google Pixel 9 is getting a major audio upgrade - and it's coming for free

Collaboration 2.0

Bluetooth LE audio lets you listen to your Auracast-enabled hearing aids, headphones, speakers, and more.

IT 222
article thumbnail

Jamf School Onboarding Workflow, Part 1: The easy way to deploy Jamf Connect

Jamf

In this blog, learn about the new feature in Jamf School to help EDU-centric administrators to develop streamlined onboarding workflows, creating a seamless user experience for students and educators alike. In short, create a smooth path for new and existing device onboarding to place the necessary tools in the hands of stakeholders sooner.

article thumbnail

Can Substack lure creators with its new $20 million program? Here's how it plans to do it

Collaboration 2.0

Substack has attracted thousands of independent writers, journalists, and creators over the last few years by allowing them to monetize their content through paid newsletters. It might be about to attract a lot more.

IT 221
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Apple fixed the first actively exploited zero-day of 2025

Security Affairs

Apple addressed the first zero-day vulnerability of 2025, which is actively exploited in attacks in the wild aimed at iPhone users. Apple released security updates to address 2025’s first zero-day vulnerability, tracked as CVE-2025-24085 , actively exploited in attacks targeting iPhone users. The vulnerability is a privilege escalation vulnerability that impacts the Core Media framework. “A malicious application may be able to elevate privileges.

Security 293
article thumbnail

This 27-inch Asus smart monitor doubles as a Google TV for your office - and it impressed me

Collaboration 2.0

The Asus ZenScreen Smart Monitor will connect to just about any device you have - and can go from a TV to a gaming system to a work display.

IT 218
article thumbnail

ESXi ransomware attacks use SSH tunnels to avoid detection

Security Affairs

Threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Researchers at cybersecurity firm Sygnia warn that threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Ransomware groups are exploiting unmonitored ESXi appliances to persist and access corporate networks.