Fri.Jan 31, 2025

article thumbnail

DeepSeek’s Safety Guardrails Failed Every Test Researchers Threw at Its AI Chatbot

WIRED Threat Level

Security researchers tested 50 well-known jailbreaks against DeepSeeks popular new AI chatbot. It didnt stop a single one.

IT 330
article thumbnail

How to clear the cache on your Windows 11 PC (and why it makes such a big difference)

Collaboration 2.0

Clearing the cache and removing temporary files can speed up your PC. Even better: all of these utilities are already on your computer.

IT 325
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Broadcom fixed information disclosure flaws in VMware Aria Operations

Security Affairs

Broadcom patched five flaws in VMware Aria Operations and Aria Operations for Logs that could lead to privilege escalation and credential theft. Broadcom addressed the following vulnerabilities in VMware Aria Operations and Aria Operations for Logs: CVE-2025-22218 (CVSS score 8.5) is an information disclosure vulnerability in VMware Aria Operations for Logs.A threat actor with View Only Admin permissions could exploit the issue to read thecredentialsof a VMware product integrated with VMware Ari

article thumbnail

How to use Microsoft Image Creator to generate and edit stunning AI images for free

Collaboration 2.0

You can fully customize any images you generate. Did we mention it's free?

IT 299
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang

Krebs on Security

The FBI and authorities in The Netherlands this week seized dozens of servers and domains for a hugely popular spam and malware dissemination service operating out of Pakistan. The proprietors of the service, who use the collective nickname “ The Manipulaters ,” have been the subject of three stories published here since 2015. The FBI said the main clientele are organized crime groups that try to trick victim companies into making payments to a third party.

Phishing 240

More Trending

article thumbnail

DeepSeek AI Models Vulnerable to JailBreaking

Data Breach Today

Researchers uncovered flaws in large language models developed by Chinese artificial intelligence company DeepSeek, including in its flagship R1 reasoning application. The security concerns come as Microsoft and OpenAI investigate whether DeepSeek developed used data scraped from an OpenAI API.

article thumbnail

This $200 Motorola changed my mind about what a budget phone can do in 2025

Collaboration 2.0

The new Moto G (2025) has a multi-day battery life, plus a surprisingly solid camera system for a mid-range model.

289
289
article thumbnail

Italy’s data protection authority Garante blocked the DeepSeek AI platform

Security Affairs

Italy’s data protection authority Garante blocked the DeepSeek AI service due to insufficient transparency regarding user data process. Italy’s data protection watchdog has blocked Chinese artificial intelligence (AI) firm DeepSeek ‘s chatbot service within the country, citing a lack of information on its use of users’ personal data.

article thumbnail

How to find out if an AirTag is tracking you - and what to do about it

Collaboration 2.0

Apple's trackers have been misused to track some without their consent. Here's how to check if an AirTag is tracking you, whether you use an iPhone or Android phone. Plus, what to do next if you find one.

IT 289
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

OpenAI Unveils o3-mini With Enhanced Coding, STEM Reasoning

Data Breach Today

OpenAI's New Cost-Efficient AI Reasoning Model Excels in Math, Coding, and Science OpenAI has launched o3-mini, a high-performance AI model optimized for STEM tasks. The model offers enhanced reasoning abilities, reduced latency, and features like function calling and structured outputs. Available in ChatGPT and API, o3-mini surpasses its predecessor in coding and math accuracy.

IT 147
article thumbnail

Own an Apple Watch? You could get part of a $20 million payout - find out how

Collaboration 2.0

Claims are being processed automatically, but you'll need to update your information to make sure you receive payment.

289
289
article thumbnail

Critical UK Government Systems at High Risk, Warn Auditors

Data Breach Today

Governmental Agencies Won't Meet 2025 Goal of Bolster Cybersecurity The British government fell short of its goal of significantly fortifying civilian IT systems to withstand cyberattacks by 2025, warned auditors in a report highlighting that much of officialdom runs on legacy systems. Nearly half of the government IT budget goes to keeping legacy systems running.

article thumbnail

I gave away my Kindle and iPad within hours of using this tablet

Collaboration 2.0

I've used a Kindle for years, but the TCL Tab 10 Nxtpaper 5G has quickly become my go-to e-reader tablet - and for good reason.

285
285
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

ISMG Editors: DeepSeek's AI Disruption and Security Risks

Data Breach Today

Also: UnitedHealth Breach Now Affects Over Half of US Population In this week's update, ISMG editors discussed two major stories shaking the tech and cybersecurity worlds - China's AI leap with DeepSeek, a new open-source bot that wiped $600 billion off of Nvidia's value, and an update on the massive UnitedHealth breach, which now affects 190 million people.

Risk 147
article thumbnail

I tested an E Ink tablet that rivals the Remarkable Paper Pro - and does some things better

Collaboration 2.0

The Boox Note Max is a 13-inch e-reader with a crisp display, an enjoyable digital pen experience, and a sprawling feature set that will either excite or intimidate you.

Paper 268
article thumbnail

Connecticut Health Clinic Hack Affects Nearly 1.1 Million

Data Breach Today

Health Records of Children, Deceased Patients Among Compromised Data Community Health Center, which has a dozen primary care, dental and other clinics in Connecticut, is notifying nearly 1.1 million people - including pediatric patients and their parents and guardians - that their information was potentially stolen in a cyberattack detected earlier this month.

130
130
article thumbnail

The Apple AirTag 4-pack is down to its lowest price ever, at under $18 each

Collaboration 2.0

Grab a 4-pack of Apple AirTags for only $70 right now so you can help the iPhone user in your life monitor their keys, wallet, luggage, and more.

IT 264
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Seraphic Raises $29M to Expand Enterprise Browser Protection

Data Breach Today

Series B Funding to Drive Seraphic's Innovation in Browser Security, AI Governance Seraphic Security secured $29 million to scale its enterprise browser security solutions. With growing cyberthreats, CEO Ilan Yeshua highlights the need for AI-driven security, governance and compliance. The company plans to expand its North American presence and strengthen partnerships.

article thumbnail

Is your live TV streaming service still worth it? I review options for every budget

Collaboration 2.0

Cord cutting was supposed to save us from those cable TV bills - but our streaming bills keep climbing. Find out if you're really getting your money's worth from that $90-plus subscription - and what your alternatives are.

IT 262
article thumbnail

Oligo Security Raises $50M to Tackle App Detection, Response

Data Breach Today

Investment to Expand Runtime Threat Detection and Workload Security Solutions Oligo Security has closed a $50 million Series B funding round to enhance its application detection and response capabilities. The investment, led by Greenfield Partners, will support the companys mission to redefine runtime security and protect enterprise workloads from cyberthreats.

Security 130
article thumbnail

Deepseek's AI model proves easy to jailbreak - and worse

Collaboration 2.0

In one security firm's test, the chatbot alluded to using OpenAI's training data.

Security 260
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

OpenAI Draws Closer to the US Government

Data Breach Today

National Labs to Use OpenAI Models OpenAI is strengthening ties with the U.S. government through a partnership with national laboratories in a bid to harness artificial intelligence to drive scientific advancements. The partnership builds on OpenAI's efforts to draw closer to the government.

article thumbnail

Microsoft and partners invest $72 million to launch AI Hub in New Jersey

Collaboration 2.0

'Our goal is to build a thriving regional AI economy,' said Microsoft's Brad Smith.

257
257
article thumbnail

Too Little, Too Late: Australian Banks Lag on Scam Controls

Data Breach Today

Banks Shift Blame to Social Media, Telecoms While Scam Victims Pay the Price If you're the victim of a scam in Australia, the chances of being reimbursed for your stolen funds are low. In fact, the AFCA ruled in favor of full reimbursement for victims in only 4.8% of its cases in 2024, highlighting the difficulty consumers face in disputing fraud-related losses with banks.

IT 130
article thumbnail

Public DeepSeek AI database exposes API keys and other user data

Collaboration 2.0

Beyond investor and CEO panic, DeepSeek presents a host of security concerns. Here's what the experts think you should know.

Security 254
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

News alert: Doppler announces integration with Datadog to streamline credential security

The Last Watchdog

San Francisco, Calif., Jan. 30, 2025, CyberNewswire — Doppler , the leading provider of secrets management solutions, announced a new integration with Datadog , a cloud application monitoring and security platform. This collaboration provides engineering and operations teams with an integrated solution for securely managing sensitive credentials and gaining insights into cloud environments through real-time monitoring.

Security 100
article thumbnail

I finally found a sleep device that put my nighttime doom scrolling to an end

Collaboration 2.0

The Hatch Restore 3 builds on the success of its predecessor with an improved design, upgraded speakers, and more customizable nighttime routines.

IT 253
article thumbnail

Your KnowBe4 Fresh Content Updates from January 2025

KnowBe4

Check out the 25 new pieces of training content added in January, alongside the always fresh content update highlights, new features and events.