Mon.Oct 21, 2024

article thumbnail

Cisco states that data published on cybercrime forum was taken from public-facing DevHub environment

Security Affairs

Cisco confirms that data published by IntelBroker on a cybercrime forum was taken from the company DevHub environment. Cisco confirms that the data posted by IntelBroker on a cybercrime forum was stolen from its DevHub environment. IntelBroker claimed to have gained access to Github projects, Gitlab Projects, SonarQube projects, Source code, hard coded credentials, Certificates, Customer SRCs, Cisco Confidential Documents, Jira tickets, API tokens, AWS Private buckets, Cisco Technology SRCs, Doc

article thumbnail

New York Detective Indicted for Darknet Card Data Buys

Data Breach Today

FBI Tracking Alleged Fraudsters Using Evidence Seized From Shuttered Genesis Market An FBI probe into shuttered cybercrime site Genesis Market has led to the indictment of Terrance Ciszek, a now-suspended police detective in Buffalo, New York, who's been accused of buying stolen payment card data and recording a video showing fraudsters how to use it anonymously.

Marketing 311
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

My favorite iPhone car mount charger just got a cool upgrade (and it supports Qi2)

Collaboration 2.0

ESR's new Qi2 car mount can wirelessly charge your iPhone at 15W while staying cool, thanks to its CryoBoost feature.

IT 246
article thumbnail

Insiders Confuse Microsoft 365 Copilot Responses

Data Breach Today

Attack Method Exploits RAG-based Tech to Manipulate AI System's Output Researchers found an easy way to manipulate the responses of an artificial intelligence system that makes up the backend of tools such as Microsoft 365 Copilot, potentially compromising confidential information and exacerbating misinformation. Researchers called the attack "ConfusedPilot.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI

Collaboration 2.0

Only weeks after Red Hat released Red Hat Enterprise Linux AI, the company rolled out the next version: RHEL AI 1.2.

246
246

More Trending

article thumbnail

The Amazon Fire TV Omni QLED is great for gaming and streaming, and still $150 off

Collaboration 2.0

The Amazon Fire TV Omni QLED offers great picture and audio quality for both streaming and console gaming. Save $150 on the 55-inch model, but you'll have to hurry because you might not see a deal this good again until Black Friday.

243
243
article thumbnail

Researchers Debut AI Tool That Helps Detect Zero-Days

Data Breach Today

Vulnerability Tool Detected Flaws in OpenAI and Nvidia APIs Used in GitHub Projects Security researchers have developed an AI tool that can detect remote code flaws and arbitrary zero-day code in software. Protect AI applied the tool to nearly 10,000 GitHub projects and on CVSS data and uncovered local file inclusion, cross-site scripting and remote code flaws in APIs.

Security 296
article thumbnail

Gartner's 2025 tech trends show how your business needs to adapt - and fast

Collaboration 2.0

A future full of AI agents, postquantum cryptography, hybrid computing and more is speeding your way. What has you most excited? Most worried? Personally, I find one of Gartner's predictions pretty far-fetched.

189
189
article thumbnail

CISA Ramping Up Election Security Warnings As Voting Begins

Data Breach Today

US Cyber Defense Agency Says Election is Secure Despite Intensifying Threats The Cybersecurity and Infrastructure Security Agency is ramping up its warnings of potential election interference and influence campaigns in the lead up to the November vote. But voters can be assured their ballots are secure and will be counted as cast, the agency said.

Security 291
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

More of Internet Archive is back online, despite hackers infiltrating its helpdesk

Collaboration 2.0

Following last month's devastating cyberattacks, there's good news and bad news about Internet Archive and its popular Wayback Machine.

Archiving 190
article thumbnail

Sophos Fortifies XDR Muscle With $859M Secureworks Purchase

Data Breach Today

Deal Enhances Sophos’ Managed Security Portfolio, Adds AI-Powered Taegis XDR Tool Sophos is acquiring Secureworks in a deal valued at $859 million, aiming to integrate its managed security services with Secureworks' Taegis XDR platform. This merger is expected to deliver advanced detection and response capabilities, and enhance global cybersecurity for businesses of all sizes.

article thumbnail

Why you should power off your phone at least once a week - according to the NSA

Collaboration 2.0

Turning off your phone regularly is one of the NSA's top cybersecurity recommendations. Here's why and what else to know.

article thumbnail

US Government Says Relying on Chinese Lithium Batteries Is Too Risky

WIRED Threat Level

A new document shows the Department of Homeland Security is concerned that Chinese investment in lithium batteries to power energy grids will make them a threat to US supply chain security.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Microsoft introduces 10 AI agents for sales, finance, supply chain in Dynamics 365

Collaboration 2.0

Microsoft says agents can save companies as much as $50 million a year or offer the equivalent value of 'adding 187 full-time employees' by automating business processes.

Sales 190
article thumbnail

Identity Revolution: Welcome to the Dynamic World of IAM 360

Thales Cloud Protection & Licensing

Identity Revolution: Welcome to the Dynamic World of IAM 360 madhav Tue, 10/22/2024 - 05:02 It’s been quite the journey, but here it is—the first issue of IAM 360! For too long, Identity and Access Management (IAM) has played a background role—a fundamental but ‘invisible’ part of digital transformation. That’s why I’m so excited to present IAM 360—the magazine where IAM shifts from a behind-the-scenes function into a dynamic, forward-thinking conversation.

article thumbnail

The best QLED TV I've tested got an upgrade, and it's $1,000 off at Amazon

Collaboration 2.0

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode at an affordable price. And if you've been looking to invest in a truly cinema-sized TV, you can save $1,000 on the 98-inch model at Amazon.

IT 189
article thumbnail

KnowBe4's Cybersecurity Experts Shine at Barnes & Noble in New York City

KnowBe4

New York City's iconic Barnes & Noble on 5th Avenue recently featured the newly released books of two of KnowBe4's leading cybersecurity experts: Chief Human Risk Management Officer Perry Carpenter and Data-Driven Defense Evangelist Roger A. Grimes.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

I tested a 'luxury' nugget ice maker, and it was great - and it's on sale

Collaboration 2.0

The GE Opal 2.0 is a premium ice maker with all the smarts to make it an exceptionally satisfying kitchen appliance. Get it for $50 off ahead of Black Friday.

IT 189
article thumbnail

Cyber Attackers are Adopting a “Mobile First” Attack Strategy

KnowBe4

With 16+ billion mobile devices in use worldwide, new data sheds light on how cyber attackers are shifting focus and tactics to put attacks into the victim’s hands.

Phishing 126
article thumbnail

Ubuntu 24.10 Oracular Oriole takes flight - with a blend of innovation and nostalgia

Collaboration 2.0

Twenty years in the making, Ubuntu 24.10 has arrived, and it brings back the Ubuntu 4.10 startup sound. Here's what else you can expect.

IT 189
article thumbnail

Where Do I Point the Camera?

KnowBe4

It's October 10th, 2024, and I've just stepped out of KB4-CON EMEA, my head buzzing with insights and my notebook filled with scribbles. I walk down the familiar streets around Liverpool Street station, I can't help but feel a sense of nostalgia - this is where my career in cybersecurity began, after all.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Buy a Samsung Galaxy A35 and get a pair of Buds FE for free at Amazon

Collaboration 2.0

Right now at Amazon, you can get a free pair of Buds FE earbuds when you purchase a Samsung Galaxy A35 5G smartphone in lilac-- a $120 value.

189
189
article thumbnail

FedRAMP Authorized: OpenText™ Project and Portfolio Management

OpenText Information Management

Enjoy security, peace of mind, and trust with a FedRAMP-Certified project and portfolio management solution. OpenText™ Project and Portfolio Management achieved FedRAMP Authorization through the OpenText™ IT Management Platform (ITMX) available on the FedRAMP Marketplace. What is FedRAMP? Both the public and private sectors are increasingly leveraging cloud services to streamline operations, enhance scalability, and cut costs.

article thumbnail

Perplexity AI's new tool makes researching the stock market 'delightful'. Here's how

Collaboration 2.0

Perplexity Finance is a comprehensive suite of AI-powered tools with an easy-to-use interface. Here's how to access it and what to know before you do.

Marketing 189
article thumbnail

AI and the SEC Whistleblower Program

Schneier on Security

Tax farming is the practice of licensing tax collection to private contractors. Used heavily in ancient Rome, it’s largely fallen out of practice because of the obvious conflict of interest between the state and the contractor. Because tax farmers are primarily interested in short-term revenue, they have no problem abusing taxpayers and making things worse for them in the long term.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to schedule Linux commands - and when you should

Collaboration 2.0

Need to schedule a Linux action ahead of time? This command can help.

189
189
article thumbnail

Learn about functional test automation with AI and codeless testing

OpenText Information Management

November 4, 2024 at 11:00am-12:00pm ET Revolutionize your functional testing strategy and stay ahead in a constantly changing digital space. Get at the forefront of this revolution and learn how to leverage cutting-edge AI technologies to transform test automation and codeless scripting in the upcoming OpenText™ webinar: Revolutionizing functional test automation with AI and codeless testing.

article thumbnail

The best gaming tablets in 2024: Expert tested and reviewed

Collaboration 2.0

Video games aren't just for PCs or consoles. We tested the best gaming tablets that can meet the demands of modern gaming.

189
189