Mon.Dec 30, 2024

article thumbnail

AI agents might be the new workforce, but they still need a manager

Collaboration 2.0

AI agents keep getting smarter and more independent. But there is still work to be done before an agentic AI-driven workforce can truly assume a broad range of tasks.

350
350
article thumbnail

US Treasury Department Admits It Got Hacked by China

WIRED Threat Level

Treasury says hackers accessed certain unclassified documents in a major breach, but experts believe the attacks impacts could prove to be more significant as new details emerge.

IT 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 reasons why Google should switch Chromebooks from Android to Linux

Collaboration 2.0

By now, you've probably heard that Google plans to migrate Chromebooks to Android, but I believe there's a much better option that's already proven itself.

325
325
article thumbnail

Palo Alto Firewalls Backdoored by Suspected Chinese Hackers

Data Breach Today

Hackers Targeted a PAN-OS Flaw Days After Its Disclosure A suspected Chinese hacking campaign that began in November is exploiting a vulnerability in Palo Alto firewalls to install a custom malware backdoor for espionage. UNC5325 activity aligns with the Chinese hacking strategy of targeting edge devices.

IT 200
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

The latest MX Linux turns Xfce into a desktop anyone can use

Collaboration 2.0

If you're looking for a Linux distribution with a user-friendly desktop that's also very highly customizable, MX Linux presents the Xfce desktop in a way that anyone can use and grow with over time.

306
306

More Trending

article thumbnail

How to add alt text to images on Bluesky (and why you should)

Collaboration 2.0

Alt text is far more important than you might think, and Bluesky makes it fairly easy for you to add it to images you post.

IT 306
article thumbnail

China-linked actors hacked US Treasury Department

Security Affairs

China-linked threat actors breached the U.S. Treasury Department by hacking a remote support platform used by the agency. China-linked threat actors breached the U.S. Treasury Department via a compromised remote support platform. The Treasury Department discovered the security breach on December 8th from its vendor BeyondTrust , according to a letter to lawmakers.

article thumbnail

The 4 most Windows-like Linux distros to try because change is hard

Collaboration 2.0

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

299
299
article thumbnail

Chinese Hackers Breach US Treasury in 'Major Incident'

Data Breach Today

Treasury Tells Lawmakers Chinese Threat Actor Remotely Breached Agency Workstations The U.S. Treasury Department notified lawmakers Friday that the agency was the victim of a major cyberattack in which Chinese-linked hackers gained access to unclassified documents after gaining access to remote workstations through a third-party software provider, BeyondTrust.

Access 147
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

New Windows 11 24H2 bug could block future security updates - see who's affected

Collaboration 2.0

Installing the Windows 11 2024 version via a CD or flash drive may cause it to reject any future updates.

Security 270
article thumbnail

Four-Faith Routers Exploited Using New Flaw

Data Breach Today

Attackers Exploiting OS Command Injection Vulnerability Hackers are exploiting a high-severity command injection vulnerability in Chinese-manufactured Four-Faith industrial routers. Typical customers of Four-Faith use the routers for remote monitoring, control systems, supervisory control and data acquisition networks.

article thumbnail

5 alternative browsers that might just replace Safari on your Mac

Collaboration 2.0

Although Safari is a competent browser, there are better alternatives available. Let's look at five hidden gems I've tried and recommend -- but you might not have heard about them until now.

264
264
article thumbnail

A Year of AI Pragmatism and Paradigm Shifts

Data Breach Today

2025 Is Likely to See Balanced Approach to AI Across Industries The AI landscape is set to transform in 2025 with pragmatic approaches to implementation replacing the experimental fervor. This shift will span industries and developer ecosystems. Technologies will ride on the transformative power of AI and the responsibility that comes with it.

IT 147
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

This low-cost Lenovo gaming PC is the one I recommend to most people. Let me tell you why

Collaboration 2.0

The Lenovo LOQ Tower 17IRR9 is a solid little machine capable of easily handling most workloads. And the best part is that it's inexpensive.

IT 246
article thumbnail

Protecting Highly Sensitive Health Data for Research

Data Breach Today

Fully homomorphic encryption can safeguard highly sensitive health data related to rare diseases, underserved populations and clinical trials as it is shared with medical researchers, said Kurt Rohloff, co-founder and CTO of Duality Technologies, who said projects to apply it are underway right now.

article thumbnail

These are the top wearable tech products of 2024

Collaboration 2.0

From sleep earbuds to smart rings, here are the wearables that impressed me most this year.

246
246
article thumbnail

Volkswagen Subsidiary Exposed Data of 800,000 Cars Online

Data Breach Today

Flaw Exposed Vehicle Data and Private Details of Car Owners in Europe A security snafu at a Volkswagen subsidiary exposed vehicle information and ownership details on approximately 800,000 cars, including precise location data and owners' personal profiles. A whistleblower found a vulnerability in the cloud storage accounts of Volkswagen subsidiary Cariad.

Cloud 130
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

I still recommend this TCL TV model from last year - especially at up to $700 off right now

Collaboration 2.0

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode at an affordable price. Right now, three of the models have received huge discounts.

246
246
article thumbnail

Salt Typhoon’s Reach Continues to Grow

Schneier on Security

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

article thumbnail

Google's quantum breakthrough is 'truly remarkable' - but there's more to do

Collaboration 2.0

Scaling physical qubits reliably is a step forward. Now comes the hard part: actual circuits.

244
244
article thumbnail

An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip’s creator says is a fake

Security Affairs

An X user using the handle @NSA_Employee39 disclosed a zero-day vulnerability in the open-source file archive software 7-Zip. A verified X account, @NSA_Employee39, claimed to disclose a zero-day vulnerability in the open-source file archive software 7-Zip. The X user announced it would be dropping 0days all this week, starting with an arbitrary code execution vulnerability in the open-source software 7-Zip.

Archiving 319
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

If you're ready for something different, I recommend this Linux distro to newbies and experts alike

Collaboration 2.0

OpenMandriva is a sensible operating system that's not based on the top four most popular Linux distros, but just as easy to use.

229
229
article thumbnail

Cisco states that the second data leak is linked to the one from October

Security Affairs

Cisco confirmed the authenticity of the 4GB of leaked data, the data was compromised in a recent security breach, marking the second leak in the incident. Cisco confirmed the authenticity of the 4GB of leaked data, which was compromised in a recent security breach, marking it as the second leak in the incident. “We are aware of some recent social media posts made by the actor.

article thumbnail

If updates bricked your Meta Quest headset, try this first - then ask for a replacement

Collaboration 2.0

A recent software update is disabling Quest 2, 3, and 3S models. Meta is offering free replacements to some users.

203
203
article thumbnail

Threat actors attempt to exploit a flaw in Four-Faith routers

Security Affairs

VulnCheck researchers warn that threat actors are attempting to exploit a high-severity vulnerability impacting some Four-Faith routers. Cybersecurity firm VulnCheck warns that a high-severity flaw, tracked as CVE-2024-12856 (CVSS score: 7.2), in Four-Faith routers is actively exploited in the wild. The vulnerability is an operating system (OS) command injection vulnerability that impacts Four-Faith router models F3x24 and F3x36. “At least firmware version 2.0 allows authenticated and remo

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

I tested these sleep earbuds and they put me to bed instantly

Collaboration 2.0

The Ozlo Sleepbuds might be pricey, but they are the most comfortable sleep earbuds I've tested.

203
203
article thumbnail

News alert: SquareX exposes OAuth attack on Chrome extensions — days before a major breach

The Last Watchdog

Palo Alto, Calif., Dec. 30, 2024, CyberNewswire — SquareX , an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension developers aimed at taking over the Chrome Extension from the Chrome Store. On December 25th, 2024, a malicious version of Cyberhavens browser extension was published on the Chrome Store that allowed the attacker to hijack authenticated sessions and ex

Phishing 130
article thumbnail

The next big HDMI leap is coming next week - what the 2.2 standard means for you

Collaboration 2.0

Voluminous bandwidth, buttery-smooth refresh rates, and pricier cables are on deck for the New Year.

190
190