Wed.Oct 30, 2024

article thumbnail

QNAP fixed NAS backup zero-day demonstrated at Pwn2Own Ireland 2024

Security Affairs

QNAP fixed critical zero-day CVE-2024-50388 which was demonstrated against a TS-464 NAS device during the Pwn2Own Ireland 2024 competition. QNAP addressed a critical zero-day vulnerability, tracked as CVE-2024-50388, which was exploited by white hat hackers against a TS-464 NAS device during the recent Pwn2Own Ireland 2024 hacking competition. The flaw is an OS command injection vulnerability in HBS 3 Hybrid Backup Sync , a remote attacker could exploit it to execute arbitrary code commands on

article thumbnail

‘We’re a Fortress Now’: The Militarization of US Elections Is Here

WIRED Threat Level

From bulletproof glass, drones, and snipers to boulders blocking election offices, the US democratic system is bracing for violent attacks in 2024.

Security 321
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This Lenovo laptop is my surprise pick for best MacBook Pro alternative (even for Apple users)

Collaboration 2.0

Lenovo's Yoga Slim 7i Aura Edition pairs several unique and helpful features with the high-performing and efficient Intel Core Ultra 7 (Series 2).

313
313
article thumbnail

Microsoft Warns of Ongoing Russian Intelligence Campaign

Data Breach Today

Russian SVR Targeting Government, Academia, Defense Organizations Globally A Russian-state hacking group is posing as Microsoft employees and sending malicious configuration files as email attachments to target organizations across the world. The campaign has the hallmarks of a Midnight Blizzard phishing campaign although its use of an RDP configuration file is novel.

Phishing 303
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

This $99 Android phone is no Pixel 9 Pro, but performs better than handsets twice the price

Collaboration 2.0

Not everyone needs a $1,000 phone​. If you're on a tight budget or you're shopping for the kids, the NUU N10 is a truly impressive budget handset.

307
307

More Trending

article thumbnail

M4 Mac Mini vs. M2 Mac Mini: Which Apple desktop should you buy?

Collaboration 2.0

Apple's new Mac Mini offers a big performance boost thanks to the M4 chipset, but is it enough to warrant a purchase?

IT 291
article thumbnail

Career Advice: Cybersecurity Means Business

Data Breach Today

Understanding the Impact of Security on the Business Makes You More Effective With cybersecurity now embedded across all industries and functions, the importance of aligning security measures with business objectives has never been greater. Here’s why being business savvy is crucial in cybersecurity - and how you can cultivate it to become a more effective professional.

article thumbnail

I tested sleep earbuds made by ex-Bose engineers, and they worked like a charm

Collaboration 2.0

The Ozlo Sleepbuds, with their calming audio output and comforting fit, are the best sleep earbuds I've ever used.

291
291
article thumbnail

Filigran Expands AI-Driven Threat Intel With $35M Series B

Data Breach Today

Insight Partners-Led Round Boosts US Growth, Fuels Threat Intelligence for Filigran Filigran’s $35 million Series B funding, led by Insight Partners, positions the company to scale its threat intelligence and proactive security capabilities while expanding its U.S. footprint. Plans include doubling the engineering team and strengthening breach and attack simulation capabilities.

Security 292
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

We have an official open-source AI definition now, but the fight is far from over

Collaboration 2.0

Which of the three sides are you on?

274
274
article thumbnail

CISA Opens Election War Room to Combat Escalating Threats

Data Breach Today

United States’ Top Cyber Defense Agency Mobilizes Nationwide Election Support Hub The director of the Cybersecurity and Infrastructure Security Agency said Wednesday the agency is establishing an election operations room to help counter foreign interference and support state officials amid escalating cyber and physical threats to the 2024 vote.

article thumbnail

Gen AI as a software quality tool? Skepticism is fading as more organizations implement it

Collaboration 2.0

IT pros' attitudes toward using generative AI as a quality assurance and testing vehicle have shifted significantly over the past 12 months, a new survey found.

IT 262
article thumbnail

Do Leading AI Models Comply With the EU AI Act?

Data Breach Today

New Compliance Tool Say Many AI Firms Fail to Meet Security, Fairness Standards Large language models developed by Meta and Mistral AI are among a dozen artificial intelligence models that fail to meet the cybersecurity and fairness requirements of the European Union AI Act, which went into effect on Aug. 1, said developers of a new open-source AI evaluation tool.

article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

Apple Watch lets you translate your conversations in real-time. Here's how

Collaboration 2.0

WatchOS 11's Translate app lets you have a live conversation in two languages with another person - right from your wrist.

259
259
article thumbnail

State Forces ENT Practice to Spend $2.25M on Better Security

Data Breach Today

NY AG Action and $1M Fine Follow Back-to-Back Hacks That Affected 224,500 in 2023 An upstate New York-based medical practice must spend $2.25 million to improve its data security practices over the next five years, plus pay state regulators up to a $1 million fine following an investigation into two ransomware attacks days apart in 2023 that affected nearly 224,500 people.

Security 286
article thumbnail

How to make LibreOffice look more like Microsoft Office

Collaboration 2.0

If you've been using Microsoft Office for years but want to switch to LibreOffice, here's how to get a more familiar UI to make the transition seamless.

259
259
article thumbnail

New version of Android malware FakeCall redirects bank calls to scammers

Security Affairs

The latest FakeCall malware version for Android intercepts outgoing bank calls, redirecting them to attackers to steal sensitive info and bank funds. Zimperium researchers spotted a new version of the FakeCall malware for Android that hijacks outgoing victims’ calls and redirects them to the attacker’s phone number. The malware allows operators to steal bank users’ sensitive information and money from their bank accounts.

Phishing 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

48% of people have been scammed while holiday shopping online - what to watch for

Collaboration 2.0

Almost half of Americans will do most of their holiday shopping between Black Friday and Cyber Monday. But that's also the busiest time of the year for scammers. Here's how to protect yourself.

257
257
article thumbnail

Russia-linked Midnight Blizzard APT targeted 100+ organizations with a spear-phishing campaign using RDP files

Security Affairs

Microsoft warns of a new phishing campaign by Russia-linked APT Midnight Blizzard targeting hundreds of organizations. Microsoft warns of a large-scale spear-phishing campaign by Russia-linked APT Midnight Blizzard (aka APT29 , SVR group , BlueBravo , Cozy Bear , Nobelium , Midnight Blizzard , and The Dukes ), targeting 1,000+ users across 100+ organizations for intelligence gathering.

Phishing 246
article thumbnail

Can Apple's new AI photo 'Clean up' tool beat Google's Magic Editor? For some users, yes

Collaboration 2.0

On my iPhone, I used these rival tools to fix the busy backgrounds of some vacation pics. Compare the respective results here.

250
250
article thumbnail

Google fixed a critical vulnerability in Chrome browser

Security Affairs

Google addressed a critical vulnerability in its Chrome browser, tracked as CVE-2024-10487, which was reported by Apple. Google has patched a critical Chrome vulnerability, tracked as CVE-2024-10487, reported by Apple Security Engineering and Architecture (SEAR) on October 23, 2024. The vulnerability is an out-of-bounds write issue that resides in the Dawn implementation.

Security 246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

GitHub Copilot goes 'multi-model' with support for four new LLMs

Collaboration 2.0

The coding assistant is no longer OpenAI-exclusive. See what will be supported and when.

244
244
article thumbnail

Energizing business outcomes: How data-driven AI and cybersecurity shape the future of Energy & Utilities

CGI

The Energy and Utilities sector is undergoing rapid transformation, driven by decarbonization goals, changing consumer demands and technological advancements. In this changing environment, the sector is confronted with new market pressures, heightened competition, an increased risk of cyberattacks, and pricing pressures imposed by competition, governments and regulators.

article thumbnail

OpenAI's AI transcription tool hallucinates excessively - here's a better alternative

Collaboration 2.0

A researcher 'found hallucinations in eight out of every 10 audio transcriptions he inspected' from Whisper.

240
240
article thumbnail

Is RIOT Data Undermining Your Information Governance? Here’s What You Need to Know 

Gimmal

In today’s landscape, organizations accumulate vast amounts of information daily. While data is a cornerstone of modern business, not all of it serves a purpose. In fact, a significant portion could be working against you. Enter RIOT data : Redundant, Inaccessible , Obsolete, and Trivial data that clogs systems, inflates costs, and exposes organizations to compliance risks.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

How to use a PPA in Linux to install applications safely

Collaboration 2.0

Linux has many ways to install applications, including Personal Package Archives in Debian and Ubuntu-based distributions. Here's how they work.

Archiving 240
article thumbnail

QR Code Phishing is Growing More Sophisticated

KnowBe4

Sophos describes a QR code phishing (quishing) campaign that targeted its employees in an attempt to steal information.

Phishing 119
article thumbnail

Apple just gave the MacBook Air a big performance upgrade - at no extra cost

Collaboration 2.0

The M2 and M3 MacBook Air lines will now sport a base memory of 16GB RAM. But don't mistake the free performance boost for Apple generosity.

230
230