Wed.Jan 08, 2025

article thumbnail

Gayfemboy Botnet targets Four-Faith router vulnerability

Security Affairs

Gayfemboy, a Mirai botnet variant, has been exploiting a flaw in Four-Faith industrial routers to launch DDoS attacks since November 2024. The Gayfemboy botnet was first identified in February 2024, it borrows the code from the basic Mirai variant and now integrates N-day and 0-day exploits. By November 2024, Gayfemboy exploited 0-day vulnerabilities in Four-Faith industrial routers and Neterbit routers and Vimar smart home devices, with over 15,000 daily active nodes.

Cloud 295
article thumbnail

Autonomous businesses will be powered by AI agents

Collaboration 2.0

The Accenture Technology Vision 2025 report explores how AI-powered autonomy is shaping technology development, customer experience, the physical world, and the future workforce, where people and AI agents work together to drive customer success.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Governance vs. Data Governance: Understanding the Differences and Opportunities

Gimmal

AI Governance vs. Data Governance: Understanding the Differences and Opportunities Written by In our current rapidly evolving technological landscape, enterprises are collecting, analyzin g, and lev eraging unprecedented amounts of data. This massive influx of data, coupled with the growing capabilities of Artificial Intelligence (AI), has made governance a critical aspect of modern organizations.

article thumbnail

Update Chrome and Firefox now to patch these critical security flaws

Collaboration 2.0

The latest updates for both browsers squash several high-severity security bugs. Here's how to grab them.

Security 336
article thumbnail

How to Start Virtual Care the Right Way: A Proven Roadmap for 2025 and Beyond

Speaker: Dr. Christine Gall, DrPH, MS, BSN, RN

The promise of virtual care is no longer theoretical and is now a critical solution to many of healthcare’s most urgent challenges. Yet many healthcare leaders remain unsure how to build a business case for investment and launching the right program at the right time can be the difference between value and failure. For organizations seeking a financially sound, clinically effective entry point, Virtual Patient Observation (VPO) offers a compelling case to lead with.

article thumbnail

Meta's Fact-Checking Pull Back Could Help Scammers Thrive

Data Breach Today

Facebook Unveils Community Notes Program But Has Done Little to Curb Fraud Meta has decided to end its fact-checking program. Meta CEO Mark Zuckerberg announced significant changes to the company's moderation policies and practices on Tuesday, attributing the shift to a renewed commitment to free speech. Some fear the move will embolden financial scammers.

IT 162

More Trending

article thumbnail

How AP automation is helping LuLu Group International deliver seamless shopping experiences

OpenText Information Management

LuLu Group International has a wide-ranging business portfolio, but retail is the cornerstone of what we do. Around the world, we have over 260 stores with a combined floor area of more than 1.1 million square meters, offering high-quality products to millions of customers every year. Weve placed the customer experience at the heart of our long-term growth strategy.

article thumbnail

Dell just took a leap of faith by renaming its entire laptop portfolio - and it might just work out

Collaboration 2.0

This week at CES 2025, Dell revealed the Pro series will be its new flagship line - while bringing back an old favorite.

IT 320
article thumbnail

UN Cybercrime Treaty Faces Longs Odds to US Passage

Data Breach Today

US Senate Unlikely to Ratify Contentious Cybercrime Treaty Amid Mounting Concerns Experts tell Information Security Media Group that a controversial United Nations cybercrime convention is unlikely to be ratified in the U.S. Senate due to mounting concerns from technology, human rights, and privacy advocates over its potential impact on internet security and privacy protections.

Privacy 147
article thumbnail

The best AI tech of CES 2025: Neural wristbands, smart mirrors and more

Collaboration 2.0

AI was featured in nearly every consumer tech category at CES. Here's what stood out.

317
317
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

High-Paying Security Career: Choosing a Path, Getting There

Data Breach Today

Know the Challenges and Opportunities of Working as a CISO, Architect or Pen Tester Cybersecurity jobs typically pay well and they can be personally rewarding because they merge advanced technical challenges with a vital mission - protecting critical systems, data and people. In this post, we'll focus on the highest-paying jobs and the challenges and opportunities they offer.

Security 147
article thumbnail

This $200 Android is the only smartphone at CES that you should care about

Collaboration 2.0

TCL's CES mobile lineup includes the TCL 60 XE Nxtpaper 5G, an Android handset with a brilliant display and competitive price point.

313
313
article thumbnail

2 HIPAA Business Associates Pay HHS Ransomware Settlements

Data Breach Today

Agency Kicks Off New Year With First HIPAA Enforcement Actions, $170K in Fines A Massachusetts firm that provides billing and other services to home health agencies and a Virginia-based data hosting and cloud provider are the latest companies paying federal regulators settlements. HHS levied $170,000 in fines following investigations into ransomware breaches.

article thumbnail

Audio-Technica is turning the tables with new earbuds offering 65 hours of playback

Collaboration 2.0

The audio brand Audio-Technica announced the new ATH-CKS50TW2 earbuds at CES 2025.

306
306
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

Abandoned Backdoors: How Malicious Infrastructure Lives On

Data Breach Today

Studying Backdoors in Web Shells, Researchers Find 4,000 Infected Systems How many servers are infected by web shells designed to give attackers remote access to systems, but now "phone home" to malicious infrastructure that's now abandoned or expired? Security researchers who posed that question have counted 4,000 such systems, including in government and education.

Education 147
article thumbnail

Nvidia Project Digits: A Linux-powered desktop for AI developers

Collaboration 2.0

The most powerful desktop of all time will be arriving soon - and it will be running Linux.

IT 306
article thumbnail

Veracode Fuels Supply Chain Security With Phylum Acquisition

Data Breach Today

Phylum's Product Delivers Real-Time Detection of Malicious Open-Source Packages To combat the rise in software supply chain attacks, Veracode has acquired Denver-area startup Phylum and its advanced tools to detect malicious open-source packages. The acquisition strengthens Veracode's software composition analysis offering and enables faster, more reliable threat mitigation.

Security 147
article thumbnail

The best smart home tech of CES 2025

Collaboration 2.0

Smart home tech is one of the main events at CES and we've gathered the best you can find at the showcase.

299
299
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

European Court Fines European Commission for Privacy Violation

Data Breach Today

Transfer of German Man's IP Address Wins Him 400 Euros European privacy regulation - bane of American technology companies and a favorite cudgel of activists - came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.

Privacy 130
article thumbnail

Best laptops of CES 2025: These 5 Windows PCs left the biggest mark on the show floor

Collaboration 2.0

Our quest to go hands-on with every new laptop announced at CES has led us to these five picks, which stood out thanks to features, design, and value.

299
299
article thumbnail

Cymulate Expands Exposure Management with Cync Secure Deal

Data Breach Today

Cync Acquisition Bolsters Exposure Validation Through Advanced Offensive Expertise Cymulates acquisition of Cync Secure enhances its ability to bridge vulnerability identification and resolution. The deal integrates Cync offensive capabilities, creating a next-gen exposure prioritization platform to tackle vulnerabilities effectively and address unmet market demands.

Security 130
article thumbnail

Halliday just unveiled the AI glasses that Meta, Google and Apple have been trying to build

Collaboration 2.0

I tried Halliday's AI smart glasses at CES 2025. With a display that's built into the frame - not the lens - they beat my Ray-Ban Metas in key ways.

272
272
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

European Court Fines European Commission for GDPR Violation

Data Breach Today

Transfer of German Man's IP Address Wins Him 400 Euros European privacy regulation - bane of American technology companies and a favorite cudgel of activists - came to haunt no less an organization than the European Commission, which must pay 400 euros to aggrieved German national Thomas Bindl, peeved that Facebook obtained his IP address.

GDPR 130
article thumbnail

CES 2025: The 7 most advanced smart glasses we tried on - and loved

Collaboration 2.0

If these smart glasses are any indication of what we're in for in 2025, it's going to be a wild ride.

IT 264
article thumbnail

Meta's Fact-Checking Pull Back to Could Help Scammers Thrive

Data Breach Today

Facebook Unveils Community Notes Program But Has Done Little to Curb Fraud Meta has decided to end its fact-checking program. Meta CEO Mark Zuckerberg announced significant changes to the company's moderation policies and practices on Tuesday, attributing the shift to a renewed commitment to free speech. Some fear the move will embolden financial scammers.

IT 130
article thumbnail

The best audio gear of CES 2025: Headphones, sound systems, and turntables to watch

Collaboration 2.0

CES 2025 is in full swing, and there are plenty of audio products to check out. From open-ear headphones to booming sound systems, there's audio gear for everyone this year.

264
264
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

CSA releases guidance on the use of artificial intelligence in capital markets

Data Protection Report

On December 5, 2024, the Canadian Securities Administrators ( CSA ) released CSA Staff Notice and Consultation 11-348 Applicability of Canadian Securities Laws and the Use of Artificial Intelligence Systems in Capital Markets (the Notice ). The Notice was issued in light of the continued growth in the use of artificial intelligence ( AI ) systems in capital markets, which the CSA noted has the potential to improve market efficiency but poses unique risks and challenges for investors.

article thumbnail

How to protect yourself from phishing attacks in Chrome and Firefox

Collaboration 2.0

Phishing is a form of social engineering where attackers try to get you to reveal your sensitive information through malicious links, SMS, QR codes, and more. Here's how to protect yourself in Chrome and Firefox.

Phishing 260
article thumbnail

Phishing for Gamers: Fake Offers Invite Gamers to Test New Gaming Titles

KnowBe4

A phishing campaign is targeting users with phony offers to beta test new video games, according to researchers at Malwarebytes.

Phishing 104