Mon.Nov 04, 2024

article thumbnail

Bypassing ChatGPT Safety Guardrails, One Emoji at a Time

Data Breach Today

Mozilla Researcher Uses Non-Natural Language to Jailbreak GPT-4o Anyone can jailbreak GPT-4o's security guardrails with hexadecimal encoding and emojis. A Mozilla researcher demonstrated the jailbreaking technique, tricking OpenAI's latest model into generating python exploits and malicious SQL injection tools.

Security 255
article thumbnail

One third of consumers would prefer working with AI agents for faster service

Collaboration 2.0

Many consumers are happy to communicate with an AI agent but also want to know when that conversation is happening.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attack Hits Small Rural Georgia Hospital, Nursing Home

Data Breach Today

Memorial Hospital and Manor Tapping Its Experience Dealing With Downtime Procedures A small community hospital and its nursing home in rural Georgia have resorted to paper charts and other manual process for patient care as they deal with a ransomware attack discovered Saturday that knocked its electronic health records and other IT systems offline.

Paper 248
article thumbnail

Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies

WIRED Threat Level

When you download a piece of pirated software, you might also be getting a piece of infostealer malware, and entering a highly complex hacking ecosystem that’s fueling some of the biggest breaches on the planet.

Security 124
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

SEC Moves to Get Foreign Testimony in SolarWinds Fraud Case

Data Breach Today

Testimony Request Targets Cybersecurity Concerns Raised by Ex-SolarWinds Engineer In its fraud case against SolarWinds, the SEC is pursuing testimony from former SolarWinds engineer Robert Krajcir - who lives in the Czech Republic - to address claims of lax cybersecurity practices. SolarWinds - which is also representing Krajcir - has until Friday to respond to the SEC's motion.

More Trending

article thumbnail

ABB Smart Building Software Flaws Invite In Hackers

Data Breach Today

Proof of Concepts Available for Cylon Aspect Energy Management Software Vulnerabilities in a smart building energy management system including an easily exploitable, two-year-old flaw that hasn't been widely patched could let hackers take over instances misconfigured to allow internet exposure. The flaws affect Cylon Aspect software from electrical engineering firm ABB.

191
191
article thumbnail

Upgrade to Microsoft Office Pro and Windows 11 Pro for 87% off

Collaboration 2.0

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $53 for a limited time.

Access 104
article thumbnail

Celebrating 5 Million Learners: The Evolution of KnowBe4's Compliance Plus

KnowBe4

When you think of KnowBe4, you might immediately picture phishing simulations, password security modules, or other security awareness training topics.

article thumbnail

I tested the iPad Mini 7 for a week, and its the ultraportable tablet to beat at $100 off

Collaboration 2.0

Apple's iPad Mini 7 is an iterative upgrade to the small-sized tablet, but you probably shouldn't buy it for the AI features yet.

IT 102
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

July 2024 ransomware attack on the City of Columbus impacted 500,000 people

Security Affairs

The July 2024 ransomware attack that hit the City of Columbus, Ohio, exposed the personal and financial data of 500,000 individuals. On July 18, 2024, the City of Columbus, Ohio, suffered a cyber attack that impacted the City’s services. On July 29, 2024, the City published an update on the City’s website and confirmed that the City of Columbus suffered a ransomware attack.

article thumbnail

Linux Lite just got a useful AI feature for desktop - and it's more subtle than you think

Collaboration 2.0

Linux Lite is a lightweight distribution aimed at reviving older desktops, and with the latest release, the developers have (sort of) added AI into the mix.

IT 101
article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from October 2024

KnowBe4

Check out the October updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

How the 2024 US presidential election will determine tech's future

Collaboration 2.0

The two candidates have starkly different approaches to regulation and privacy. Here's what each administration could mean for the industry and individuals.

Privacy 98
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Sophos Versus the Chinese Hackers

Schneier on Security

Really interesting story of Sophos’s five-year war against Chinese hackers.

95
article thumbnail

Vulnerability Recap 11/4/24 – Fourteen-Year Bug Finally Gets Patched

eSecurity Planet

We’re looking at cloud credential theft (not good) and a big win for early vulnerability fixes (better) this week, as well as critical Mitsubishi Electric and Rockwell Automation bugs that could affect industrial control environments. Additionally, a SSL certificate weakness in qBittorrent has finally been fixed after 14 years of vulnerability. Also, Microsoft hasn’t yet developed a fix for Windows 11 downgrade attacks, which were first announced this summer at the Black Hat conference.

Cloud 84
article thumbnail

Claude AI can now analyze PDFs - here's how to try it (and why you'll want to)

Collaboration 2.0

The new Visual PDFs feature is now available in beta. Here's the breakdown of its capabilities.

IT 89
article thumbnail

If Social Engineering Is 70% - 90% of Attacks, Why Aren’t We Acting Like It?

KnowBe4

Over a decade ago, I noticed that social engineering was the primary cause for all malicious hacking. It has been that way since the beginning of computers, but it took me about half of my 36-year career to realize it.

IT 86
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Raspberry Pi is getting a new touchscreen display - and I love the upgrades

Collaboration 2.0

The new Raspberry Pi Touch Display 2 is arguably the best (and easiest) way to give your system more utility. Here's what's new.

87
article thumbnail

Nigerian man Sentenced to 26+ years in real estate phishing scams

Security Affairs

Nigerian Kolade Ojelade gets 26 years in U.S. for phishing scams that stole millions by hacking email accounts. A Nigerian national was sentenced to 26 years in prison in the US for stealing millions by compromising the email accounts of real estate businesses. The Nigerian national, Kolade Ojelade, Kolade Akinwale Ojelade (34), a resident of Leicester (UK) was sentenced to 26 years in U.S. for phishing scams that resulted in the compromise of millions of email accounts. “A Nigerian man wa

Phishing 121
article thumbnail

I'm a hardware Android user - but likely won't upgrade to Pixel 10 for the reason that Google thinks

Collaboration 2.0

Manufacturers are betting on AI to be the future of phones. That might be the case, but is that what consumers want or need?

article thumbnail

How Organisations Are Failing to Process Personal Data Lawfully Under the GDPR

IT Governance

Problems with consent, purpose limitation, retention periods, and more At the heart of the GDPR (General Data Protection Regulation) lie the Article 5 data protection principles. When I asked data privacy trainer and DPO (data protection officer) Andy Snow which principle organisations are most prone to getting wrong, he found it hard to pick just one.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Perplexity AI offers election results tracker and voter resource - try it here

Collaboration 2.0

The Election Information Hub aims to aggregate data about the US elections, but its AI has already gotten some facts wrong. Here's what to know.

IT 85
article thumbnail

The Role of Secrets Management in Securing Financial Services

Thales Cloud Protection & Licensing

The Role of Secrets Management in Securing Financial Services madhav Tue, 11/05/2024 - 04:30 Secrets management is one of the top DevOps challenges. According to 2024 Thales Global Data Threat Report: Financial Services , FinServ organizations face greater security challenges in securing cloud infrastructure and focus on locking down secrets in development operations.

article thumbnail

Your iPhone's next iOS 18.2 update may come earlier than usual - with these AI features

Collaboration 2.0

iOS 18.2 - which includes major improvements to Apple Intelligence, will arrive sooner than you think, barring any unexpected delays.

85
article thumbnail

Why Adding Biometrics to Employee Time Clocks Makes a Lot of “Cents”

HID Global

Explore how fingerprint biometric employee time clocks boost accuracy and efficiency, offering a secure and cost-effective solution for workforce management.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

3 ways to stop Android apps running in the background - and why I always do

Collaboration 2.0

I make sure to regularly - and manually - stop apps from running in the background on my Android phone. Is that absolutely necessary? Maybe not, but my habit does ensure optimal resources and privacy. Try it yourself.

Privacy 85
article thumbnail

Collibra recognized as a Champion in the 2024 Bloor Research Data Governance Market Update

Collibra

Data governance is vital for organizations to access trustworthy and secure data. It enables them to answer key questions like “Who are our most profitable customers?” and “What is our competitors’ best-selling product?” Challenges arise without standard definitions for product classifications and cost allocations. By designating business ownership of core data assets, data governance helps resolve conflicting definitions and overlaps.

article thumbnail

Google is ending Android Auto support for older phones. Here's why (and the simple fix)

Collaboration 2.0

After announcing the change earlier this year, Google is officially enforcing the new requirements to run the in-car software on devices running Android 8.

79