Header-template

TECH NEWS

DBS Bank Vendor Ransomware Attack Compromises Data of 8,200 Customers

Potentially compromised client statements for about 8,200 people resulted from a ransomware assault on Toppan Next Tech TNT, DBS Banks printing vendor

Potentially compromised client statements for about 8,200 people resulted from a ransomware assault on Toppan Next Tech TNT, DBS Banks printing vendor. The impacted information does not include sensitive data such as account balances or login credentials, but it does include names, mailing addresses, and information about stocks or loans. DBS has halted all TNT printing jobs and increased monitoring to monitor the affected accounts closely. Helping with investigations and offering advice on containment strategies are the Monetary Authority of Singapore MAS and the Cyber Security Agency of Singapore CSA. This instance highlights how dangerous ransomware attacks that target thirdparty vendors are becoming. Read More..

B2B Tech News | 10 months ago          

Horizon Robotics and Volkswagen Deepen Collaboration on Intelligent Driving

To develop intelligent driving technology, Horizon Robotics and Volkswagen have announced an expanded collaboration. Through their joint venture, Cari

To develop intelligent driving technology, Horizon Robotics and Volkswagen have announced an expanded collaboration. Through their joint venture, Carizon and Volkswagens software subsidiary, Cariad, the partnership will incorporate Horizons SuperDrive system into Volkswagen cars. This agreement aims to speed up the introduction of intelligent driving features in Volkswagens China portfolio while also improving advanced driver assistance systems ADAS. Volkswagens "in China, for China" strategy, which prioritises indigenous innovation and smart mobility leadership, includes the programme. Read More..

B2B Tech News | 10 months ago          

Elon Musks Grok3 Outpaces DeepSeekR1 in AI Scaling and Efficiency

Elon Musks xAI has released Grok3, its most sophisticated AI model, which performs marginally better in terms of efficiency and scaling than Chinas De

Elon Musks xAI has released Grok3, its most sophisticated AI model, which performs marginally better in terms of efficiency and scaling than Chinas DeepSeekR1. Grok3 demonstrated a bruteforce method for AI development by being trained on xAIs supercomputer Colossus, employing 200,000 NVIDIA H100 GPUs. DeepSeekR1, on the other hand, emphasises algorithmic efficiency and inventiveness by achieving equivalent performance with just 2,000 NVIDIA H800 devices. Massive computational scale versus optimised architecture are two tactics in AI innovation that are highlighted by this competition. Read More..

B2B Tech News | 10 months ago          

Coordinated Cyberattack Hits Australian Pension Funds, Compromising 20,000 Accounts

Over 20,000 member accounts of several Australian pension funds were compromised in a coordinated cyberattack. REST, Hostplus, Insignia Financial, Aus

Over 20,000 member accounts of several Australian pension funds were compromised in a coordinated cyberattack. REST, Hostplus, Insignia Financial, AustralianSuper, and Australian Retirement Trust are among the major funds impacted. Unauthorised withdrawals totalling AUD 500,000 were made by hackers using passwords they had obtained to gain access to accounts. The funds have acted immediately, including adopting cybersecurity protocols and closing portals. In order to prevent future intrusions, authorities are focusing on implementing reforms such as obligatory multifactor authentication and bolstering security measures. Vulnerabilities in Australias AUD 4.2 trillion superannuation sector are highlighted by this occurrence. Read More..

B2B Tech News | 10 months ago          

Concerns Raised Over ChatGPTs Capability to Generate Fake Aadhaar and PAN Cards

The weekly tech summary focuses on two significant advancements The creation of phoney Aadhaar and PAN cards made possible by OpenAIs ChatGPT has spar

The weekly tech summary focuses on two significant advancements The creation of phoney Aadhaar and PAN cards made possible by OpenAIs ChatGPT has sparked discussions about the abuse of AI and the necessity of regulation. In the meantime, Meta has released its sophisticated Llama 4 AI models, such as Scout and Maverick, which are intended for multimodal tasks like interpreting text, images, and videos. As a demonstration of Metas commitment to AI innovation, these models are designed to compete with Googles Gemini 2.0 and OpenAIs GPT4o. These tales highlight the revolutionary and challenging facets of AI developments. Read More..

B2B Tech News | 10 months ago          

Meta Unveils Llama 4 AI Model with Multimodal Capabilities and MoE Architecture

Meta has revealed three versions of its most recent AI model, Llama 4 Llama 4 Scout, Llama 4 Maverick, and the soontobereleased Llama 4 Behemoth. Thes

Meta has revealed three versions of its most recent AI model, Llama 4 Llama 4 Scout, Llama 4 Maverick, and the soontobereleased Llama 4 Behemoth. These models are constructed on a mixtureofexperts MoE architecture for increased efficiency, are multimodal, and can handle text, photos, and videos. While Behemoth is still in production, Llama 4 Scout and Maverick are currently accessible for download. According to Meta, these models demonstrate superior reasoning, coding, and language skills, outperforming rivals such as OpenAIs GPT4o and Googles Gemini 2.0 in several benchmarks. A significant milestone in Metas AI innovation efforts has been reached with this launch. Read More..

B2B Tech News | 10 months ago          

Weaponized PDFs Drive 22% of EmailBased Cyberattacks, Check Point Research Reveals

According to Check Point Research, there has been an increase in cyberattacks that use PDFs to spread harmful content. They found that weaponised PDF

According to Check Point Research, there has been an increase in cyberattacks that use PDFs to spread harmful content. They found that weaponised PDF attachments are currently used in 22% of emailbased intrusions. These attacks circumvent conventional security measures by taking advantage of the intricate structure of PDFs and inserting harmful links, QR codes, or encrypted material. To avoid detection, cybercriminals employ strategies like obfuscation and encoding, which make these attacks incredibly sneaky. To reduce dangers, Check Point advises being vigilant, utilising secure PDF viewers, avoiding unexpected links, and confirming senders. This demonstrates the increasing complexity of cyber threats that target commonly used, reliable file formats. Read More..

B2B Tech News | 10 months ago          

Google Expands Gemini Lives Astra Features to Android 10+ Devices

To enable realtime camera and screensharing capabilities, Google has started to roll out Gemini Lives Astra capabilities to Android smartphones. These

To enable realtime camera and screensharing capabilities, Google has started to roll out Gemini Lives Astra capabilities to Android smartphones. These capabilities, which were previously limited to Pixel and Galaxy S25 phones, are now accessible on Android 10+ handsets for Gemini Advanced customers. Astra enables users to engage with Gemini Live by sharing their screen or camera feed to enhance conversations with visual input. It is recommended that users upgrade their Google app to enjoy these capabilities, as the deployment is gradual. This is a big step towards incorporating AI into regular mobile interactions. Read More..

B2B Tech News | 10 months ago          



Get The News to use newsletter to
stay on top of shifting Technology News Updates!!

...

Get Latest News To Your Inbox, Subscribe To Our Newsletter.


By signing up, you agree to our Privacy Notice and European users agree to the data transfer policy.



Take a break, Play Suduko!



Refresh Your Facts


1.  Global online sales are predicted to reach 22% of all retail sales in 2023.
   15154   

2.  Global tablet shipments are expected to hit 142 million by 2025, reports Statista.
   12574   

3.  Artificial Intelligence is expected to contribute $15.7 trillion to the economy by the year 2030.
   12936   

4.  Since the launch of the popular mobile game, Candy Crush, in 2012, players have spent a total of 73 billion hours (equivalent to 8.3 million years) playing this game.
   12698   

5.  Approximately 8 billion gadgets connect on the internet every day.
   15791   



Sharpen your mind and memory!

Play Mind Game



Your Opinion Matters, Vote Now!!


Where do you go to learn more about whats happening in your industry? Check all that apply.