Agregátor RSS
Micro RGB místo QLED: Samsung ukazuje novou generaci prémiových LCD televizorů, známe ceny
AI-led job cuts don’t always mean stronger ROI — Gartner
Businesses tend to eye AI spending as a way to reduce headcount, but firms that cut staffers as a result of AI are doing no better than those who don’t, according to new Gartner research.
Gartner recently surveyed 350 global business leaders at large organizations already using AI agents and intelligent automation tools and found that 80% of them reported a lowered headcount as a result of AI initiatives — in some cases by up to 20%.
But those layoffs appear to be less beneficial than senior leaders might assume.
“There’s no connection or correlation between people who are achieving ROI and layoffs,” said Helen Poitevin, distinguished vice president analyst at Gartner, adding that labor reduction is “not the best” ROI metric. Other factors such as revenue, growth, and time to market are more effective in achieving a strong ROI.
“Those who only look to the workforce tend to be the ‘laggards,’ because they’re not going after the broader set of value that they can get to,” she said. This approach can also be “very disruptive more broadly,” she said, noting that some organizations who cut staff were forced to quickly rehire employees soon after.
That’s not to say companies aren’t cutting jobs, said Poitevin, but doing so isn’t the main route to solid ROI. Instead, organizations with higher levels of return on their spending looked beyond workforce reductions and saw AI as a way to improve employee productivity.
These organizations are more likely to upskill staff to use AI tools, link employee hiring and performance criteria to AI proficiency, and set “transition paths” for skill sets and roles that will be affected by automation plans, said Poitevin.
“You have to plan for layoffs where they happen, but, more importantly, you have to plan for workforce transformation, and you have to go after broader forms of value through your AI investment portfolio than just labor cost,” she said.
For those panicking at the prospect of an AI-led jobs apocalypse, Gartner offers some hope: The analyst firm predicts that by 2029 the number of jobs created by AI will outpace those that are lost.
Between 2023 and 2029, approximately 6 million roles will be automated globally, as businesses deploy AI agents and other intelligent automation technologies, according to Gartner; that’s a small proportion of the roughly 2 billion jobs available to workers.
The prediction adds to a growing expectation among industry watchers that AI will reshape the workplace rather than replace workers en masse, at least for the foreseeable future. “AI is not leading to a jobs apocalypse, but it’s unleashing job chaos, changing the shape of what people do,” said Poitevin.
That doesn’t mean disruption can be avoided entirely. A larger portion of the workforce — around 32 million workers each year — will see their roles transformed with the introduction of AI and intelligent automation, forcing them to “rethink what they do, how they do it, what ‘good’ looks like,” said Poitevin.
At the same time, the deployment of AI is expected to generate new labor demand in 2027 and 2028, with that demand offsetting AI-related job cuts the following year.
The AI-led job gains will include higher demand for existing roles boosted by AI-driven productivity gains, as well as the creation of new roles related specifically to the deployment and management of AI systems – change management and business transformation, for example.
Wider adoption of AI tools will also lead to the emergence of new business models, according to Gartner – similar to higher demand for logistics systems and delivery drivers after the e-commerce boom or the increase in financial analysts after Excel replaced old-fashioned bookkeeping.
Strategies for deploying AI technology.
Gartner
The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed
The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed
MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks
MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks
Samsung naznačil budoucnost smartphonů. Nový displej změří krevní tlak i bez hodinek
Romance scammers turn sweet talk into £102M payday
Romance scammers turn sweet talk into £102M payday
Romance fraudsters scammed Britons out of £102 million ($138 million) last year, according to the latest police figures.…
Google now offers up to $1.5 million for some Android exploits
Why Reddit blocked my daily visit to its mobile website
I've recently developed a daily habit—perhaps one I should cut back on—of visiting several subreddits to keep up on things like audio production and the Russian invasion of Ukraine. But I was surprised this weekend to suddenly find myself cut off; Reddit simply would not let me visit the site on my mobile phone.
Instead, a new overlay popped up, saying, "Get the app to keep using Reddit."
There was no way to skip, bypass, or close the overlay. It did not provide any instructions or alternatives for continuing to use the mobile web version. What it did offer was a large button I could press to get the app. If I did so, the overlay told me, I would be able to "search better" and "personalize your feed"—two things I don't care to do.
Zvrat ve vyšetřování střemhlavého pádu čínského Boeingu 737. Někdo v kokpitu záměrně vypnul přívod paliva
Homebridge 2.0.0
Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs
A newly identified malware campaign is abusing Microsoft’s Phone Link feature to intercept SMS-based one-time passwords and other sensitive mobile data directly from Windows systems.
The activity, first observed by Cisco Talos in January 2026, involves a remote access trojan dubbed CloudZ and a custom plugin named Pheno that together allow attackers to harvest credentials and potentially capture authentication codes synced from a user’s smartphone, Talos researchers Alex Karkins and Chetan Raghuprasad wrote in a blog post.
“According to the functionalities of the CloudZ RAT and Pheno plugin, this was with the intention of stealing victims’ credentials and potentially one-time passwords (OTPs),” the researchers wrote.
The attack does not target the mobile device itself. Instead, it exploits the trust relationship between phones and Windows PCs by monitoring data mirrored through the Phone Link application, the blog post said.
CloudZ “utilizes the custom Pheno plugin to hijack the established PC-to-phone bridge by abusing the Microsoft Phone Link application, allowing the plugin to continuously scan for active Phone Link processes and potentially intercept sensitive mobile data like SMS and OTPs without deploying malware on the phone,” the Talos report said.
The technique sidesteps the need to compromise the mobile device itself, which the researchers said makes the intrusion notable to enterprise defenders.
It adds to a growing body of attacker tradecraft aimed at bypassing SMS- and app-based MFA by extracting authentication codes from compromised Windows systems where mobile data is synced.
Microsoft did not immediately respond to a request for comment.
Phone Link data becomes an attack surfaceMicrosoft Phone Link, previously known as Your Phone, is a built-in Windows feature that connects a PC to a smartphone and mirrors messages, notifications, and calls on the desktop.
Pheno is designed to locate the Phone Link data stored locally on the Windows system. According to the advisory, the attacker using CloudZ “can potentially intercept the Phone Link application’s SQLite database file on the victim machine, potentially compromising SMS-based OTP messages and other authenticator application notification messages.”
Because this data resides on the endpoint, the technique shifts risk from mobile devices to enterprise-managed Windows systems, potentially bypassing controls focused on securing smartphones.
Multi-stage infection chainThe intrusion begins with an unknown initial access vector, followed by the execution of a malicious file disguised as a ScreenConnect update, Talos said.
The initial payload is a Rust-compiled loader using filenames such as “systemupdates.exe,” which drops a .NET loader disguised as a text file in a system directory, the post said.
Persistence is established through a scheduled task named “SystemWindowsApis” that runs at startup with elevated privileges using the legitimate regasm.exe utility, the researchers wrote in the blog.
The .NET loader runs anti-analysis checks before unpacking CloudZ. It performs multiple checks to detect security tools and sandbox environments before executing the payload in memory, the report said.
It “calculates the actual elapsed time of a sleep command to detect if it is executed in the analysis environment,” and scans for tools such as Wireshark, Fiddler, Procmon, and Sysmon. “The .NET loader exits the execution if these are detected in the victim environment,” the blog post added.
The CloudZ payload is then decrypted in memory and executed, it said.
RAT enables credential theft and plugin deliveryCloudZ establishes an encrypted connection to a command-and-control server and supports a range of functions, including credential harvesting, file operations, and remote command execution, Talos said.
The malware also retrieves secondary configuration data from attacker-controlled infrastructure.
The Talos researchers wrote that the RAT downloads configuration data from remote servers and “extracts the C2 server IP address … and port number … establishing connections through TCP sockets.”
It also rotates user-agent strings to blend its traffic with legitimate browser activity, the researchers noted.
Pheno plugin monitors active device syncThe Pheno plugin is responsible for identifying active Phone Link sessions and enabling data interception.
It “scans all running processes for specific keywords such as ‘YourPhone,’ ‘PhoneExperienceHost,’ or ‘Link to Windows,’” and logs results locally, the report said.
The plugin then checks for evidence of a proxy connection used by Phone Link to relay data between devices.
“The presence of ‘proxy’ … indicates that the Phone Link session is actively routing traffic through its relay channel,” the researchers wrote.
When such activity is detected, the plugin flags the system as connected, which “eventually allows the attacker … to potentially monitor SMS or OTP requests that appear on the Phone Link application,” according to the report.
Talos has released detection signatures and indicators of compromise, including malware hashes, command-and-control infrastructure, and Snort rules associated with the activity.
Cisco Talos did not attribute the activity to a known threat actor.
The article originally appeared on CSO.
Dost bylo nekonečného vysvětlování. Gemini si zapamatuje, kdo jste a co máte rádi
We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is
We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is
Karakurt extortion gang ‘cold case’ negotiator gets 8.5 years in prison
CloudZ malware abuses Microsoft Phone Link to steal SMS and OTPs
Netflix a 30 nejoblíbenějších filmů a seriálů v květnu 2026. Mimoni, Harry Hole, Radiační poplach, Válečné monstrum…
- « první
- ‹ předchozí
- …
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- …
- následující ›
- poslední »



