10.1 C
New York
Friday, March 28, 2025
Home Blog Page 4

Hakimo Raises $10.5M to Revolutionize Bodily Safety with Autonomous AI Agent

0


With reviews of crime charges rising, safety groups understaffed, and false alarms overwhelming conventional techniques, the necessity for smarter, extra dependable safety has by no means been extra pressing. Stepping as much as meet this demand, Hakimo, a Menlo Park-based AI safety startup, has introduced a $10.5 million Collection A funding spherical to supercharge its mission of remodeling bodily safety via autonomous, AI-powered monitoring.

Led by Vertex Ventures and Zigg Capital, with extra backing from RXR Arden Digital Ventures, Defy.vc, and Gokul Rajaram, the newest spherical brings Hakimo’s complete funding to $20.5 million.

Meet the AI Operator: A Human-Like Autonomous Safety Agent

Hakimo has formally launched the AI Operator, a first-of-its-kind autonomous safety agent that may monitor cameras, detect intrusions, reply to incidents, and even difficulty verbal warnings—identical to a human guard. However in contrast to people, it by no means will get drained, by no means misses a body, and reacts inside seconds.

This isn’t your commonplace movement detection software program. On the core of the AI Operator is a strong mix of laptop imaginative and prescient and generative AI, enabling it to not solely see but in addition perceive and reply to advanced situations described in pure language. Whether or not it is figuring out an individual loitering close to a restricted space or detecting tailgating at an entry level, Hakimo’s AI is constructed to interpret and act on safety occasions in actual time.

And when incidents escalate, Hakimo’s human-in-the-loop system ensures that skilled safety professionals step in to deal with essential threats—making a seamless synergy between machine intelligence and human judgment.

From Stanford Analysis to Actual-World Influence

Hakimo was based in 2020 by Sam Joseph and Sagar Honnungar, two Stanford-trained AI researchers who noticed a chance to use the newest developments in machine studying to a stagnating trade. Impressed by falling {hardware} prices, widespread surveillance digital camera deployment, and breakthroughs in laptop imaginative and prescient, they constructed a workforce to rethink bodily safety from the bottom up.

The consequence? A platform that integrates straight with current ONVIF-compliant safety techniques, requires no expensive {hardware} upgrades, and will be deployed throughout a number of websites in days—not months.

Why Now?

Conventional safety approaches are more and more unsustainable. Guards are costly, tough to rent, and infrequently unable to offer constant protection. Alarm monitoring companies are tormented by false positives, inflicting delays or full lack of police response. Hakimo’s answer arrives at a time when companies are demanding real-time, dependable, and reasonably priced safety.

By combining AI pace with human reliability, Hakimo delivers a compelling various. For purchasers like Kia Santa Maria, the shift was instant. “We received a drastic discount in trespassing proper after deploying Hakimo,” mentioned Rodrigo Duran, the dealership’s Common Supervisor. “I now sleep higher at night time with the peace of thoughts offered by Hakimo’s AI agent.”

Scaling Throughout Industries

Hakimo isn’t only for high-security amenities. Its platform is already trusted by greater than 100 prospects, together with Fortune 500 corporations, automotive dealerships, building websites, company places of work, and self-storage amenities. The system has monitored over 5 million hours of footage and, in 2024 alone, prevented hundreds of safety incidents, assisted regulation enforcement in arrests, and even saved lives.

From tailgating detection (an often-overlooked bodily safety menace) to digital camera well being monitoring and automatic alarm triage, Hakimo supplies actionable insights that conventional techniques merely cannot match. Its software program not solely detects threats however prioritizes them utilizing True Alarm Chance scores—dramatically decreasing false positives and operator fatigue.

A Platform Designed for the Future

Hakimo’s platform is engineered to evolve with its prospects. The system can monitor a number of websites concurrently, combine with software program like ServiceNow, Slack, and even cybersecurity SIEM instruments, providing a unified interface that bridges the hole between bodily and digital safety workflows.

It’s a drive multiplier for any enterprise trying to lower prices with out compromising security. The truth is, prospects report annual financial savings of as much as $125,000 when in comparison with conventional guard-based safety—and with median response instances of simply six seconds, it is easy to see why.

Buyers See a Class-Defining Alternative

“Hakimo is bringing ground-up technological innovation to the big however antiquated bodily safety trade,” mentioned Piyush Kharbanda, Common Companion at Vertex Ventures. “By coupling cutting-edge imaginative and prescient AI algorithms with the reliability of humans-in-the-loop, Hakimo delivers a 10x higher service at a fraction of the fee.”

For Ryan Orley, Managing Companion at Zigg Capital, the funding was private. “I turned a Hakimo buyer earlier than our agency’s funding. After finding out the safety monitoring ecosystem, our workforce concluded that Hakimo’s answer is extra strong and gives higher worth than every other expertise we encountered.”

The Highway Forward

With contemporary funding and rising momentum, Hakimo is poised to guide a change in how organizations method bodily safety. Its mission is bold: to make safety proactive, clever, and seamless—eliminating threats earlier than they escalate.

“The safety trade has lengthy been reactive and inefficient,” mentioned CEO Sam Joseph. “At Hakimo, we’re not simply enhancing it—we’re reinventing it.”

As threats develop extra advanced and budgets tighten, the necessity for AI-powered, autonomous safety brokers like Hakimo’s AI Operator is changing into not only a aggressive benefit—however a necessity.

React Native Header title would not take full width on ios


In my react native app I am noticing that my header factor is behaving otherwise on ios than android. I set the header title to width: 100% however on ios it nonetheless has appreciable margins on either side. You possibly can see within the code that I am attempting to separate the title to have two strings displayed within the header so I want to use all of the house I can get. I’ve bought a dummy string displaying for now to obviously present the margins and variations between the platforms. Nothing I do appears to get the title to take the complete width. I’ve some easy kinds on the dummy string however I’ve extra full kinds on the splitHeaderContainer and it behaves the identical.

I respect any assist, thanks.

See linked photos for readability

import React from 'react';
import {createBottomTabNavigator} from '@react-navigation/bottom-tabs';
import FontAwesome6 from 'react-native-vector-icons/FontAwesome6';
import {useTranslation} from 'react-i18next';
import {createNativeStackNavigator} from '@react-navigation/native-stack';
import sort {RootStackParamList} from './sorts';
import AuthorityDetailsScreen from '../screens/authorities/AuthorityDetailsScreen';
import ElectionsScreen from '../screens/elections/ElectionsScreen';
import SignersScreen from '../screens/signers/SignersScreen';
import AuthoritiesScreen from '../screens/authorities/AuthoritiesScreen';
import SettingsScreen from '../screens/settings/SettingsScreen';
import {ChipButton} from '../elements/ChipButton';
import {Pressable, StyleSheet, View, Textual content} from 'react-native';
import {ExtendedTheme, useNavigation} from '@react-navigation/native';
import {useTheme} from '@react-navigation/native';
import NetworksScreen from '../screens/networks/NetworksScreen';
import sort {NavigationProp} from './sorts';

const Stack = createNativeStackNavigator();
const Tab = createBottomTabNavigator();

perform SplitHeaderTitle() {
    const {colours} = useTheme() as ExtendedTheme;
    return (
        
            
                Current Network
            
            
                Username Username
            
        
    );
}

function useTabHeaderOptions() {
    const {colors} = useTheme() as ExtendedTheme;
    const navigation = useNavigation();

    const handleNetworkPress = () => {
        navigation.navigate('Networks');
    };

    return {
        headerLeft: () => (
            
                
            
        ),
        headerRight: () => (
            
                
            
        ),
        //headerTitle: () => ,
        headerTitle: () => (
            
                Hello this is a very long text to show how it cuts off
            
        ),
        headerShadowVisible: false,
    };
}

const TabNavigator = () => {
    const {colors} = useTheme() as ExtendedTheme;
    const {t} = useTranslation();
    const tabHeaderOptions = useTabHeaderOptions();

    return (
         ({
                tabBarIcon: ({focused, color, size}) => {
                    let iconName: string;

                    switch (route.name) {
                        case 'Elections':
                            iconName="check-to-slot";
                            break;
                        case 'Signers':
                            iconName="person";
                            break;
                        case 'Authorities':
                            iconName="shield";
                            break;
                        case 'Settings':
                            iconName="gear";
                            break;
                        default:
                            iconName="alert";
                    }

                    return ;
                },
                tabBarActiveTintColor: colors.primary,
                tabBarInactiveTintColor: 'gray',
            })}>
            
            
            
            
        
    );
};

const styles = StyleSheet.create({
    splitHeaderContainer: {
        flex: 1,
        flexDirection: 'row',
        justifyContent: 'space-between',
        alignItems: 'center',
        paddingHorizontal: 2,
        width: '100%',
    },
    headerText: {
        fontSize: 16,
        fontWeight: '500',
    },
    networkText: {
        flex: 1,
        textAlign: 'left',
        marginRight: 8,
    },
    usernameText: {
        flex: 1,
        textAlign: 'right',
        opacity: 0.7,
    },
    headerButton: {
        padding: 8,
        marginHorizontal: 4,
        marginVertical: -2,
    },
});

export const RootNavigator = () => {
    const {t} = useTranslation();

    return (
        
            
             (
                        
                    ),
                }}
            />
            
        
    );
};

Images:

android_ios_side_by_side

inspector_view

Awards shortlist flags next-generation leaders for Scotland’s renewable vitality sector



Awards shortlist flags next-generation leaders for Scotland’s renewable vitality sector

Greater than 300 folks to attend awards in Glasgow on 1 Could 

The long run leaders of Scotland’s renewable vitality business have been shortlisted at the moment (27 March) for this yr’s Younger Professionals Inexperienced Vitality Awards.

The annual awards, organised by Scottish Renewables, shine a highlight on the pioneers of tomorrow who’re able to disrupt the established order with their daring concepts and unstoppable ambition to reshape Scotland’s clear energy future.

Greater than 30 rising stars within the renewable vitality business have been shortlisted throughout eight classes together with:

  • Megan Martin, a Design Engineer at Tony Gee and Companions LLP, who took a lead function in designing Viking wind farm’s turbine foundations at each the optioneering and detailed design levels.
  • Obey Suleyman, a PhD scholar on the College of Strathclyde, whose pioneering analysis on the manufacture of wind turbine parts is advancing the sustainability of Scotland’s renewable vitality business.
  • Ben Younger, an engineer at SLR, who has been engaged on the event of export and inter array cable system designs.

The complete record of finalists is out there on Scottish Renewables’ web site.

The Younger Professionals Inexperienced Vitality Awards shall be offered at Radisson Blu Lodge, Glasgow, on 1 Could.

Claire Mack, Chief Government of Scottish Renewables, mentioned:

“The way forward for Scotland’s renewable vitality business is within the palms of a brand new wave of trailblazers as we see first-hand a brand new technology of leaders who’re actively shaping the way forward for our business.

“The Younger Professionals Inexperienced Vitality Awards recognise these on the forefront of this transformation which shall be essential in supporting the continued drive in the direction of a sustainable Scotland powered by clear vitality.

“To be nominated for these awards is a outstanding accomplishment in itself and I really hope this recognition will encourage every nominee to construct on the distinctive work they’ve already contributed to our business, paving the way in which for even higher achievements.”

Winners of the Younger Professionals Inexperienced Vitality Awards can even be put ahead for the Younger and Inspiring Award on the Scottish Inexperienced Vitality Awards later this yr.

The complete record of finalists is out there beneath:

Tutorial Award, sponsored by ETP

  • Millie Anderson, ORE Catapult
  • Connor Jordan, The College of Edinburgh
  • Jake Scott, Story Scotland
  • Obey Suleyman, AMRL, College of Strathclyde

Analyst Award, sponsored Ocean Winds

  • Marta Bera, Muir Mhòr Offshore Wind Farm
  • Martin Brown, WSP
  • Elizabeth Dimitrova, Renewable Components
  • Suzie Saunders, ScottishPower Renewables

Tradition Change Award

  • Hannah Belford, SSE Renewables
  • Isobel Inexperienced, SSEN Transmission
  • Millie Zagulak, Xodus

Engineer Award, sponsored by ESB

  • Isobel Inexperienced, SSEN Transmission
  • Megan Martin, Tony Gee and Companions LLP
  • Harry Ross, Tony Gee and Companions LLP
  • Ben Younger, SLR

Innovator Award          

  • Lewis Bates, SSEN Transmission
  • Megan Martin, Tony Gee and Companions LLP
  • Sian O’Malley, SSEN Transmission

Private Enchancment Award

  • Andrew Fischbacher, Ocean Winds
  • Cerys Gordon, Flotation Vitality
  • Reuben Sharp, LOC Rent
  • Kimberly Thomson, Scottish Enterprise
  • Adanna Ugo-Okoye, Statkraft

Skilled Service Award, sponsored by SLR

  • Hannah Belford, SSE Renewables
  • Kudakwashe Chinyani, CMS
  • Katie Forrest, IGNE
  • Chloe Giles, Pier Options
  • Megan Martin, Tony Gee and Companions LLP

Undertaking Growth Award    

  • Emanuele Dentis, Northland Energy
  • Rachel Forbes, BayWa r.e. UK
  • Ellen Kane, ScottishPower Renewables
  • Aleks Schmidt-Sweetingham, Ocean Winds

Prime 3 MS Workplace Exploits Hackers Use in 2025 – Keep Alert!

0


Prime 3 MS Workplace Exploits Hackers Use in 2025 – Keep Alert!

Hackers have lengthy used Phrase and Excel paperwork as supply autos for malware, and in 2025, these tips are removed from outdated. From phishing schemes to zero-click exploits, malicious Workplace information are nonetheless one of many best methods right into a sufferer’s system.

Listed here are the highest three Microsoft Workplace-based exploits nonetheless making the rounds this 12 months and what it is advisable know to keep away from them.

1. Phishing in MS Workplace: Nonetheless Hackers’ Favourite

Phishing assaults utilizing Microsoft Workplace information have been round for years, they usually’re nonetheless going robust. Why? As a result of they work, particularly in enterprise environments the place groups always change Phrase and Excel paperwork.

Attackers know that individuals are used to opening Workplace information, particularly if they arrive from what seems like a colleague, a shopper, or a accomplice. A faux bill, a shared report, or a job supply: it would not take a lot to persuade somebody to click on. And as soon as the file is open, the attacker has their probability.

Phishing with Workplace information usually goals to steal login credentials. These paperwork would possibly embody:

  • Hyperlinks to faux Microsoft 365 login pages
  • Phishing portals that mimic firm instruments or providers
  • Redirect chains that ultimately land on credential-harvesting websites

On this ANY.RUN malware evaluation session, an Excel file comprises malicious phishing hyperlink:

View evaluation session with Excel file

Excel file containing malicious hyperlink detected inside ANY.RUN sandbox

When clicked, the sufferer is taken to a webpage that reveals a Cloudflare “Confirm you are a human” verify.

CloudFlare verification handed with ANY.RUN’s automated interactivity

After clicking by, there’s one other redirect; this time to a faux Microsoft login web page.

Malicious hyperlink to faux Microsoft login web page with random characters

At first look, it’d look actual. However contained in the ANY.RUN sandbox, it is simple to identify pink flags. The Microsoft login URL is not official; it is stuffed with random characters and clearly would not belong to Microsoft’s area.

Give your staff the suitable software to detect, examine, and report threats quicker in a safe atmosphere.

Get a trial of ANY.RUN to entry superior malware evaluation

This faux login web page is the place the sufferer unknowingly palms over their login credentials straight to the attacker.

Attackers are additionally getting extra inventive. Recently, some phishing paperwork include QR codes embedded in them. These are supposed to be scanned with a smartphone, sending the sufferer to a phishing web site or triggering a malware obtain. Nonetheless, they are often detected and analyzed with instruments like ANY.RUN sandbox too.

2. CVE-2017-11882: The Equation Editor Exploit That Will not Die

First found in 2017, CVE-2017-11882 continues to be exploited in the present day, in environments operating outdated variations of Microsoft Workplace.

This vulnerability targets the Microsoft Equation Editor – a hardly ever used part that was a part of older Workplace builds. Exploiting it’s dangerously easy: simply opening a malicious Phrase file can set off the exploit. No macros, no further clicks wanted.

On this case, the attacker makes use of the flaw to obtain and run a malware payload within the background, usually by a distant server connection.

In our evaluation session, the payload delivered was Agent Tesla, a recognized info-stealer used to seize keystrokes, credentials, and clipboard information.

View evaluation session with malicious payload

Phishing e mail containing malicious Excel attachment

Within the MITRE ATT&CK part of this evaluation, we will see how ANY.RUN sandbox detected this particular approach used within the assault:

Exploitation of Equation Editor detected by ANY.RUN

Though Microsoft patched the vulnerability years in the past, it is nonetheless helpful for attackers concentrating on techniques that have not been up to date. And with macros disabled by default in newer Workplace variations, CVE-2017-11882 has develop into a fallback for cybercriminals who need assured execution.

3. CVE-2022-30190: Follina’s Nonetheless within the Sport

The Follina exploit (CVE-2022-30190) continues to be a favourite amongst attackers for one easy motive: it really works with out macros and would not require any consumer interplay past opening a Phrase file.

Follina abuses the Microsoft Assist Diagnostic Device (MSDT) and particular URLs embedded in Workplace paperwork to execute distant code. Which means simply viewing the file is sufficient to launch malicious scripts, usually PowerShell-based, that contact a command-and-control server.

View evaluation session with Follina

Follina approach detected inside ANY.RUN sandbox

In our malware evaluation pattern, the assault went a step additional. We noticed the “stegocampaign” tag, which signifies using steganography – a way the place malware is hidden inside picture information.

Use of Steganography within the assault

The picture is downloaded and processed utilizing PowerShell, extracting the precise payload with out elevating rapid alarms.

Picture with malicious payload analyzed inside ANY.RUN

To make issues worse, Follina is usually utilized in multi-stage assault chains, combining different vulnerabilities or payloads to extend the influence.

What This Means for Groups Utilizing MS Workplace

In case your staff depends closely on Microsoft Workplace for day-to-day work, the assaults talked about above ought to be a wake-up name.

Cybercriminals know Workplace information are trusted and extensively utilized in enterprise. That is why they proceed to use them. Whether or not it is a easy Excel sheet hiding a phishing hyperlink or a Phrase doc silently operating malicious code, these information can pose severe dangers to your group’s safety.

This is what your staff can do:

  • Overview how Workplace paperwork are dealt with internally; restrict who can open or obtain information from exterior sources.
  • Use instruments like ANY.RUN sandbox to examine suspicious information in a secure, remoted atmosphere earlier than anybody in your staff opens them.
  • Replace all Workplace software program commonly and disable legacy options like macros or the Equation Editor the place attainable.
  • Keep knowledgeable about new exploit strategies tied to Workplace codecs so your safety staff can reply shortly.

Analyze Cell Malware with ANY.RUN’s New Android OS Assist

The risk would not cease at Workplace information. Cell units at the moment are a key goal, and attackers are spreading malware by faux apps, phishing hyperlinks, and malicious APKs.

This implies a rising assault floor for companies and the necessity for broader visibility.

With ANY.RUN’s new Android OS assist, your safety staff can now:

  • Analyze Android malware in an actual cellular atmosphere
  • Examine suspicious APK conduct earlier than it hits manufacturing units
  • Reply to cellular threats quicker and with extra readability
  • Assist incident response throughout each desktop and cellular ecosystems

It is a huge step towards full protection and it is out there on all plans, together with free.

Begin your first Android risk evaluation in the present day and provides your safety analysts the visibility they should shield your cellular assault floor.

Discovered this text fascinating? This text is a contributed piece from one among our valued companions. Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



G2 Names INE 2025 Cybersecurity Coaching Chief

0


INE, a worldwide chief in networking and cybersecurity coaching and certifications, is proud to announce it’s the recipient of twelve badges in G2’s Spring 2025 Report, together with Grid Chief for Cybersecurity Skilled Improvement, On-line Course Suppliers, and Technical Expertise Improvement, which spotlight INE’s superior efficiency relative to opponents. 

“INE solves the issue of accessible, hands-on safety coaching with structured studying paths and real-world labs,” says SOC Analyst Sai Tharun Ok. “It helps bridge the hole between concept and sensible abilities. For me, it has been very helpful in refining my penetration testing, cloud safety, and risk evaluation abilities.”

G2 calculates rankings utilizing a proprietary algorithm sourced from verified evaluations of precise product customers and is a trusted overview supply for 1000’s of organizations all over the world. Its recognition of INE’s sturdy efficiency in enterprise, small enterprise, and international affect for technical coaching showcases the depth and breadth of INE’s on-line studying library

“We’re extremely proud to as soon as once more be on the forefront of the coaching trade, acknowledged by G2 customers in a time when cyber threats are escalating in each frequency and complexity,” mentioned Dara Warn, CEO of INE. “This recognition displays our dedication to offering coaching that not solely retains tempo with however anticipates the dynamic intersection of cybersecurity with networking, cloud companies, and broader IT disciplines. At INE, we imagine deeply in equipping professionals and organizations with the sturdy, up-to-date abilities essential to navigate and safe immediately’s quickly altering digital landscapes. An enormous thanks to our devoted group and learners, who’re important in our mission to remodel cybersecurity coaching to fulfill the pressing calls for of the present atmosphere.”

INE’s G2 Spring 2025 Report highlights embody:

  • Momentum Chief, Cybersecurity Skilled Improvement
  • Momentum Chief, On-line Course Suppliers
  • Momentum Chief, Technical Expertise Improvement
  • Grid Chief, Cybersecurity Skilled Improvement
  • Grid Chief, On-line Course Suppliers
  • Grid Chief, Technical Expertise Improvement
  • Regional Chief, Europe On-line Course Suppliers
  • Regional Chief, Asia On-line Course Suppliers
  • Regional Chief, Asia Pacific On-line Course Suppliers
  • Grid Chief, Small-Enterprise Technical Expertise Improvement
  • Grid Chief, Small-Enterprise On-line Course Suppliers
  • Excessive Performer, India On-line Course Suppliers

“INE’s hands-on labs and real-world eventualities have helped me refine by abilities,” mentioned Leonard R.G., a Pentesting Guide. “INE is fixing the hiring points most HR individuals have when they’re hiring cybersecurity staff,” provides Batuhan A., a Cyber Safety Researcher. 

In 2024, the celebrated SC Awards acknowledged INE Safety, INE’s cybersecurity-specific coaching, because the Greatest IT Safety-Associated Coaching Program. This designation additional underscores INE Safety’s function as a frontrunner in cybersecurity coaching for companies, offering the instruments and data important for tackling immediately’s advanced cyber threats.

INE Safety was additionally offered with 4 awards from World InfoSec Awards at RSAC 2024, together with: 

  • Greatest Product – Cybersecurity Schooling for Enterprises
  • Most Revolutionary – Cybersecurity Schooling for SMBs
  • Writer’s Alternative – Cybersecurity Coaching
  • Slicing Edge – Cybersecurity Coaching Movies

Mixed, these accolades spotlight INE’s management in delivering revolutionary and efficient networking and cybersecurity schooling throughout numerous market segments, together with enterprises and small to medium-sized companies.

About INE Safety

INE Safety is the premier supplier of on-line networking and cybersecurity coaching and certification. Harnessing a robust hands-on lab platform, cutting-edge know-how, a worldwide video distribution community, and world-class instructors, INE Safety is the highest coaching selection for Fortune 500 corporations worldwide for cybersecurity coaching in enterprise and for IT professionals seeking to advance their careers. INE Safety’s suite of studying paths gives an incomparable depth of experience throughout cybersecurity and is dedicated to delivering superior technical coaching whereas additionally reducing the obstacles worldwide for these seeking to enter and excel in an IT profession.

Disclaimer: It is a sponsored press launch distributed by CyberNewswire, PR syndication platform for cybersecurity corporations. Cyber Safety Information doesn’t endorse or take duty for its content material, accuracy, high quality, promoting, merchandise, or any associated supplies.