• 9TO5MAC.COM
    Security Bite: Why email security is still so bad
    Its a little-known fact that before emails reach your inbox, they pass through a buffer designed to scan and block malicious content. However, over time, email providersespecially Gmailhave shifted their focus to just adding warning labels to those with suspicious links or attachments. This approach, best described as beating around the bush hasnt reduced threats much at all. Shockingly, 91% of all cyberattacks still originate from emails. So, what gives?9to5Mac Security Bite is exclusively brought to you by Mosyle,the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.First, lets look at how bad things currently are.In an earlier Security Bite, I discussed a study by web browser security startup SquareX that revealed just how little companies are doing to block malicious attachments and protect users.The team of researchers took several different types of malware samples, attached them to emails, and sent them through Proton Mail to addresses on iCloud Mail, Gmail, Outlook, Yahoo! Mail, and AOL, part of the Yahoo! group. Notably, if the emails were delivered successfully to the users, they might be vulnerable to any potential threat contained within those attachments.The table below summarizes the results of sending 7 of the 100 malicious samples to the various email providers, indicating whether the malicious attachment was delivered. If an email was undelivered, it is a sign that malware was detected when the email was being processed by the server, according to the study from SquareX.Table showing what malware samples passed which email providers scanners and were delivered successfully.Image: SquareXThe dilemmaInvesting in robust email security features may seem like the obvious critical part of protecting users. However, Ian Thornton-Trump, CISO with threat intelligence solutions firm Cyjax, told Forbes, this is akin to asking the free Wi-Fi at a Starbucks why are they not blocking more or all cyber attacks. He further explained that its tough to balance free and secure in the same sentence.Thornton-Trump argues that adding advanced email security features can be deeply problematic with false positives, which may involve the use of technical support resources to help or fixthat expense across millions of users on a free platform may be commercially untenable.Moreover, others argue that email providers are dragging their feet on something that could cost substantial resources and impact their bottom line. While not specifically framed as for blocking spam, iOS 18, iPadOS 18, and macOS 15 offer better categorization and summaries of emails, thanks to Apple Intelligence, making it easier to reduce clutter and identify whats important.Ill be interested to see if Apple ever integrates any other AI security features into the Mail app. Using Apple Intelligence to better warn users or outright remove malicious attachments and URLs from emails in real-time could be killer.Im curious to hear your thoughts. Please tell me you are not still using AOLAbout Security Bite: Security Bite is a weekly security-focused column on 9to5Mac. Every week, Arin Waichulis delivers insights on data privacy, uncovers vulnerabilities, or sheds light on emerging threats within Apples vast ecosystem of over 2 billion active devices to help you still safe.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Commentaires 0 Parts 42 Vue
  • 9TO5MAC.COM
    9to5Mac Daily: November 18, 2024 Next-gen AirTag, ChatGPT upgrades
    Listen to a recap of the top stories of the day from9to5Mac. 9to5Mac Daily is availableon iTunes and Apples Podcasts app,Stitcher,TuneIn,Google Play, or through ourdedicated RSS feedfor Overcast and other podcast players.Sponsored by CardPointers: The best way to maximize your credit card rewards. 9to5Mac Daily listeners can exclusively save 50%.New episodes of 9to5Mac Daily are recorded every weekday. Subscribe to our podcast in Apple Podcast or your favorite podcast player to guarantee new episodes are delivered as soon as theyre available.Stories discussed in this episode:Listen & Subscribe:Subscribe to support Chance directly with 9to5Mac Daily Plus and unlock:Ad-free versions of every episodeBonus contentCatch up on 9to5Mac Daily episodes!Dont miss out on our other daily podcasts:Share your thoughts!Drop us a line at happyhour@9to5mac.com. You can also rate us in Apple Podcasts or recommend us in Overcast to help more people discover the show.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Commentaires 0 Parts 42 Vue
  • FUTURISM.COM
    The CEO of Bluesky's Actual Name Means "Blue Sky" in Chinese
    It was meant to be.Prophecy ForetoldTwitter alternative Bluesky has skyrocketed in popularity ever since Donald Trump was reelected as US president earlier this month. Over the last week alone, its user base doubled to 15 million users,then blew past 19.5 million.The small team behind the operation is racing to keep up with the serious influx."We as a team take pride in our ability to scale quickly," CEO Jay Graber told the New York Times in an interview. "But theres always some growing pains."Interestingly, Graber was practically destined for the job. Her mother, who grew up in China during the Cultural Revolution and moved to the United States in the 1980s, named her "Lantian" in Mandarin which literally translates to "blue sky."Bluer SkiesIn a Forbes profile last year, Graber recalled that her mother called her Lantian "because she wanted me to have boundless freedom. The opportunities she didn't have."The 33-year-old tech exec was already part of Bluesky's developer team when Parag Agrawal, who would go on to become the CEO of Twitter before getting fired by new owner Elon Musk, offered her the opportunity to lead the microblogging platform in 2021.The company, however, wasn't named after Graber. Bluesky founder Jack Dorsey, who also started Twitter, originally came up with the moniker in 2019,two years before Graber came on board.The social media landscape has gone through some tremendous changes since Graber took over the reins. Perhaps the biggest wildcard came when mercurial businessman Elon Musk acquired Twitter for a whopping $44 billion, quickly turning it into a largely unrecognizable echo chamber of hate speech and disinformation.Especially now that Musk has thrown his full weight behind president-elect Donald Trump, an unprecedented number of users are looking for new stomping grounds, including Bluesky.The exodus hit its peak the day after the presidential election, with more than 116,000 people deactivating their X accounts in the US, setting a new record.Meanwhile, Bluesky feels more vibrant than ever before.For her part, Graber has prioritized coming up with new features that actually further the interest of average users, like sorting new content using custom algorithms a far cry from X, where Musk has instructed staff to prioritize his own tweets and conservative content.Even when it comes to generative AI, Bluesky appears to be putting the interest of users first, with the company promising on Friday that it wouldn't leverage users' content to train large language models. That's a stark contrast to X, which went behind users' backs to reserve the right to use their tweets to train AI models whether they opt out or not."The state of most social platforms right now is that users are locked in and developers are locked out," Graber told the NYT. "We want to build something that makes sure users have the freedom to move and developers have the freedom to build."Share This Article
    0 Commentaires 0 Parts 37 Vue
  • FUTURISM.COM
    Scientists Say Aliens May Be Hiding in the Multiverse
    "We may not live in the most likely of universes."Into the SETIverseScientists suggest that the reason why we have yet to find aliens could be that they're hiding in a parallel universe.As detailed in a new paper published in the journal Monthly Notices of the Royal Astronomical Society, a team led by Durham University astrophysicist Daniele Sorini devised a new take on the Drake equation.The equation was formulated by astronomer Frank Drake in the 1960s to estimate the number of active and detectable alien civilizations in our galaxy. It takes a number of factors into consideration, including the average rate of star formation, the potential number of habitable planets, and the proportion of them that could develop intelligent life.Sorini and his team, however, suggest reframing the equation by considering the possibility of parallel universes that may be more likely to host intelligent life than our own a galaxy-brained concept that could help explain why we have yet to make first contact.Darkest TimelineSorini's team suggests that some universes would have a more optimal density of dark energy, the mysterious stuff that scientists believe is driving the accelerated expansion of the universe.Specifically, they found that a universe where the density of dark energy allows for 27 percent of ordinary matter to be turned into stars would be most likely to allow for alien life to develop. That's compared to just 23 percent in our universe, meaning our universe is at a disadvantage for developing life."Surprisingly,"Sorini said in a statement about the paper, "we found that even a significantly higher dark energy density would still be compatible with life, suggesting we may not live in the most likely of universes,"Sure, the idea that aliens are hiding out in the multiverse is preposterous on its face, like the premise to a last-ditch Marvel sequel. But Sorini and his collaborators frame it as an effort to reconcile the more exotic implications of modern physics with the search for life beyond Earth and you have to admit that, at the very least, it's a fun idea."Understanding dark energy and the impact on our universe"It will be exciting to employ the model to explore the emergence of life across different universes and see whether some fundamental questions we ask ourselves about our own universe must be reinterpreted," coauthor and Universit de Genve cosmology professor Lucas Lombriser added.More on the multiverse: Dark Matter May Be a Deformed Mirror Universe, Scientists SayShare This Article
    0 Commentaires 0 Parts 38 Vue
  • THEHACKERNEWS.COM
    Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
    Nov 19, 2024Ravie LakshmananCyber Espionage / Data BreachU.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.The adversaries, tracked as Salt Typhoon, breached the company as part of a "monthslong campaign" designed to harvest cellphone communications of "high-value intelligence targets." It's not clear what information was taken, if any, during the malicious activity."T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been impacted in any significant way, and we have no evidence of impacts to customer information," a spokesperson for the company was quoted as saying to The Wall Street Journal. "We will continue to monitor this closely, working with industry peers and the relevant authorities."With the latest development, T-Mobile has joined a list of major organizations like AT&T, Verizon, and Lumen Technologies that have been singled out as part of what appears to be a full-blown cyber espionage campaign.So far, the reports make no mention of the degree to which these attacks saw success, whether any kind of malware was installed, or what kinds of information they were after. Salt Typhoon's unauthorized access to Americans' cellular data records was previously disclosed by Politico.Last week, the U.S. government said its ongoing investigation into the targeting of commercial telecommunications infrastructure revealed a "broad and significant" hack orchestrated by the People's Republic of China (PRC)."PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders," it said.It further warned that the extent and scope of these compromises could grow as the probe continues.Salt Typhoon, which is also known as Earth Estries, FamousSparrow, GhostEmperor, and UNC2286, is said to have been active since at least 2020, according to Trend Micro. In August 2023, the spy crew was linked to a series of attacks aimed at government and technology industries based in the Philippines, Taiwan, Malaysia, South Africa, Germany, and the U.S.Analysis shows that the threat actors have methodically crafted their payloads and made use of an interesting combination of legitimate and bespoke tools and techniques to bypass defenses and maintain access to their targets."Earth Estries maintains persistence by continuously updating its tools and employs backdoors for lateral movement and credential theft," Trend Micro researchers Ted Lee, Leon M Chang, and Lenart Bermejo said in an exhaustive analysis published earlier this month."Data collection and exfiltration are performed using TrillClient, while tools like cURL are used for sending information to anonymized file-sharing services, employing proxies to hide backdoor traffic."The cybersecurity company said it observed two distinct attack chains employed by the group, indicating the tradecraft that Salt Typhoon has in its arsenal is broad as it's varied. Initial access to target networks is facilitated by exploiting vulnerabilities in outside-facing services or remote management utilities.In one set of attacks, the threat actor has been found taking advantage of vulnerable or misconfigured QConvergeConsole installations to deliver malware such as Cobalt Strike, a custom Go-based stealer called TrillClient, and backdoors like HemiGate and Crowdoor, a variant of SparrowDoor which has been previously put to use by another China-linked group called Tropic Trooper.Some of the other techniques include the use of PSExec to laterally install its backdoors and tools, and TrillClient to collect user credentials from web browser user-profiles and exfiltrate them to an attacker-controlled Gmail account via the Simple Mail Transfer Protocol (SMTP) to further its objectives.The second infection sequence, in contrast, is a lot more sophisticated, with the threat actors abusing susceptible Microsoft Exchange servers to implant the China Chopper web shell, which is then used to deliver Cobalt Strike, Zingdoor, and Snappybee (aka Deed RAT), a suspected successor to the ShadowPad malware."Delivery of these additional backdoors and tools is done either via a [command-and-control] server or by using cURL to download them from attacker-controlled servers," the researchers said. "These backdoor installations are also periodically replaced and updated.""The collection of documents of interest are done via RAR and are exfiltrated using cURL, with the data being sent to anonymized file sharing services."Also utilized in the attacks are programs like NinjaCopy to extract credentials and PortScan for network discovery and mapping. Persistence on the host is accomplished by means of scheduled tasks.In one case, Salt Typhoon is also believed to have repurposed a victim's proxy server to forward traffic to the actual command-and-control (C2) server in an attempt to conceal the malicious traffic.Trend Micro noted that one of the infected machines also harbored two additional backdoors named Cryptmerlin, which executes additional commands issued by a C2 server, and FuxosDoor, an Internet Information Services (IIS) implant that's deployed on a compromised Exchange Server and is also designed to run commands using cmd.exe."Our analysis of Earth Estries' persistent TTPs in prolonged cyber operations reveals a sophisticated and adaptable threat actor that employs various tools and backdoors, demonstrating not only technical capabilities, but also a strategic approach to maintaining access and control within compromised environments," the researchers said."Throughout their campaigns, Earth Estries has displayed a keen understanding of their target environments, by continually identifying exposed layers for re-entry. By using a combination of established tools and custom backdoors, they have created a multi-layered attack strategy that is difficult to detect and mitigate."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Commentaires 0 Parts 36 Vue
  • THEHACKERNEWS.COM
    Warning: VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation
    Nov 19, 2024Ravie LakshmananVulnerability / Data SecurityNow-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog. It was addressed by Progress Software back in February 2024."Progress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution," the agency said.Rhino Security Labs, which discovered and reported the flaw, said successful exploitation enables command execution on LoadMaster should an attacker have access to the administrator web user interface, granting them full access to the load balancer.CISA's addition of CVE-2024-1212 coincides with a warning from Broadcom that attackers are now exploiting two security flaws in the VMware vCenter Server, which were demonstrated at the Matrix Cup cybersecurity competition held in China earlier this year.The flaws, CVE-2024-38812 (CVSS score: 9.8) and CVE-2024-38813 (CVSS score: 7.5), were originally resolved in September 2024, although the company rolled out fixes for the former a second-time last month, stating the previous patches "did not fully address" the problem.CVE-2024-38812 - A heap-overflow vulnerability in the implementation of the DCERPC protocol that could permit a malicious actor with network access to obtain remote code execution CVE-2024-38813 - A privilege escalation vulnerability that could permit a malicious actor with network access to escalate privileges to rootWhile there are currently no details on the observed exploitation of these vulnerabilities in real-world attacks, CISA is recommending that Federal Civilian Executive Branch (FCEB) agencies remediate CVE-2024-1212 by December 9, 2024, to secure their networks.The development comes days after Sophos revealed that cybercrime actors are actively weaponizing a critical flaw in Veeam Backup & Replication (CVE-2024-40711, CVSS score: 9.8) to deploy a previously undocumented ransomware called Frag.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Commentaires 0 Parts 37 Vue
  • SCREENCRUSH.COM
    Dan Aykroyd Says Original Ghostbusters Cast Is Likely Retired
    It appears that we have seen the last of the old schoolGhostbusters on the big screen.Thats according to Dan Aykoyd, who co-created the franchise with the late Harold Ramis, and who appeared in the movies as Ghostbuster Ray Stanz. Speaking to theNew York Postabout his new TV showThe UnBelievable with Dan Aykroyd, the 72-year-old writer/star/vodka maven said that he believed the cast would not return for a fifth movie any time soon.I dont see that coming, he said in response to a question about whether he and GhostbustersstarBill Murray would appear in future installments.He added...I dont see where they would need us to carry it on ... Theyve got a whole new cast, and theyve got whole new ideas.SonySonyloading...READ MORE: We Ate All FourGhostbustersKrispy Kreme DonutsAykroyd, Murray, Ramis, and Ernie Hudson appeared in two hugely successfulGhostbusters films in the 1980s, both directed by the late Ivan Reitman. Then Reitman, Ramis, and Aykroyd spent years trying to get a thirdGhostbusters movie off the ground. It took decades for it to happen (and in the meantime, Paul Feig made a contentious reboot of the property, featuring a new cast of female comic stars like Kristen Wiig and Melissa McCarthy).When the third film finally got made in 2021, Reitmans son Jason Reitman took over the helm and mostly brought in a new cast, including Carrie Coon as Ramis characters daughter, and Finn Wolfhard and Mckenna Grace as her kids. The surviving Ghostbustersactors appeared in cameos at the end of the movie, and then they returned in larger roles for 2024sGhostbusters: Frozen Empire.In that film (directed by Gil Kenan, with Jason Reitman now serving as co-writer/producer), Coons family, plus Paul Rudd as their science teacher buddy, become New Yorks new Ghostbusters; Aykroyd, Murray, Hudson as well as Annie Potts, the Ghostbusters former secretary Janine, allshowed up in a few scenes to help them with their latest case.While all the O.G. stars survived Frozen Empiresbig final fight with an ice-related ghost, the movie also firmly established Coon, Rudd, and the rest of the new cast as the focal point of the franchise moving forward.If it moves forward;Frozen Empireonly grossed about $200 million worldwide against a reported budget of $100 million. Whether thats good enough to get another sequel made remains to be seen.In the meantime, Reitman and Kenan are currently developing a newGhostbusters animated series for Netflix. And wouldnt you know it?Ghostbusters: Frozen Empireis currently streaming on Netflix as well.Get our free mobile appThe Weirdest Ghostbusters Merchandise
    0 Commentaires 0 Parts 34 Vue
  • SCREENCRUSH.COM
    Can You Name These Iconic TV Shows From Just One Freeze-Frame?
    Some of us will recall the days when TV show openings were like little shows themselvesthey set the tone, told a bit of the story, and even included a catchy theme song.Back then, you couldnt skip ahead unless you were time-shifting on your VCR (remember that?), and you might have even used that time to run to the kitchen for a snack.Skip Intro? Not When Theyre This Good!M*A*S*H Series Opening Sequence20th Century Fox Televisionloading...This iconic dramedy featured a haunting theme song and became the unofficial bedtime signal for a generation of kids. Keep scrolling to see if you guessed it right.These intros set the stage, introduced the characters, and even summarized some of the previous episodes.RELATED: Can You Identify These Iconic TV Show Homes?Something changed in the 90s. Seinfeld flipped the script when the show went completely open-less, with only a few funky bass chords to signal the start. Funnily enough, the show about nothing began with pretty much nothing.Fast forward to today, and with the advent of prestige TV (serious tone, high production value, complex storylines), opening sequences have become an art form in their own right.Series like True Detective, Game of Thrones, and The Crown have invested so much in their openings that some fans refuse to skip them (even though most streaming platforms now offer the option). Go big, or be forgotten.QUIZ: Can You Guess the Iconic TV Show From Just One Opening Freeze-Frame?Think youre the ultimate TV fan? How well do you know your classic TV intros? Put your knowledge to the test with our quiz. Well show you a freeze-frame from the opening credits of an iconic TV showtake your best guess, then scroll to see if you were right and watch the full opening. Good luck!Gallery Credit: Stephen LenzREAD MORE: 10 TV Shows Everyone Loves That Are Actually BadGet our free mobile app10 Once-Beloved TV Shows That Have Faded AwayThe history of television is littered with once-beloved series that are now all but forgotten.
    0 Commentaires 0 Parts 33 Vue
  • WEWORKREMOTELY.COM
    Tidio: Customer Success Manager (US-based clients)
    Time zones: EST (UTC -5), CST (UTC -6), MST (UTC -7), PST (UTC -8), AKST (UTC -9), HST (UTC -10), ART (UTC -3), UTC -4, UTC -4:30, UTC -3, UTC -2, SBT (UTC +11), GMT (UTC +0), CET (UTC +1), EET (UTC +2), MSK (UTC +3), AST (UTC -4), FKST (UTC -3), NST (UTC -3:30)Location: Europe/US/LATAM remote.Form of employment: Contract of employment or B2B contract (self-employed).We are a fast-growing tech company created by experienced international talents. Our product is a top-rated online platform for small and medium businesses to grow sales through outstanding customer service. Our goal is to create a frictionless customer experience for individual users and, at the same time, help entrepreneurs worldwide grow their businesses by giving them access to a top-notch AI-driven tool.Working at Tidio means impacting thousands of companies and millions of their users. But our clients are not the only ones who can grow with us. By joining Tidio, you can grow, too!A few facts about us:Our product is one of the world's leading AI customer service solutions, and our goal is to become no. 1.We are among the Top 50 AI and Customer Service Products in G2s Best Software Awards 2024.We currently rate at 4.7/5 in both Shopify and G2.The new Tidio AI feature (Lyro) answers up to 70% of customers questions in seconds and is available to users even on a free plan. Its a real AI revolution! Every month, our widget is viewed by 350 million unique users, which is 4% of the global population.Currently, we hire over 170 fantastic people.In March 2022 we secured $25 mln in a Series B Investment round (read TechCrunchs article to learn more)In June 2023, our monthly MRR exceeded $1M.By joining Tidio as a Customer Success Manager, you will become a crucial member of our 4 - international people team and help us drive adoption for our B2B customers located in North America who use Tidio.As the Customer Success Manager, you will:Build relationships with our top clients.Serve US-based clients with the availability for video calls in the PDT zone (9 AM to 5 PM).Identify client needs and deploy solutions.Conduct video training and showcase new features.Drive adoption of our product and encourage best practices.Identify opportunities for growth.Oversee a large book of business.Influence retention, expansion and churn rate for your clients.Create automation and flows within our success software that supports your efforts.Report on activities and results.Collect strategic feedback and share it internally.Create impactful emails and outreach campaigns for your book of business.You are the perfect fit if you have:Ability to cover PTD zone (9 AM to 5 PM) from Monday to Friday.English proficiency at C2 level or equivalent.At least 2 years of previous professional experience in a SaaS customer success role.Ability to build mutually beneficial relationships.Great understanding of how to use and teach others to use the software.Experience with customer success or sales tools (Gainsight, Totango, ChurnZero, Salesforce, Hubspot).A good understanding of industry-standard KPIs (churn rate, retention rate, net dollar retention).A good understanding of customer experience tools and the industry.We would like to offer you:A chance to work with one of the top products in the customer experience industry.Work with an experienced and international team that continually shares knowledge and is not afraid of testing new solutions.Great development opportunities company-supported courses and conferences.Contract form according to your preferences (B2B or contract of employment).Remote-first work with flexible hours.26 days off guaranteed in a year.Possibility to work 100% remotely or book a Regus coworking space in your city.Individual work tools Macbook Pro, Dell screen, JBL headphones? You can tailor the equipment to your needs.Sport & wellness benefit or its financial equivalent.Mental well-being program individual therapy sessions and resources for employees.Free access to one of the most popular e-book/audiobook services.Regular integration events (company-wide meetings, team events).What happens when you send your CV?Video call with a recruiter about the position and the team.A recruitment assignment.Interview with the Hiring Manager and the recruiter.Offer and fireworks ;)Don't hesitate and apply right away!Diversity StatementOne of Tidios core values is to play fair. Therefore, we treat all candidates equally. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, or disability status. This means recruitment and selection of talent to Tidio is only based on individual merit and qualifications directly related to professional competence.
    0 Commentaires 0 Parts 50 Vue
  • WEWORKREMOTELY.COM
    Humanly Inc: Marketing Manager
    As a marketing manager, you will craft strategies that resonate with our customers, identify new growth opportunities, build and expand our customer base, improve our brand visibility, generate traffic and convert qualified leads to revenue. Collaborating with our team, youll ensure a smooth customer journey from initial engagement to conversion and retention.As one of the earliest team members you will play a pivotal role in shaping the future of AnyDB and have a chance to directly impact our growth. As we grow, so will your opportunities. This role comes with significant room for advancement, allowing you to expand your skill set, take on new challenges, and help guide our marketing strategy at a higher level.Key ResponsibilitiesUnderstand the customer : You will understand the ideal customer profile and understand key customer use cases, pain points and how to reach these customers.Growth Strategy Development: You will craft strategies that resonates with customers and implement a strategy that leverages multi-channel campaigns, including content marketing, paid media, social media, SEO, and email marketing, to drive and nurture leads through the sales funnel.Understand the market: You will understand the market space and key competitors, their pricing and how to create a differentiated messaging that stands apart effectively from the competitionExperimentation: Design and conduct experiments to continuously optimize conversion rates and the overall user experience.Customer Journey Optimization: Work closely with product and UX/UI teams to ensure a smooth and engaging user journey, from the initial website visit through onboarding, retention, and conversion.Data Analysis & Insights: Use data analytics tools to monitor key performance metrics, generate actionable insights, and inform campaign decisions.Who we are looking forHave a passion for technology and enjoys working a fast-moving startup environmentBe comfortable being hands-on, detail oriented and capable of both tactical and strategic thinkingTruly care about getting things done and sincere about the work they doHave strong English communication skillsHave a solid understanding of product marketing and how marketing channels workPrior experience in marketing or growth related to SaaS is a plusPrior experience with SEO optimization is a plusPrior experience with various marketing tools/software is a plusA degree in business or marketing (or equivalent experience)Benefits & PerksFully RemoteCompetitive Salary (based on experience)Flexible vacation time (and your birthday is always a holiday)Laptop/Hardware providedLunch on us every weekPersonal Internet costs on us every monthAnnual education and professional development stipendPerformance-based equity optionsOpportunity to work on ideas that will change the worldHiring ProcessSubmit your resumeIf you are a good fit, we will request you to write a 1-page brief about a topicInterview and Decision
    0 Commentaires 0 Parts 51 Vue