• Something Has Gone Seriously Wrong With Cybertruck Production
    futurism.com
    A different kind of Cyber-stuck.Batteries Not IncludedLast week, Tesla told workers on its Cybertruck line not to come into work and now, it looks like we know why.As Business Insiderreports based on interviews with people who work on that line, a battery supply issue has caused Cybertruck production to be "backed up" in recent weeks as the company is "working out the kinks" on its mega-popular if not somewhat raggedy new vehicle.In a memo viewed byBI and used in its prior reporting, Tesla told Cybertruck employees they "didn't need" to come into work between December 3 and 5. Though they were told they would be paid for eight hours of work during that time away from the line, no official reason was given in the memo.According to five workers on that line, the schedules for Cybertruck workers have been inconsistent since the end of October. And if you're counting down the minutes until the company solves the issue, at least one of those employees told the website they were looking for a new job as a result.Production ProblemsIn the year since Tesla began delivering its polygonal trucks to its long-suffering customers, there has been at least one additional instance of production line snags related to the company's ability to make enough of its bespoke 4680 batteries to meet demand.Just under a year ago,Reuters reported based on several insider sources that Tesla was having trouble ramping up production of the giant cylindrical power cells, which are also used in its Model Y cars, to meet the demand posed by the extensive Cybertruck waitlist. At the time, the company's Giga Texas factory was only making enough of the batteries to produce 24,000 Cybertrucks per year about one-tenth the size of its required output, per the outlet's number-crunching.Though 4680 production did increase as the year went on, Texas Tesla workers who were working 12-hour shifts when Cybertrucks were first being delivered had their hours cut in April and workers who spoke toBI for this more recent story said further reductions have taken place in the interim as well.Critics have long claimed that Tesla's 4680 batteries were doomed to fail, and reporting from The Information over the summer suggested that Elon Musk gave his battery team til year's end to handle its production problems.With this latest leak, it appears that that deadline may not have been met and asThe Information's report also suggested, Musk may soon give up on its pioneering battery in favor of one that's easier to make.More on Cybertrucks: The Value of Used Cybertrucks Is in FreefallShare This Article
    0 Commentarii ·0 Distribuiri ·102 Views
  • NASA's Moon Landing Gets Pushed Back Yet Again
    futurism.com
    The waiting has only begun.Expect DelaysNASA's efforts to return astronauts to the Moon are facing even more delays.The space agency's outgoing administrator Bill Nelson announced today that the upcoming crewed Artemis II mission around the Moon and back won't take place until April 2026. Meanwhile, Artemis III the first scheduled return to the lunar surface has been delayed from 2026 to mid-2027.It's only the latest in a long series of delays for NASA's Artemis Moon program, which was established during president-elect Donald Trump's first administration, and shows yet again that the agency is facing considerable headwinds.It's also a somewhat anti-climatic development, given that Nelson is set to leave the agency when Trump returns to the White House in just over a month's time.Nelson will be replaced by billionaire tech founder and SpaceX space tourist Jared Isaacman, who was appointed to the job earlier this week. Isaacman will now be in charge of picking up the pieces,and presumably ensuring that NASA's grand plans to return to the Moon stay on track.Crack at ItNASA's Artemis II mission will be the first involving a crew boarding its Orion capsule, which is currently slated to be launched into space with the help of the agency's enormous and extremely expensive Space Launch System rocket.The agency has already successfully sent the capsule around the Moon and back without a crew on board during its inaugural Artemis mission in 2022. However, its return left major scars in its heat shield, triggering a lengthy investigation.During its announcement today, NASA singled out these concerns as one of the reasons behind the most recent delays. The heat shield in particular has already been the source of several delays for NASA's Artemis II mission.In response, Nelson announced today that the design of the heat shield will remain the same for Artemis II, but its trajectory will change to ensure it won't crack due to excessive heat during reentry, a unanimous decision among NASA officials.But whether NASA's plans for its mission will remain the same over the next couple of months remains uncertain, especially with Isaacman in charge.Most chaotically, there's chatter at the space agency about abandoning the troubled Space Launch System entirely which, given Elon Musk's newly chummy relationship with Trump, could open up the possibility of launching entire Artemis missions using SpaceX's yet-unfinished Starship.More on Artemis: NASA Keeping Issue With Moon Rocket a SecretShare This Article
    0 Commentarii ·0 Distribuiri ·100 Views
  • This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges
    thehackernews.com
    As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly discovered Android remote access trojan (RAT) called DroidBot."DroidBot is a modern RAT that combines hidden VNC and overlay attack techniques with spyware-like capabilities, such as keylogging and user interface monitoring," Cleafy researchers Simone Mattia, Alessandro Strino, and Federico Valentini said."Moreover, it leverages dual-channel communication, transmitting outbound data through MQTT and receiving inbound commands via HTTPS, providing enhanced operation flexibility and resilience."The Italian fraud prevention company said it discovered the malware in late October 2024, although there is evidence to suggest that it has been active since at least June, operating under a malware-as-a-service (MaaS) model for a monthly fee of $3,000.No less than 17 affiliate groups have been identified as paying for access to the offering. This also includes access to a web panel from where they can modify the configuration to create custom APK files embedding the malware, as well as interact with the infected devices by issuing various commands.Campaigns leveraging DroidBot have been primarily observed in Austria, Belgium, France, Italy, Portugal, Spain, Turkey, and the United Kingdom. The malicious apps are disguised as generic security applications, Google Chrome, or popular banking apps.While the malware leans heavily on abusing Android's accessibility services to harvest sensitive data and remotely control the Android device, it stands apart for leveraging two different protocols for command-and-control (C2).Specifically, DroidBot employs HTTPS for inbound commands, whereas outbound data from infected devices is transmitted using a messaging protocol called MQTT."This separation enhances its operational flexibility and resilience," the researchers said. "The MQTT broker used by DroidBot is organised into specific topics that categorise the types of communication exchanged between the infected devices and the C2 infrastructure."The exact origins of the threat actors behind the operation are not known, although an analysis of the malware samples has revealed that they are Turkish speakers."The malware presented here may not shine from a technical standpoint, as it is quite similar to known malware families," the researchers noted. "However, what really stands out is its operational model, which closely resembles a Malware-as-a-Service (MaaS) scheme something not commonly seen in this type of threat."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
    0 Commentarii ·0 Distribuiri ·85 Views
  • Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access
    thehackernews.com
    Dec 05, 2024Ravie LakshmananVulnerability / IoT SecurityCybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting Mitel MiCollab with an arbitrary file read zero-day, granting an attacker the ability to access files from susceptible instances.The critical vulnerability in question is CVE-2024-41713 (CVSS score: 9.8), which relates to a case of insufficient input validation in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab that results in a path traversal attack.MiCollab is a software and hardware solution that integrates chat, voice, video, and SMS messaging with Microsoft Teams and other applications. NPM is a server-based voicemail system, which enables users to access their voice messages through various methods, including remotely or through the Microsoft Outlook client.WatchTowr Labs, in a report shared with The Hacker News, said it discovered CVE-2024-41713 as part of its efforts to reproduce CVE-2024-35286 (CVSS score: 9.8), another critical bug in the NPM component that could permit an attacker to access sensitive information and execute arbitrary database and management operations.The SQL injection flaw was patched by Mitel in late May 2024 with the release of MiCollab version 9.8 SP1 (9.8.1.5).What makes the new vulnerability notable is that it involves passing the input "..;/" in the HTTP request to the ReconcileWizard component to land the attacker in the root of the application server, thus making it possible to access sensitive information (e.g., /etc/passwd) sans authentication.WatchTowr Labs' analysis further found that the authentication bypass could be chained with an as-yet-unpatched post-authentication arbitrary file read flaw to extract sensitive information."A successful exploit of this vulnerability could allow an attacker to gain unauthorized access, with potential impacts to the confidentiality, integrity, and availability of the system," Mitel said in an advisory for CVE-2024-41713."If the vulnerability is successfully exploited, an attacker could gain unauthenticated access to provisioning information including non-sensitive user and network information, and perform unauthorized administrative actions on the MiCollab Server."Following responsible disclosure, CVE-2024-41713 has been plugged in MiCollab versions 9.8 SP2 (9.8.2.12) or later as of October 9, 2024."On a more technical level, this investigation has demonstrated some valuable lessons," security researcher Sonny Macdonald said."Firstly, it has acted as a real-world example that full access to the source code is not always needed even when diving into vulnerability research to reproduce a known weakness in a COTS solution. Depending on the depth of the CVE description, some good Internet search skills can be the basis for a successful hunt for vulnerabilities."It's worth noting that MiCollab 9.8 SP2 (9.8.2.12) also addresses a separate SQL injection vulnerability in the Audio, Web and Video Conferencing (AWV) component (CVE-2024-47223, CVSS score: 9.4) that could have severe impacts, ranging from information disclosure to execution of arbitrary database queries that could render the system inoperable.The disclosure comes as Rapid7 detailed several security defects in the Lorex 2K Indoor Wi-Fi Security Camera (from CVE-2024-52544 through CVE-2024-52548) that could be combined to achieve remote code execution (RCE).In a hypothetical attack scenario, the first three vulnerabilities could be utilized to reset a target device's admin password to one of the adversary's choosing, leveraging the access to view live video and audio feeds from the device, or leverage the remaining two flaws to achieve RCE with elevated privileges."The exploit chain consists of five distinct vulnerabilities, which operate together in two phases to achieve unauthenticated RCE," security researcher Stephen Fewer noted."Phase 1 performs an authentication bypass, allowing a remote unauthenticated attacker to reset the device's admin password to a password of the attacker's choosing. Phase 2 achieves remote code execution by leveraging the auth bypass in phase 1 to perform an authenticated stack-based buffer overflow and execute an operating system (OS) command with root privileges."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Commentarii ·0 Distribuiri ·88 Views
  • How Conflict With China Might Play Out in the Cyber Realm
    www.informationweek.com
    Earlier this year, China-linked threat group Salt Typhoon allegedly breached major telecommunications companies, potentially gaining access to US wiretap systems. The full scope of the breach remains unknown, and the hackers are potentially still lurking in telecommunications networks.This breach is hardly the first time a group associated with China targeted critical infrastructure in the US. Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency (CISA), and Christopher Wray, director of the FBI, have both been vocal about the threat China poses to US critical infrastructure.In a 2024 opening statement before the House Select Committee on Strategic Competition Between the United States and the Chinese Communist Party, Easterly said, Specifically, Chinese cyber actors, including a group known as Volt Typhoon, are burrowing deep into our critical infrastructure to be ready to launch destructive cyber-attacks in the event of a major crisis or conflict with the United States.In April, Wray brought up this concern at the Vanderbilt Summit on Modern Conflict and Emerging Threats. The fact is, the PRCs targeting of our critical infrastructure is both broad and unrelenting.At the Cyberwarcon conference, Morgan Adamski, executive director of US Cyber Command, chimed in with a warning about how Chinas position in critical infrastructure could cause disruptive cyberattacks if the two countries enter into a major conflict, Reuters reports.Related:If conflict does erupt between China and the US, what could disruptive cyberattacks on critical infrastructure look like? What can the government and critical infrastructure leaders do to prepare?The Possibility of Disruptive CyberattacksThe US has 16 critical infrastructure sectors. All of them are called critical because they would impact society to some degree were they to be taken offline, says Eric Knapp, CTO of OT forOPSWAT, a company focused on critical infrastructure cybersecurity. And they're all susceptible to cyberattack to some degree.Telecommunications and power could be prime targets for China in a conflict. Back from the dawn of time when people would go to war, you would try to eliminate your opponents ability to communicate and their ability to power their systems, says Knapp.But other sectors, such as water, health care, food, and financial services, could be targeted as well.The intent of these kind of operations may be to provide a distraction in order to slow down a US response, if there was to be one, in any sort of conflict involving Taiwan, says Rafe Pilling, director of threat intelligence for the counter threat unit at cybersecurity company Secureworks.Related:While it is uncertain exactly how these attacks would play out, there are real-world examples of how adversaries can attack critical infrastructure to their advantage. Unfortunately, there's a roadmap that we can look at that's happening in the real world right now in the Russia-Ukraine conflict, says Knapp.Leading up to and following Russias invasion of Ukraine, Russia executed many cyberattacks on Ukrainian critical infrastructure, including its power grid.If China were to use its positioning in US critical infrastructure to carry out similarly disruptive attacks, they would be dealing with very distributed systems. It would be very unlikely to see something like a nationwide power outage, Knapp tells InformationWeek.What you'd likely see is a cascade of smaller localized disruptions, says Pilling.Those disruptions could still be very impactful, potentially causing chaos, physical harm, death, and financial loss. But they would not last forever.Many of these sectors, for reasons completely unrelated to cyberattacks, are used to being able to resolve issues, work around problems, and get services up and running quickly, says Pilling. Resiliency and quick restoration of services, particularly in the energy sector, [are] an important part of their day-to-day planning.Related:Threat ActorsSalt Typhoon and Volt Typhoon are two widely recognized, Chinese cyber threat groups that target US critical infrastructure.All [of] these different Chinese threat actor groups, they have different motivations, different goals, different countries that they're attacking, says Jonathan Braley, director of threat intelligence at nonprofit Information Technology-Information Sharing and Analysis Center (IT-ISAC).In addition to pre-positioning for disruptive cyberattacks, motivations could also include intellectual property theft and espionage.While Salt Typhoon is the suspected culprit behind the major breach in the US telecommunications sector, it actively targets victims in other sectors as well. For example, the group reportedly targeted hotels and government, according to FortiGuard Labs.Targeting hotels and targeting telcos is often to get information about people's movements and what they've been saying to each other and who they've been communicating with. So, it's part of a collection for a wider intelligence picture, says Pilling.Volt Typhoon has targeted systems in several critical infrastructure sectors, including communications, energy, transportation, and water, according to CISA.They combine a number of tactics that make them quite stealthy, says Pilling. For example, Volt Typhoon makes use of living off the land techniques and will move laterally through networks. It often gains initial access via known or zero-day vulnerabilities.In some cases, they would use malware but for the vast majority of cases they were using built-in tools and things that were already deployed on the network to achieve their aims of maintained persistence in those networks, Pilling shares.Salt Typhoon and Volt Typhoon are just two groups out of many China-backed threat actors. IT-ISAC has adversary playbooks for threat actors across many different countries of origin.We have about 50 different playbooks for different Chinese nation state actors, which is a lot, Braley tells InformationWeek. I think if we look at other countries there might be a dozen or so.While China-linked threat groups pose a risk to critical infrastructure, they are not alone.As we approach various global conflicts, we need to be prepared that not only we're going to have these nation states coming out, [but] we also [have] to watch some of these hacktivist groups that are aligned with these countries as well, says Braley.Preparing Critical InfrastructureThe government and critical infrastructure operators both have roles to play in preparing for the potential of disruptive cyberattacks. Information sharing is vital. Government agencies like CISA can continue to raise awareness. Critical infrastructure operators can share insight into any malicious activity they discover to help other organizations.Critical infrastructure operators also have a responsibility to harden their cybersecurity posture.A lot of the basic hygiene that organizations need to be doing is not expensive cutting-edge cybersecurity work. It's the basics of making sure things are patched, minimizing attack surfaces externally, making sure that there is good monitoring across the network to detect intrusions early when they occur, says Pilling. I think it's a culture and a mind shift as much as need for more budget.
    0 Commentarii ·0 Distribuiri ·109 Views
  • 2024 Holiday Gift Guide For Movie and TV Fans
    screencrush.com
    Happy holidays! Or they will be once you get your holiday shopping done, which is the thingthat makes this the most stressful time of the year. It can be tough finding the perfect gift for everyone on your list especially if that special someone is a movie or TV lover, and you dont quite keep up on all the latest movies and shows.Dont worry, though. The ScreenCrush 2024 holiday gift guide will help take all the worry out of the process. Weve got suggestions for Marvel, Star Wars, movie, TV fans, and more. Plus there are links to where to buy every thing. Before you know it, holiday shopping will be done and youll be chugging eggnog.The Best Gifts For Marvel FansScreenCrushScreenCrushloading...Woooimabouta ShirtWoooo you about to make a name for yourself at your officesSecret Santa swap when you put this shirt in there. Gambit had himself a year, and this shirt is just one part of it. (If the target of your holiday shopping is really into Gambit, you could also go for the coolX-Men 97action figure.)ScreenCrushScreenCrushloading...Bully Maguire ShirtIts time everyone admits it:Spider-Man 3 is good. Tobey Maguires Evil Peter dance is also good. And so is this shirt, which commemorates both in high style. The next time someone insults you for liking this underrated superhero movie, tell them to hit the bricks.ScreenCrushScreenCrushloading...Variant MugMarvel is all about the multiverse these days. And whetherin this universe your loved one enjoy coffee, tea, or just a little hot water with lemon, this Variant will hold it in comfort and style. (No promises it wont bedeleted from the timeline at some point in 2025.)MarvelMarvelloading...Spider-Ham Piggy BankEvery kid needs a piggy bank. And every Spider-Man fan needs a Spider-Ham piggy bank. Fill it with your coins, then empty it out to buy yourself this bizarre Spider-Man kids shaving kit.The Best Gifts For Star Wars FansScreenCrushScreenCrushloading...Dark Master VulcanGlassMarty McFly: Honestly not that great attelling the difference betweenStar Wars andStar Trek.But thats okay. And this glass which pays tribute to a classic movie moment about several other classic movie moments, is even better.ScreenCrushScreenCrushloading...Grand Admiral Polo ShirtNot everyone wants to align themselves with the Empire, sartorially speaking. And we respect that. But if youre buying a gift for someone whos down with the Dark Side, this polo shirt adorned with rank markings that suggest a certain Imperial officer will definitely appeal to their fashion sense. (Plus it comes in white or black, depending on whether they want to wear it before or after Labor Day.)LucasfilmLucasfilmloading...Luke Skywalker Lightsaber LEDLampIlluminate an elegant work space with an elegant weapon for a more civilized age, with this lightsaber LED lamp.It measures almost two feet tall with a five inch diameter base. Just dont touch that blade; who knows what will happen if you do.The Best Gifts For Movie FansCriterionCriterionloading...CC40 Box SetIf youve got a hardcore movie fan in your life and a big chunk of change in your bank account, the thing to buy them is the Criterion Collections 40th anniversary box set. It contains the 40 films chosen most frequently by the celebs and filmmakers who visit Criterions internet famous Criterion Closet. (Titles includeSweet Smell of Success,Do the Right Thing,Night of the Living Dead,Love & Basketball,Sullivans Travels, andIn the Mood for Love.)ScreenCrushScreenCrushloading...We love VHS here at ScreenCrush. The only thing cooler than a beat-up video tape might be this hat with a retro cool VHS logo on it. If you know someone constantly prowling eBay for deals on old copies ofTitanic on video cassette, this hat is for them.LEGOLEGOloading...LEGOs offerings in recent years have leaned more and more into the world of movies, some obvious (TheBack to the FutureDeLorean) others a little more eclectic. TheDunefranchise isnt exactly the most kid-friendly franchise, but the designs in Denis Villeneuves movies are incredible which makes them perfect for LEGOs. This set allows you to build one of their incredible hummingbird-style hovercrafts. And look at that crazy tall Baron Harkonnen!ScreenCrushScreenCrushloading...This shirt may remind you of the censorship classifications for American movies made by a large association for motion pictures.If you know our YouTube channel, youll probably get a kick out of the fine print too.The Best Gifts For TV FansScreenCrushScreenCrushloading...Hey baby, if you hear the blues acallin or you just have a lot of blue fur and enjoy walking around in underpants and a lab coat, this shirt combining everyones favorite mutant and everyones favorite Seattle-based sitcom about wacky psychiatrists will definitely suit you. Buy it for the person in your life who likes to say Hey ... rememberX-Men: The Last Stand?ScreenCrushScreenCrushloading...Westview Neighborhood Watch PosterWatch out for witches! And definitely dont say her name! Westview has had it rough these past couple years, andthis cool poster makes a funny, fittingtribute toits citizens sacrifice. It would like quite a vision on anAgatha All Along fans fall.EtsyEtsyloading...The Simpsons Mini TVThis is so cool: A miniature TV styled to look like the one Homer, Marge, and the rest of the family have been glued to onThe Simpsonsfor over 30 years. Coolest of all: It plays TV shows on it so you can have it playingThe Simpsons.This would look great on aSimpsons fans desk, or in a display ofSimpsonsaction figures or collectibles.Available on EtsyThe Best Gift For Wicked And/Or Agatha All AlongFansScreenCrushScreenCrushloading...witch ShirtIt was a brat summer and now it is a witch winter. And whether the person youre buying for was big intoAgatha All Along or they cant stop singing Defying Gravity, thisshirt will definitely match their vibe. (Hmmm ... maybe we need to makewitch ear plugs.)Get our free mobile appThe Best Movies of 2024Our editor and critics picks for the top 20 movies of 2024.Gallery Credit: Matt Singer
    0 Commentarii ·0 Distribuiri ·84 Views
  • Snack Attack! McDonald's Snack Wrap Is Coming Back
    screencrush.com
    McDonald's is the latest fast food chain to heed the requests of their customers and bring back a once loved menu item.After years of online petitioning, the restaurant has announced they will be bringing the Snack Wrap back to their menus.Per Forbes, snackers across the nation will be able to enjoy the delicious offeringstarting sometime 2025, though the specific release date is a secret.READ MORE: The Craziest Fast Food Items EverMcDonald's President Joe ErlingertellsGood Morning Americahe has received countless emails demanding that the Snack Wrap make a comeback. He stopped short of announcing an official date, but the portable chicken wrap will be back next year."It has a cult following," he says of the menu item.What Is a Snack Wrap?One of the things that makes a Snack Wrap so good is its simplicity. There are a variety of flavor options, but the foundation of the meal is simple: Chicken, lettuce and cheese wrapped in a warm tortilla.Where Can You Get a Snack Wrap?If waiting for the Snack Wrap to return to the United States is too much for your hungry tummy to stomach, you can get one in other countries. Forbes reports there are several varieties available on international menus, includingsweet chili chicken, barbecue and bacon, and Caesar and bacon.These can be found in either grilled of crispy chicken options.The Trend of Popular Menu Items ReturningSeveral fast food chains are leaning into their nostalgia era and bringing back old fan favorites. Recently Burger King brought back the Cini Minis, while Taco Bell revived their Caramel Apple Empanada.Once-Beloved Fast Food Items That No Longer ExistThese defunct fast food items have gone down in history. Wouldnt you love to eat them again?Filed Under: Fast Food, McDonald'sCategories: TV News
    0 Commentarii ·0 Distribuiri ·72 Views
  • MinMaxDeals LLC: Sales Representative B2B (international trading)
    weworkremotely.com
    Time zones: EST (UTC -5), MST (UTC -7), ART (UTC -3), UTC -4, UTC -4:30, UTC -3, UTC -2, SBT (UTC +11), GMT (UTC +0), CET (UTC +1), EET (UTC +2), MSK (UTC +3), CEST (UTC +2), BST (UTC +1), JST (UTC +9), CST (UTC +8), WIB (UTC +7), MMT (UTC +6:30), BST (UTC +6), NPT (UTC +5:45), IST (UTC +5:30), UZT (UTC +5), IRDT (UTC +4:30), GST (UTC +4)Location:About UsMinMaxDeals LLC is a leading wholesale distributor of branded cosmetics, makeup, and fragrances. Since 2019, weve been a trusted partner to e-commerce businesses, retailers, and global clients, offering top luxury brands at competitive prices. Join our dynamic team and help us build lasting customer relationships while driving business growth!Key ResponsibilitiesGenerate and nurture leads, converting them into loyal customers.Negotiate and close deals to meet and exceed sales targets.Build and manage a customer database.Deliver exceptional customer service and solutions.Conduct market research and stay updated on industry trends.Collaborate with the team to develop effective sales strategies.What Were Looking ForBachelors degree in Business, Marketing, or related field.Proven B2B sales experience (FMCG experience is a plus).Exceptional communication, negotiation, and organizational skills.Familiarity with tools like Zoho CRM, Google Workspace, Slack, etc.Self-motivated with a results-driven mindset.Technical RequirementsReliable computer with at least 8 GB RAM.Noise-canceling headset and webcam (is a must).Wired internet with at least 50 Mbps download speed.Why Join Us?Be part of a supportive and collaborative remote team where your ideas and contributions are valued. We celebrate diversity and are committed to inclusivity.How to Applyform: https://forms.gle/zVgix5eZhVUG2XRn9 A video introduction link is crucial to your application.If youre passionate about sales and customer success, send your resume today! Only shortlisted candidates will be contacted.Welcome to a world of limitless possibilities!Are you ready to take charge and make a profound impact on our customers' journey?Join our fully-remote, dynamic team and be the driving force behind our success as we forge strong relationships, unlock new business opportunities, and exceed sales targets!If you are passionate about delivering exceptional customer service, cosmetics, thrive in a collaborative environment, and possess the determination to achieve remarkable results, then this is the perfect opportunity to unleash your potential and shape the future of our organization!Step into a role where your skills will be valued, your ideas will be heard, and your contributions will be celebrated!Together, let's embark on an exciting journey of growth and achievement!
    0 Commentarii ·0 Distribuiri ·97 Views
  • hampr: Account Executive - B2B Sales
    weworkremotely.com
    We're a seed-stage startup, and we're all-in on building a scalable, repeatable B2B sales playbook. We're investing heavily in top-of-funnel growth through both inbound and outbound marketing efforts, and we're looking for a high-performing Account Executive who is ready to hit the ground running, driving our sales efforts and playing a pivotal role in building our future.As an Account Executive at hampr, you'll own your pipeline, close deals, and build long-term client relationships with independence and support from our CEO. This is a hands-on, high-impact role where grit, ambition, and proactive pipeline management will be key. You'll have the opportunity to shape not just individual deals but our broader B2B strategy, making direct contributions to a sales playbook that will enable rapid scale.Your insights from early customer conversations will help refine our value proposition, and you'll have the chance to influence marketing, product, and customer success strategies across the company. This is the perfect role for a B2B sales professional who is ready to be part of something big.Key ResponsibilitiesLead Conversion & Closing:Manage both inbound and outbound leads with speed and skillqualify, negotiate, and close deals that contribute to rapid B2B revenue growth.Pipeline Ownership:Track, manage, and grow a personal pipeline with the ambition to exceed monthly quotas consistently.Outbound Engagement:Actively connect with potential customers via phone, email, and virtual meetings, positioning hampr as the trusted solution for their laundry needs.Sales Strategy Development:Collaborate on refining our B2B playbook; bring fresh insights and solutions to optimize our approach.Customer Relationships:Build and sustain strong, trust-based client relationships, ensuring ongoing satisfaction and positioning hampr as the preferred partner.Cross-Functional Collaboration:Partner closely with the CEO, marketing, and product teams, bringing valuable feedback and insights to inform and enhance our overall growth strategy.RequirementsExperience in B2B Sales:Minimum 2-3 years in B2B sales with a strong record of meeting or exceeding quotas, ideally in a startup or fast-growth environment.Drive & Motivation:A proactive, self-starting attitude with an insatiable drive to close deals and surpass targets.Communication Skills:Skilled at crafting compelling messages, able to quickly establish rapport, and communicate persuasively.Problem-Solving Mindset:Adept at uncovering client pain points and delivering solutions that add clear value.Adaptability & Resilience:Comfortable navigating the dynamics of a startup environment, with a mindset focused on growth and continuous improvement.BenefitsGrowth Opportunity:Be a core part of our foundational team, helping to set the stage for B2B expansion and playing a vital role in crafting our go-to-market strategy.Direct Access to Leadership:Work closely with our CEO and cofounders, benefiting from hands-on leadership while enjoying the autonomy to manage your own pipeline.Remote Flexibility:Enjoy a supportive, flexible work environment with the autonomy to excel independently.Competitive Package:Base salary with performance-based incentives and substantial growth and development opportunities.
    0 Commentarii ·0 Distribuiri ·95 Views
  • Faut-il scanner les codes QR de restaurants ?
    www.facebook.com
    Faut-il scanner les codes QR de restaurants ?
    0 Commentarii ·0 Distribuiri ·208 Views