Geek-Guy.com

Proofpoint buying Hornetsecurity in a play to expand email security scope

More than of 90% of successful cyberattacks begin with emails, according to the US Cybersecurity and Infrastructure Security Agency (CISA), making them a critical asset that enterprises must protect. Cybersecurity vendor Proofpoint is looking to expand its reach in this area, announcing its intent to purchase Hornetsecurity Group, a European email security rival. The move…

Sam Altman’s goal for ChatGPT to remember ‘your whole life’ is both exciting and disturbing

OpenAI CEO Sam Altman laid out a big vision for the future of ChatGPT at an AI event hosted by VC firm Sequoia earlier this month.  When asked by one attendee about how ChatGPT can become more personalized, Altman replied that he eventually wants the model to document and remember everything in a person’s life.…

 FTC wants a new, segregated software system to police deepfake porn 

The head of the Federal Trade Commission described to lawmakers Thursday new technology, personnel and infrastructure the agency needs as it prepares to implement and enforce the Take It Down Act, placing the FTC’s enforcement wing at the forefront of the fight against nonconsensual deepfake pornography. The FTC’s proposed budget holds funding at $425.7 million,…

Proofpoint to acquire Hornetsecurity for over $1 billion

Proofpoint has entered into an agreement to acquire Hornetsecurity Group, a Germany-based provider of Microsoft 365 security services, in a deal reportedly valued at more than $1 billion. The acquisition, described as the largest in Proofpoint’s history, comes amid accelerating consolidation in the cybersecurity industry as companies seek to broaden their offerings to enterprise customers…

After helping Russia on the ground North Korea targets Ukraine with cyberespionage

North Korea’s involvement in the war in Ukraine extends beyond sending soldiers, munitions, and missiles to Russia, as cybersecurity researchers warn of recent cyberespionage campaigns against Ukrainian government entities by a known North Korean state-sponsored actor. “Proofpoint assesses TA406 is targeting Ukrainian government entities to better understand the appetite to continue fighting against the Russian…

O que é um ataque cibernético? Tipos e prevenção

A segurança digital se tornou uma prioridade inegociável. Com o avanço da tecnologia, surgem também novas ameaças digitais e uma das mais perigosas é o ataque cibernético. Empresas, governos e até mesmo usuários comuns estão constantemente na mira de criminosos digitais que buscam explorar vulnerabilidades. Mas afinal, o que é ataque cibernético, quais são os…

Fake fired Twitter worker ‘Rahul Ligma’ is a real engineer with an AI data startup used by Harvard

The morning after Elon Musk’s 2022 acquisition of Twitter (now X), reporters encountered two men with boxes outside the company’s headquarters. One introduced himself as recently laid-off Twitter engineer “Rahul Ligma.”  His real name is Rahul Sonwalker but the prank went viral. He piled on his character’s notoriety when he went to the Bahamas to…

Building Confidence in Your Cybersecurity Strategy

Why is a Comprehensive Cybersecurity Strategy Essential? A robust cybersecurity strategy is no longer a luxury but a necessity. Whether it is financial services, healthcare, or travel, organizations are making significant shifts to the digital domain. It has become critical to safeguard sensitive data from threats and risks. But how can businesses build confidence in…

Fostering Innovation with Secure Access Management

How Does Secure Access Management Fuel Innovation? Have you ever pondered the correlation between innovation security and business success? With businesses heavily rely on technology to innovate and drive growth, secure access management has become a crucial element in their strategy. It is the linchpin that binds the concepts of technological advancement and data protection,…

How Protected Are Your Automated Systems?

Are Your Machine Identities Safe? Non-Human Identities (NHIs) and Secrets Security Management present a groundbreaking approach to data security. But what is the reality of your automated systems’ protection? We will explore this question, highlighting the importance of implementing a holistic security protocol. Unmasking the Digital Tourist: Non-Human Identities Comprehensively managing NHIs and their secrets…

Is Your Cloud Truly Safe from Invisible Threats?

Why Do Cloud Security Gaps Exist? Can we confidently claim to have sealed all potential breaches? The truth is, despite significant investments in cybersecurity measures, gaps continue to exist. Many professionals overlook the importance of Non-Human Identities (NHIs) management. NHIs, machine identities combined with a “Secret”— an encrypted password, token, or key— are powerful tools…

Redpoint raises $650M 3 years after its last big early-stage fund

Redpoint Ventures, a San Francisco-based firm that is about a quarter of a century old, has raised a $650 million tenth early-stage, according to a regulatory filing. Redpoint’s new fund matches the size of its prior fund, which was raised just under three years ago. In a market where many venture firms are decreasing their…

Redpoint raises $650M three years after its last big early-stage fund

Redpoint Ventures, a San Francisco-based firm that is about a quarter of a century old, has raised a $650 million tenth early-stage, according to a regulatory filing. Redpoint’s new fund matches the size of its prior fund, which was raised just under three years ago. In a market where many venture firms are decreasing their…

Breachforums Boss to Pay $700k in Healthcare Breach

In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on the forum in 2023. Conor Brian Fitzpatrick, a.k.a. “Pompompurin,” is slated for resentencing next month…

Anthropic’s lawyer was forced to apologize after Claude hallucinated a legal citation

A lawyer representing Anthropic admitted to using an erroneous citation created by the company’s Claude AI chatbot in its ongoing legal battle with music publishers, according to a filing made in a Northern California court on Thursday. Claude hallucinated the citation with “an inaccurate title and inaccurate authors,” Anthropic says in the filing, first reported…

FBI warns of fake texts, deepfake calls impersonating senior U.S. officials

The FBI said Thursday that malicious actors have been impersonating senior U.S. government officials in a text and voice messaging campaign, using phishing texts and AI-generated audio to trick other government officials into giving up access to their personal accounts. The warning provided few details about the campaign, which started in April and appears to…

Lucid’s record quarter got a lift from rental sales and company leases

Lucid Motors set a company record for deliveries in the first quarter of 2025, shipping 3,109 EVs to customers in North America, Europe, and Saudi Arabia. It appears that a new company car program and sales to rental fleets helped it get there.  According to a footnote in Lucid Motors’ latest regulatory filing, it sold…

Google patches Chrome vulnerability used for account takeover and MFA bypass

Chrome users are advised to update their browser immediately to fix a critical vulnerability that is being exploited to launch account takeover attacks. In some environments, this could even give attackers the ability to bypass multi-factor authentication (MFA). The recently-reported vulnerability, one of four fixed in a Wednesday update, is tracked as CVE-2025-4664 and affects…

Startups Weekly: A brighter outlook, but don’t get carried away

Welcome to Startups Weekly — your weekly recap of everything you can’t miss from the world of startups. Want it in your inbox every Friday? Sign up here. Startup news this week was fairly routine — in a good way: Aside from a minor kerfuffle between Y Combinator and Google, there was no headline-grabbing drama.…

SAP cyberattack widens, drawing Salt Typhoon and Volt Typhoon comparisons

Hundreds of victims are surfacing across the world from zero-day cyberattacks on Europe’s biggest software manufacturer and company, in a campaign that one leading cyber expert is comparing to the vast Chinese government-linked Salt Typhoon and Volt Typhoon breaches of critical infrastructure. The zero-days — vulnerabilities previously unknown to researchers or companies, but that malicious…

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced…

North Korea’s ‘state-run syndicate’ looks at cyber operations as a survival mechanism

Over the past few years, cybersecurity experts have increasingly said that nation-state operatives and cybercriminals often blur the boundaries between geopolitical and financial motivations. A new report released Wednesday shows how North Korea has flipped that idea on its head.  North Korea has silently forged a global cyber operation that experts now liken to a…

Cognichip emerges from stealth with the goal of using generative AI to develop new chips

Chips are a critical component of the AI industry. But new chips don’t hit the market with the same speed as new AI models and products do. Cognichip has a lofty goal of creating a foundational AI model that can help bring new chips to market faster. San Francisco-based Cognichip is working to build a…

Google rolls out new AI and accessibility features to Android and Chrome

Google announced on Thursday that it’s rolling out new AI and accessibility features to Android and Chrome. Most notably, TalkBack, Android’s screen reader, now lets you ask Gemini about what’s in images and what’s on your screen. Last year, Google brought Gemini’s capabilities to TalkBack to give people who are blind or have low vision…

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

Arachnid alarm: Three major British retailers recently attacked, resulting in huge damage. Now we see the self-same scum spotlighting stores in the States. The post Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware) appeared first on Security Boulevard.

BSidesLV24 – GroundFloor – The Road To Developers’ Hearts

Author/Presenter: Sing Ambikapathi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – GroundFloor – The Road To Developers’ Hearts appeared first on Security Boulevard.

Host a tailored Side Event at All Stage 2025 in Boston

Looking to make a splash at TechCrunch All Stage 2025? Our Side Events initiative is a fantastic opportunity to engage with Boston’s tech community in a dynamic and memorable manner. Plus, we’ll assist in promoting your event at no cost to you! Submit your event here by June 10. Throw your own Side Event at…

Threads now lets creators add up to 5 links to profiles, track clicks

Instagram Threads is taking on Linktree and other “link-in-bio” solutions by introducing a way for creators to use their Threads profile to share links to their other interests and online presences. At launch, the feature will support adding up to five links to a bio, which can connect visitors to the creator’s blog, newsletter, website,…

Boomi and AWS Announce Strategic Collaboration to Transform Enterprise AI Integration, Automation, and SAP Cloud Migration

Boomi, the leader in AI-driven automation, today announced a multi-year Strategic Collaboration Agreement (SCA) with Amazon Web Services (AWS) to help customers build, manage, monitor and govern generative artificial intelligence (AI) agents across enterprise operations. Additionally, the SCA will aim to help customers accelerate SAP migrations from on-premises to AWS.

Informatica Unveils Agentic AI Offerings on Its AI-Powered Cloud Data Management Platform

Informatica (NYSE: INFA), an AI-powered enterprise cloud data management leader, has announced its comprehensive strategy for Agentic AI, building on the company’s position as the industry’s first AI-powered cloud data management platform. Informatica’s strategic approach to Agentic AI expands on the company’s AI innovation history, which includes the launch of CLAIRE GPT, CLAIRE Copilot and GenAI…

Apple finally launches next-gen ‘CarPlay Ultra’ software, starting with Aston Martin

Apple’s next-generation version of its popular CarPlay infotainment software is finally launching three years after it was first announced. The company said Thursday that this new version of CarPlay — now known as “CarPlay Ultra” — will start rolling out on new Aston Martin vehicles in the U.S. and Canada, roughly half a year late.…

Doji raises $14M to make virtual try-ons fun through your avatars

For years, big tech companies like Amazon and Google have been trying to make virtual try-ons engaging to encourage consumers to shop more online. Startups also tried to solve for inspiration and fit in fashion using AI. A new startup called Doji is now entering this space with an app designed to make apparel try-ons…

XTIUM Exec on How Channel Can Navigate 2025 Complexities

Managed IT services provider XTIUM supports customers with a security-first approach to technology. Channel Insider spoke with Kevin Sullivan,  principal technology consultant focused on cloud offerings at XTIUM, to dive into how uncertain times can lead to untapped potential in the market. Uncertainty is the name of the (confusing) game this year Sullivan has worked…

Tenable Adds Connectors, Dashboards to Platform Offering

Exposure management platform vendor Tenable has added new connectors to nearly 40 third-party solutions in an effort to simplify how organizations stay secure. Tenable One gains third-party tool integrations and customizable dashboards The company today announced various updates to its Tenable One platform, all aimed at simplifying an organization’s approach to security. Tenable One now…

Alternatives to Microsoft Outlook webmail come under attack in Europe

CISOs need to ensure that web email clients and browsers are kept up to date following the discovery of cross site scripting attacks on organizations running webmail clients such as Roundcube, Horde, MDaemon, and Zimbra. The alert came today from researchers at ESET, who, after seeing attacks on government and defense organizations in Ukraine, Romania,…

Acorns acquires family wealth and digital memory platform EarlyBird

Savings and investing startup Acorns has acquired EarlyBird, an investment gifting platform for families, the company told TechCrunch exclusively. The financial terms of the deal were not disclosed. As part of the acquisition, EarlyBird will shut down, and all customer accounts will officially close on June 23. Customers’ funds will be returned to the bank…

Roblox now lets creators sell physical products within their experiences

Roblox announced on Thursday that creators can now sell physical merchandise directly within their experiences and games on the platform with the launch of new Commerce APIs. The offering provides creators with a new way to generate revenue beyond the purchases of virtual goods or one-time fees to access specific experiences. The company first began…

Stealth RAT uses a PowerShell loader for fileless attacks

>Threat actors have been spotted using a PowerShell-based shellcode loader to stealthily deploy Remcos RAT, a popular espionage-ready tool in line with a broader shift toward fileless techniques. As discovered by Qualys, the campaign executes a number of steps to phish an obfuscated .HTA (HTML Application) file that runs layered PowerShell scripts entirely in memory.…

Small but Mighty: UX Design Tips for a Lean Team Environment

As a senior UX designer at Tidal Cyber, I often field questions from other designers and cybersecurity industry colleagues on how to work effectively in a lean team environment. Lean teams typically operate with a ratio of one designer for every 10 to 20 developers. So, it requires a lot of multi-tasking, context-switching, and cross-team…

Who needs VC funding? How cybercriminals spread their ill-gotten gains to everyday business ventures

Cybercriminals aren’t so different from the rest of us — they live in the real world, and their spending and investment habits, though funded through crime, can look surprisingly ordinary. Luxury cars and lavish vacations may still grab headlines, but those perks are reserved for the most elite cybercriminals. In reality, everyday businesses — like pizza…

Pen Testing for Compliance Only? It’s Time to Change Your Approach

Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected. This situation isn’t theoretical: it

Data on sale: Trump administration withdraws data broker oversight proposal

The US Consumer Financial Protection Bureau has withdrawn a proposed rule that would have restricted data brokers from selling US citizens’ personal and financial information.   The decision, announced Wednesday in the Federal Register, marks a significant reversal in consumer privacy protection efforts and raises serious concerns about the security of sensitive personal data.  “With the…

South Korea delays decision on letting Google move hi-res map data overseas

South Korea has once again postponed a decision on whether to approve Google’s request to transfer the high-precision map data it has on the country’s geography to its international servers. In February, Google had requested approval from the Korean National Geographic Information Institute to deploy a 1:5,000 scale map on its app in the country…

5 BCDR Essentials for Effective Ransomware Defense

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a chilling example, Microsoft recently disclosed how threat actors misused its Quick Assist remote assistance tool to deploy the destructive

WordPress Appliance - Powered by TurnKey Linux