Geek-Guy.com

Month: December 2024

6 Mittel gegen Security-Tool-Wildwuchs

Viel hilft nicht immer viel. Foto: Roman Samborskyi | shutterstock.com Auf der Suche nach Möglichkeiten, sich vor ständig wachsenden Cyberbedrohungen zu schützen, erliegen nicht wenige Unternehmen einem regelrechten Security-Tool- und -Service-Kaufrausch. Kommen noch Abteilungssilos und regelmäßige Übernahmen hinzu, steigt die Chance, dass Sicherheitsentscheider mit Tool-Wildwuchs konfrontiert werden. Diesen zu reduzieren, liegt nicht nur aus Kostengründen…

Exposing the Rogue Cyberheaven Compromised Chrome VPN Extensions Ecosystem – An Analysis

Here we go. It appears that the individuals behind the successful compromise of the Cyberheaven VPN Chrome extensions are currently busy or at least have several other upcoming and in the works campaigns targeting several other vendors of Chrome VPN extensions. The first example is hxxp://censortracker.pro which apparently aims to target the legitimate (hxxp://censortracker.org). Relate…

Judge allows California’s ban on addictive feeds for minors to go into effect

Late Tuesday evening, a federal judge blocked tech lobbying group NetChoice’s challenge to California’s recently enacted law, SB 976, which prohibits companies from serving “addictive feeds” to minors. The effect of this decision is that beginning Wednesday, companies will be prohibited from serving an addictive feed to a California-based user they know to be a…

Get Excited: Innovations in Privileged Access Mgmt

An Exciting Paradigm Shift in Managing Non-Human Identities Are we truly harnessing the power of Non-Human Identities (NHIs) in cybersecurity? A new wave of innovations in privileged access management has created an exciting shift in the cybersecurity landscape, ensuring end-to-end protection for organizations working in the cloud. From financial services and healthcare to travel and…

Freedom in Cybersecurity: Keys to Unlock Potential

How Does NHI Management Contribute to Unlocking Potential in Cybersecurity? As we navigate the complex world of cybersecurity, are we leveraging the full potential of Non-Human Identity (NHI) management? With evolving threats and increasingly intricate cloud environments, NHI management has evolved from a mere necessity to a strategic asset in fortifying cybersecurity frameworks. What is…

Scaling Your Security with Cloud-Native Practices

Are Your Current Security Measures Outpacing Your Growth? With the acceleration of digital transformation, security and scalability have risen to the top of the agenda for many organizations. As your business evolves, so too should your security measures. However, are they keeping up with your rapid growth? Is your current security infrastructure robust enough to…

Reassured Safety with Advanced Threat Detection

Why is Advanced Threat Detection Crucial for Reassured Safety? Are you certain your organization’s assets are insulated against today’s unprecedented wave of cyber threats? Or are you in the majority struggling to bridge the widening gap between security and R&D teams? In either case, focusing on non-human identities (NHIs) and secrets security management may be…

Capable Defenses: Mastering Least Privilege Tactics

Ambitious Targets: Are You Maximizing Your Capable Defenses? Amidst the accelerating pace of digital advancements, cybersecurity resilience continues to pose a significant challenge for businesses globally. Organizations often find themselves grappling with the task of securing both human and non-human identities on their network. As the digital landscape expands, the challenge lies in maintaining a…

Will Smith eating spaghetti and other weird AI benchmarks that took off in 2024

When a company releases a new AI video generator, it’s not long before someone uses it to make a video of actor Will Smith eating spaghetti. It’s become something of a meme as well as a benchmark: Seeing whether a new video generator can realistically render Smith slurping down a bowl of noodles. Smith himself…

A look back on my favorite episodes of TechCrunch’s Found podcast

TechCrunch’s Found podcast, which has brought listeners the stories behind the startups since April 2022, released its final episode today. I’ve been one of the hosts of Found since November 2022 and in that time have spoken to more than 75 founders about the startups they are building. These founders hail from many different backgrounds…

US Treasury Department workstations breached in attack attributed to China

The US Department of the Treasury revealed on Monday that an attacker was able to bypass security, access an undisclosed number of Treasury workstations, and steal “certain unclassified documents,” in what it called a “major cybersecurity incident”. In a letter to the US Senate’s Committee on Banking, Housing and Urban Affairs, the Treasury Department said…

Understanding the Fundamentals of Zero Trust Security in Cybersecurity

With the increasing prevalence of advanced threats and the constant evolution of security exploits, organizations are facing unprecedented challenges in safeguarding their digital assets. In today’s digital landscape, traditional security measures such as firewalls and encryption are no longer sufficient to protect against the sophisticated tactics employed by cybercriminals. This has led to the rise…

US sanctions Russian, Iranian groups for election interference

The U.S. State Department has sanctioned two foreign organizations and one individual who it alleges worked on behalf of Russian and Iranian intelligence agencies to interfere in the 2024 U.S. general election. “These actors sought to stoke sociopolitical tensions and undermine our election institutions during the 2024 U.S. general election,” said State Department Press Secretary…

Elon Musk’s promises for Tesla in 2024, from robotaxis to Optimus bots

Elon Musk had an eventful 2024, what with his hard push into right-wing politics and leveraging his X social media platform and considerable influence to help Donald Trump win the presidential election. Putting politics aside for a moment, it’s worth focusing on another Musk pastime: making promises for Tesla. The Tesla CEO’s promises — and…

After UN adoption, controversial cybercrime treaty’s next steps could prove vital

A divisive United Nations cybercrime treaty — one that critics say is a huge danger to human rights and that the United States cautiously agreed to advance — is now in the hands of member nations. The U.N. General Assembly adopted the treaty without a vote last week, leaving ratification to individual states. If the…

A Waymo robotaxi and a Serve delivery robot collided in Los Angeles

On December 27, a Waymo robotaxi and a Serve Robotics sidewalk delivery robot collided at a Los Angeles intersection, according to a video that’s circulating on social media. The footage shows a Serve bot crossing a street in West Hollywood at night and trying to get onto the sidewalk. It reached the curb, backed up…

Singapore telecom and pay-tv services revenue to decline at 0.4% over 2024-29: report

The total telecom and pay-TV services revenue in Singapore is expected to decline at a compounded annual growth rate (CAGR) of 0.4% over the forecast period 2024-2029, with a steady decline in revenue contributions from fixed voice, pay-TV, and mobile voice segments outweighing revenue growth in mobile broadband and fixed broadband segments, according to a…

CRITICAL ALERT: Sophisticated Google Domain Exploitation Chain Unleashed

by Source Defense A sophisticated attack chain targeting e-commerce payment flows has been prematurely exposed in a concerning development, highlighting the delicate balance between responsible disclosure and public safety. Discovered initially by Source Defense’s research team and responsibly disclosed to Google on November 19, 2024 (Issue ID: 379818473), this critical vulnerability has now been publicly…

IT tech services firm WWT acquires Canadian IT provider Softchoice in all-cash deal

One last mega-deal closed out an eventful 2024. On Tuesday, World Wide Technology (WWT), a tech services company based in St. Louis, announced it has agreed to acquire Canadian IT provider Softchoice in a deal that values the latter at C$1.8 billion (~$1.25 billion). The deal, which is all-cash, was unanimously approved by Softchoice’s board,…

After ups and down, food delivery startup Epicery closes shop

French food delivery startup Epicery will cease operations Tuesday, after one last holiday season hurrah for its clients and the local food businesses that were using the platform during its nine years in business in exchange for a 25% commission. In a message announcing the decision to customers earlier this month, Epicery’s team said that…

Why ISMS Policies Are Crucial for Compliance in Cybersecurity?

In 2025, the cybersecurity landscape will continue to evolve rapidly, driven by increasing cyber threats and technological advancements. As governments and regulatory bodies implement stricter cybersecurity regulations, businesses will face pressure to ensure compliance. Failing to meet these standards could result in severe penalties, financial losses, and reputational damage. This blog will explore the key…

India again delays rules to break PhonePe-Google Pay duopoly

India has once again pushed back a contentious plan to limit big technology companies’ control of the nation’s digital payments system, extending a regulatory uncertainty that has weighed on the sector for years. The National Payments Corporation of India said on Tuesday it would extend the deadline for implementing a 30% cap on any individual…

India lifts WhatsApp payment curbs

India has removed restrictions on WhatsApp’s mobile payments service in a significant victory for Meta in its largest market by users as it seeks to compete with entrenched fintech rivals. The National Payments Corporation of India, the payments body overseeing the popular UPI payments network, said Tuesday that WhatsApp can now roll out WhatsApp Pay…

Gupshup investor cuts value of its stake again, implying new valuation of $486M

Asset management firm Fidelity slashed the estimated worth of its stake in business messaging platform Gupshup by another 7.7% last month, lowering the value of its holding in the SaaS startup by a total of more than 65% since its investment in mid-2021. One of the funds operated by the U.S. asset manager valued its…

Samsung pays $181M to become largest shareholder of Rainbow Robotics

Samsung Electronics said on Tuesday that it has become the largest shareholder of South Korea-based robotics maker Rainbow Robotics, increasing its stake from 14.7% to 35% for KRW 267 billion (about $181 billion). The electronics giant, which paid KRW 86.8 billion for the 14.7% stake in 2023, said it is acquiring the stake to bolster…

Top CVEs & Vulnerabilities of December 2024

When it comes to cybersecurity, it’s not just the technology that evolves, it’s the threats too. Every month brings its own set of challenges, and December 2024 has been no… The post Top CVEs & Vulnerabilities of December 2024 appeared first on Strobes Security. The post Top CVEs & Vulnerabilities of December 2024 appeared first…

The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts. Fortunately, plenty of great conferences are coming up in the months ahead.…

Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

The United States Treasury Department said it suffered a “major cybersecurity incident” that allowed suspected Chinese threat actors to remotely access some computers and unclassified documents.  “On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by the vendor to…

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation

Cybersecurity researchers have uncovered three security weaknesses in Microsoft’s Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment. “Exploiting these flaws could allow attackers to gain persistent access as shadow administrators

U.S. Army Soldier Arrested in AT&T, Verizon Extortions

Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South…

Vielen CISOs droht der Burnout

loading=”lazy” width=”400px”>Wer seinen CISO verheizt, dem drohen noch mehr Cyberrisiken. Kaspars Grinvalds – shutterstock.com Mit der zunehmend komplexer werdenden Cyber-Bedrohungslage wächst der Stress für die Chief Information Security Officers (CISOs). 57 Prozent der Cyber-Sicherheitsprofis in Deutschland, Österreich und der Schweiz geben an, unter Burnout zu leiden. Das geht aus den Zahlen des Human Risk Review…

ByteDance appears to be skirting US restrictions to buy Nvidia chips: report

TikTok parent company ByteDance has big plans to buy Nvidia chips in 2025 — despite U.S. restrictions. ByteDance plans to spend $7 billion on the chips in 2025, according to reporting from The Information, citing inside sources. If ByteDance follows through, it will become one of the world’s top owners of Nvidia chips, despite U.S. efforts…

Treasury workstations hacked by China-linked threat actors

The Department of Treasury was notified earlier this month that several of its workstations were hacked by a group believed to be linked to China, the department confirmed to CyberScoop. According to a letter sent Monday to leaders on the Senate Committee on Banking, Housing and Urban Affairs and obtained by CyberScoop, the compromises occurred…

From AI agents to enterprise budgets, 20 VCs share their predictions on enterprise tech in 2025

While AI is lauded by some as the biggest technological breakthrough since the industrial revolution, enterprises — arguably the tech’s biggest potential customer base — have been slow to adopt AI. While some investors predicted that 2024 would be the year we’d start to see more AI adoption by enterprises, that didn’t play out as…

Blue Origin looks to take on SpaceX dominance with New Glenn launch days away

Nearly a quarter century after its founding, Jeff Bezos’ Blue Origin is gearing up to launch an orbital rocket for the first time — and finally enter the competitive launch industry that is currently dominated by SpaceX.  Company executives have maintained that they are planning to launch the towering rocket, called New Glenn, before the…

Thousands of industrial routers vulnerable to command injection flaw 

Thousands of industrial routers from a Chinese telecommunications equipment manufacturer are vulnerable to a post-authentication vulnerability, with indications it is already being exploited in the wild to infect devices with Mirai malware. On Dec. 27, VulnCheck detailed the vulnerability, tracked as CVE-2024-12856, wherein an attacker can leverage default credentials in Four-Faith F3x24 and F3x36 routers…

Nonprofit group joins Elon Musk’s effort to block OpenAI’s for-profit transition

Encode, the nonprofit organization that co-sponsored California’s ill-fated SB 1047 AI safety legislation, has requested permission to file an amicus brief in support of Elon Musk’s injunction to halt OpenAI’s transition to a for-profit company. In a proposed brief submitted to the U.S. District Court for the Northern District of California Friday afternoon, counsel for…

Apple TV+ will be free to stream this weekend

Apple is allowing anyone to access its Apple TV+ streaming service for free this weekend, January 4 and 5. The company made the announcement on Monday alongside a short video featuring its most popular TV shows, including “Severance,” “Slow Horses,” “Shrinking,” and more. It’s worth noting that this is the first time that Apple has…

Bench to be acquired after abruptly shutting down

Bench, the VC-backed accounting startup that left thousands of customers locked out of their accounts after it suddenly shut down last week, will be acquired by Employer.com for an undisclosed price in a last-minute deal, TechCrunch has exclusively learned. The San Francisco-based HR tech company Employer.com focuses on payroll and onboarding, in contrast to Bench,…

Nvidia completes acquisition of AI infrastructure startup Run:ai

Nvidia has completed its acquisition of Run:ai, an Israeli startup that helps manage and optimize AI hardware infrastructure. As part of the merger, Run:ai said its software, which currently only works with Nvidia products, will be open sourced, meaning Nvidia rivals like AMD and Intel will be able to adapt it for their hardware. “We…

UK antitrust watchdog launches review of IBM’s HashiCorp takeover

The Competition and Markets Authority, the U.K.’s antitrust watchdog, has opened an investigation into whether IBM’s planned acquisition of cloud software vendor HashiCorp would affect competition. The CMA said Monday it was inviting comment on the merger from interested parties by January 16. The regulator set a provisional February 25 deadline to decide whether to…

Backed by a16z and QED, Brazilian startup Carecode puts AI agents to work on healthcare

AI holds huge promise for healthcare, but not just on the medical side; many startups are convinced machine learning-based systems can do a lot of good on adjacent tasks such as appointment scheduling and confirmations. Brazilian startup Carecode is among these AI believers. It’s coming out of stealth with an ambition to reduce healthcare costs…

Mercedes-backed Volocopter files for bankruptcy

German electric air taxi company Volocopter has filed for bankruptcy protection, the latest in a string of similar startups to hit financial turbulence. The company plans to keep operating while it searches for new investors. “We are ahead of our industry peers in our technological, flight test, and certification progress. That makes us an attractive…

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients’ data against potential cyber attacks. The proposal, which seeks to modify the Health Insurance Portability and Accountability Act (HIPAA) of 1996, is part of a broader…

Calo raises $25 million to expand its ready-to-eat meal service beyond the Middle East

A business built around increasingly customized ready-to-eat meals has netted Middle Eastern startup Calo a sizeable funding injection as it looks to expand both what it can offer its time-strapped customers and where it delivers its growing range of just-heat-to-eat dishes. The meal delivery market in the Middle East will hit $11.2 billion by 2030,…

Verizon says it has secured its network after breach by China-linked Salt Typhoon group

U.S. telecom giant Verizon says it has secured its network after being targeted by the China-linked Salt Typhoon cyberespionage group. In a statement given to TechCrunch on Sunday, Verizon spokesperson Richard Young said the company has “contained the cyber incident brought on by this nation-state threat actor,” and that it has not detected any threat actor…

NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester

SANTA CLARA, Calif., December 30, 2024 – We are thrilled to announce that NSFOCUS was selected as the notable vendor of Forrester The Security Analytics Platform Landscape, Q4 by its ISOP (Intelligent Security Operations Platform) with built-in NSFGPT AI assistant and AI-empowered security operation scenarios. “The security analytics platform is the core of the security…

WordPress Appliance - Powered by TurnKey Linux