Geek-Guy.com

Month: December 2024

An investigation finds that Google Maps fails users in the West Bank 

A Wired investigation found that Google Maps can be near impossible to use in the West Bank, especially since the start of the war. Users told the publication that the navigation app would direct them into walls, fail to account for time-consuming checkpoints, or steer them onto restricted roads leading to Israeli settlements, which can…

Judge grants ruling in favor of WhatsApp against spyware firm NSO Group

A federal judge has dealt the first major legal blow against spyware maker NSO Group, ruling in favor of WhatsApp in a five-year-old lawsuit against the Israeli firm over allegations that it hacked the chat service. Northern California District Court Judge Phyllis Hamilton made her ruling on Friday as a summary judgment, thus not requiring…

Coralogix acquires AI observability platform Aporia

Coralogix, the well-funded observability platform, on Monday announced that it has acquired Aporia, a startup that focuses on giving businesses tools to observe and secure their AI workloads, as well as set guardrails for them to avoid hallucinations or unintended disclosures. As part of this acquisition, Coralogix will launch a dedicated AI research center, Coralogix…

Eero’s Outdoor 7 long-distance mesh unit solved our yearslong Wi-Fi quandary in 10 minutes

So far in life, I haven’t needed be a “mesh guy.” A well chosen and carefully placed Wi-Fi router has worked fine in our modest abodes, but one particular situation has resisted simple solutions until Eero put out a device in November seemingly made exactly for the purpose. This won’t be a thorough examination of…

Instagram tests a way to show you Story Highlights you didn’t get a chance to see

Instagram is testing a way for you to see content from friends that you might have missed. The social network has started displaying unseen Story Highlights from a user’s mutual followers at the end of the Stories tray, which is the area at the top of your feed where you see Stories from your friends.…

A popular technique to make AI more efficient has drawbacks

One of the most widely used techniques to make AI models more efficient, quantization, has limits — and the industry could be fast approaching them. In the context of AI, quantization refers to lowering the number of bits — the smallest units a computer can process — needed to represent information. Consider this analogy: When…

Yoast CEO calls for a ‘federated’ approach to WordPress repository

Days after web hosting provider WP Engine won a preliminary injunction against WordPress co-creator Matt Mullenweg and rival hosting provider Automattic, Mullenweg announced that WordPress.org is taking a holiday break. WordPress.com — a site that provides access to WordPress plug-ins, themes, and other artifacts to the community — will take a break from providing free…

Honda and Nissan plan major merger focused on ‘intelligence and electrification’

Japanese car giants Honda and Nissan are working out the details of a major merger that could create the world’s third-largest automaker, as the companies look to survive in an industry faced with uncertainty. The Tesla-led shift towards electric vehicles, and China’s increased importance in the automotive market, have companies like Honda and Nissan feeling…

DEF CON 32 – Hacker Jeopardy – Night 2

Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Hacker Jeopardy – Night 2 appeared first on Security Boulevard.

The Top 5 Kubernetes CVEs of 2024: Have You Patched Them Yet?

Keeping up to date with critical vulnerabilities related to Kubernetes can be challenging for a variety of reasons. The biggest one may be related to Kubernetes itself; it’s a complex and rapidly evolving platform, with regular updates and new features being introduced regularly (not to mention updates to APIs and add-ons). Kubernetes environments are scalable…

Mission Cloud’s AWS Success: Growth, CDW Deal & What’s Next

Mission Cloud had a banner year in 2024, including growth with AWS, a new partnership with CrowdStrike, and being acquired by global technology company and services provider CDW. Channel Insider spoke with Mission Cloud President Ted Stuart to learn more about the solutions provider’s next steps as a newly acquired company. Mission Cloud’s AWS focus…

Plaud.AI brings the perfect AI note-taking assistant for all your meetings, thoughts, and interactions

Well, I’m impressed. Plaud.AI brings to the table an attractive, seamless wearable that records your meetings and then uses AI to analyse it and create meaningful summaries with individual speakers identified and to-do items picked out. And it actually works. There’s no hype, no empty promises; instead it’s true assistive AI for the person-on-the-go.

Feds lay blame while Chinese telecom attack continues

The United States’ telecommunications infrastructure has been infiltrated by actors affiliated with China. Some of our nation’s most powerful leaders have been targeted — including President-elect Donald Trump and Vice President-elect JD Vance. This is one of the most severe cybersecurity incidents against telecom the United States has ever been subject to, and — worse…

Peter Shor Broke PKI with Ancient Math, and Futuristic Quantum Computing

Peter Shor revolutionized public-key infrastructure (PKI) using concepts that trace back to 4,000-year-old Babylonian mathematics and culminated in futuristic quantum computing. Here, we explore the math with a simple, illustrative tool to break PKI by hand. The Theme: Simple Math Meets Cybersecurity This blog delves into the math behind (breaking) cryptography, aligning with the theme…

Best of 2024: National Public Data Sued for Hack that Exposed Data of 2.9 Billion People

National Public Data, a background check company that collects sensitive personal information, is facing a class-action legal complaint for allowing the data from 2.9 billion people to be stolen in a breach and later sold on the dark web for millions of dollars. The post Best of 2024: National Public Data Sued for Hack that…

Prosus buys Despegar for $1.7B, taking a bite out of Latin America’s travel sector

Yet another major investment is going down in the travel sector, underscoring its ongoing rebound after the Covid-19 pandemic. Prosus, the tech conglomerate controlled by Naspers, is paying $1.7 billion to acquire Despegar, one of the biggest online travel agencies in Latin America, to scale up its operations in the region. Despegar’s board of directors…

Best Patch Management Software (2024): Compare Features & Pricing

Patch management software ensures that known vulnerabilities are patched efficiently to prevent breaches while streamlining IT workflows. Find the best patch management solution for your business.

Best Patch Management Software (2024): Compare Features & Pricing

Patch management software ensures that known vulnerabilities are patched efficiently to prevent breaches while streamlining IT workflows. Find the best patch management solution for your business.

Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service

An interruption to the phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA has led to a rapid uptick in activity from another nascent offering named FlowerStorm. “It appears that the [Rockstar2FA] group running the service experienced at least a partial collapse of its infrastructure, with pages associated with the service no longer reachable,” Sophos said in a…

Top 10 Cybersecurity Trends to Expect in 2025

The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats, increased regulation, and rapidly evolving technology. In 2025, organizations will be challenged with protecting sensitive information for their customers while continuing to provide seamless and easy user experiences. Here’s a closer look at ten emerging challenges and threats set to shape the

Top 7 zero-day exploitation trends of 2024

Zero-day vulnerabilities saw big growth once again in 2024. With no patch available, zero-day flaws give attackers a significant jump on cybersecurity defense teams, making them a critical weapon for attacking enterprise systems. But while all zero-days are essential for CISOs and their team to be aware of, and for vendors to remedy in a…

AppViewX 2025 Predictions: Machine Identity Security, Certificate Lifecycle Management and PKI

In 2024, we certainly witnessed some interesting trends and disruptions in machine and non-human management, certificate lifecycle management (CLM), and PKI. In research from the Enterprise Strategy Group, non-human (machine) identities are outnumbering human identities in enterprise environments by more than 20:1. Following on Google’s previous proposal on reducing TLS certificate validity to 90 days,…

Italy Fines OpenAI €15 Million for ChatGPT GDPR Data Privacy Violations

Italy’s data protection authority has fined ChatGPT maker OpenAI a fine of €15 million ($15.66 million) over how the generative artificial intelligence application handles personal data. The fine comes nearly a year after the Garante found that ChatGPT processed users’ information to train its service in violation of the European Union’s General Data Protection Regulation…

4 Wege zu neuer Cyberabwehrstärke

Generative AI kann traditionellen Sicherheitsmaßnahmen neuen “Schwung” verleihen. Henri Studios | shutterstock.com Von Smartphones und Wearables über IoT-Geräte bis hin zu Cloud-Infrastrukturen – die Bandbreite und Komplexität unseres digitalen Ökosystems nimmt weiterhin in beispiellosem Tempo zu. Parallel wächst auch die Zahl der Schwachstellen und Backdoors, was sich in verheerenden Cyberattacken manifestiert. Nur drei Beispiele aus…

X jacks up Premium+ prices 37.5%, hits some markets harder

X is raising prices for its top-tier subscription service by 37.5%, marking the largest price increase since the platform’s acquisition by Elon Musk in 2022. The Premium+ service will cost $22 monthly in the U.S., up from $16, effective December 21, according to a company statement. Annual subscriptions will increase to $229 from $168. X…

Sriram Krishnan named Trump’s senior policy advisor for AI

Incoming president Donald Trump has confirmed reports that Sriram Krishnan, until recently a general partner at Andreessen Horowitz (a16z), will serve as senior policy advisor for AI at the White House Office of Science and Technology Policy. Trump said in a statement that Krishnan will “help shape and coordinate AI policy across government, working with…

Palantir and Anduril reportedly building a tech consortium to bid on defense contracts

Two big defense tech players, Palantir and Anduril, are talking to tech companies including SpaceX, OpenAI, Saronic, and Scale AI about forming a consortium to bid on Pentagon contracts, according to a report in the Financial Times. The goal, the FT says, is to challenge the dominance of “prime” defense contractors like Lockheed Martin, Raytheon,…

Harnessing Innovation in Machine Identity Management

How Does Innovation Impact Machine Identity Management? Imagine an environment where machine identities are as secure as human identities, where every “tourist” in the system is accounted for, their “passports” encrypted and secure. This is the goal of Non-Human Identity (NHI) management. But how is such a task undertaken? The answer lies in harnessing innovation.…

Building Trust with Efficient Privileged Access Management

Why is Privileged Access Management Crucial? Does it ever cross your mind how privileged access management plays a significant role in safeguarding your organization’s data and systems? With a largely digitalized economy, the landscape of potential security threats has dramatically shifted, introducing us to the likes of Non-Human Identities (NHIs) and the vast complexities they…

Protected Access: Enhancing Cloud IAM Strategies

Unpacking the Importance of Non-Human Identities (NHIs) in Cloud Security Can we imagine a world where Non-Human Identities (NHIs) weren’t instrumental to our cybersecurity strategies? NHIs, or machine identities, perform an irreplaceable function in today’s environment, where businesses are increasingly migrating their operations to the cloud. They are the unheralded heroes, working tirelessly behind the…

Capable Compliance through Rigorous Secrets Rotation

Is Your Organization Taking a Rigorous Approach to Secrets Rotation? In today’s advanced technological landscape, ensuring compliance and maintaining a capable security posture is no longer optional. Particularly, the management of Non-Human Identities (NHIs) and secrets rotation has become a cornerstone of robust cybersecurity strategies. The question is, is your organization up to speed with…

Innovations in Handling Cloud-Based Secret Sprawl

Have You Ever Wondered about the Management of Cloud-Based Secret Sprawl? With the rapid digital transformation and the upsurge in cloud computing, enterprises are continually looking for innovative strategies to manage the ever-increasing avalanche of non-human identities (NHIs) and secrets with minimum risk and maximum efficiency. This necessity has given rise to the urgent need…

Ensure Certainty with Advanced Threat Detection Methods

Why Advanced Threat Detection Matters? Ever wondered why organizations across various sectors -financial services, healthcare, travel, and DevOps, are placing great emphasis on advanced threat detection? Well, the reason lies in our increasingly digitized economy, where securing digital assets has become a high priority. More so, when we recognize that these digital assets are not…

Trump says he wants to keep TikTok around ‘for a little while’

With a US TikTok ban scheduled to take effect in less than a month, President-elect Donald Trump said Sunday that he’d like to keep the app around, according to Reuters. “We’re going to have to start thinking because, you know, we did go on TikTok, and we had a great response with billions of views,…

Understanding Cyber Threats During the Holiday Season

Understanding Cyber Threats During the Holiday Season Understanding Cyber Threats During the Holiday Season The holiday season, while festive, presents heightened cybersecurity risks for businesses. Cybercriminals exploit increased online activity and reduced vigilance during this period. Understanding these threats is crucial for effective defense. The holiday season, while festive, presents heightened cybersecurity risks for businesses.…

OpenAI trained o1 and o3 to ‘think’ about its safety policy

OpenAI announced a new family of AI reasoning models on Friday, o3, which the startup claims to be more advanced than o1 or anything else it’s released. These improvements appear to have come from scaling test-time compute, something we wrote about last month, but OpenAI also says it used a new safety paradigm to train…

The biggest flops and fizzles in 2024 transportation, from Apple Car to Fisker

Autonomous vehicle technology and electrification startups were once the darlings of the VC and corporate world. The two technologies promised billions of dollars in revenue — and a new pathway for automakers to make money beyond building and selling cars.  Those VC-money-printing days have been over for AVs for a while now, with a few…

Apple might be working on a smart doorbell

There’s been a lot of reporting in recent months around Apple’s efforts to expand its footprint in customers’ homes with in-development products like a wall-mounted smart home hub. According to a new report in Bloomberg, that strategy could also include a smart doorbell. This doorbell would use Apple’s FaceID technology to scan people’s faces as…

DEF CON 32 – NTLM: The Last Ride

Authors/Presenters: Jim Rush, Tomais Williamson Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – NTLM: The Last Ride appeared first on Security…

OpenAI announces new o3 model — but you can’t use it yet

Welcome back to Week in Review. This week, we’re looking at OpenAI’s last — and biggest — announcement from its “12 Days of OpenAI” event; Apple’s potential entrance into the foldable market; and why Databricks is choosing to wait to go public. Let’s get into it. P.S. We’re off for the holidays! Week in Review…

Google pushes back against DOJ’s ‘interventionist’ remedies in antitrust case

Google has offered up its own proposal in a recent antitrust case that saw the US Department of Justice argue that Google must sell its Chrome browser. US District Court Judge Amit Mehta ruled in August that Google had acted illegally to maintain a monopoly in online search, with the DOJ then proposing a number…

DEF CON 32 – Laundering Money

Author/Presenter: Michael Orlitzky Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Laundering Money appeared first on Security Boulevard.

DEF CON 32 – Grand Theft Actions Abusing Self Hosted GitHub Runners

Authors/Presenters: Adnan Khan, John Stawinski Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Grand Theft Actions Abusing Self Hosted GitHub Runners…

Is Your Company’s Website Compromising Customer Data?

If you are a security, compliance, and privacy professional, it’s time to focus on an often-ignored issue—client-side security. While many organizations dedicate significant resources to protecting their servers, there’s a critical question to consider: are you also safeguarding what’s happening on your users’ browsers? Every time a user visits your website, their browser downloads and…

Meet Skyseed, a VC fund and incubator backing the Bluesky and AT Protocol ecosystem

On November 15, Peter Wang posted a message requesting ideas for a new incubator and fund to support experimental projects built on the burgeoning Bluesky/AT Protocol ecosystem. Four weeks later, Skyseed emerged with an initial commitment of $1 million. This turnaround, a speed underscored by the fact that the fund doesn’t even have a website…

LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages

A dual Russian and Israeli national has been charged in the United States for allegedly being the developer of the now-defunct LockBit ransomware-as-a-service (RaaS) operation since its inception in or around 2019 through at least February 2024. Rostislav Panev, 51, was arrested in Israel earlier this August and is currently awaiting extradition, the U.S. Department…

EV startup Canoo places remaining employees on a ‘mandatory unpaid break’

Struggling electric van startup Canoo has placed its remaining employees on what it’s calling a “mandatory unpaid break” through at least the end of the year, according to an email obtained by TechCrunch. The company told employees they are being locked out of Canoo’s systems at the end of the day Friday, according to the…

Navigating the Future of Secure Code Signing and Cryptography

In today’s interconnected world, the integrity of software has never been more critical. With the increasing reliance on open-source components and the complexities introduced by containerized applications, ensuring trust in software has become a cornerstone of modern security practices. I […] The post Navigating the Future of Secure Code Signing and Cryptography appeared first on…

WordPress Appliance - Powered by TurnKey Linux