Geek-Guy.com

Month: December 2024

In just 4 months AI coding assistant Cursor raised another $100M at a $2.5B valuation led by Thrive, sources say

Anysphere, the developer of AI-powered coding assistant Cursor, raised $100 million Series B at a post-money valuation of $2.6 billion, according to sources with knowledge of the deal. The round is being led by returning investor Thrive Capital, the person said.  This new funding comes just four months after Anysphere raised its $60 million Series…

What Is Privilege Escalation? Types, Examples, and Prevention

Privilege escalation is a critical cybersecurity threat in which a user—usually a malicious actor—gains access to data beyond what their account permissions allow. Attackers can gain this access through human error, stolen credentials, or social engineering.  The post What Is Privilege Escalation? Types, Examples, and Prevention appeared first on Security Boulevard.

Detection as Code: Key Components, Tools, and More

As software development accelerates, the need to identify threats and respond in real time is greater than ever. Detection as Code (DaC) allows you to write, maintain, and automate your threat detection logic as if it were software code, making security a built-in part of the development pipeline. The post Detection as Code: Key Components,…

Kubernetes Secrets: How to Create and Use Them

Kubernetes, also known as K8s, is a powerful platform for orchestrating containers in complex, distributed environments. Among its many features, Kubernetes has Secrets, which safeguard sensitive information like API keys, passwords, and tokens in a cluster. By separating confidential data from application code, Kubernetes Secrets reduce the risk of exposure during workflows and deployments.  The…

Tapestry, a new app for tracking social media, news, blogs, and more, will launch in ‘early 2025’

A new app called Tapestry promising to unify social media, news, and RSS in one place, is nearing completion. Designed by Iconfactory, the same team that created the third-party Twitter client Twitterific back in the day, Tapestry was unveiled at the beginning of the year as a tool that could better organize today’s fragmented online…

Waymo fills the Cruise void overseas and a salute to icon Jean Jennings

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. This will be the last newsletter of 2024! But don’t worry, we’ll be back in 2025 — sign up here to get it in your inbox every week. Thank you for reading and your emails. I love…

Instagram teases AI tools for editing appearances, backgrounds in videos using prompts

Instagram head Adam Mosseri is teasing upcoming generative AI features for the social app that will allow creators to “change nearly any aspect” of their videos using text prompts. The editing tools will be powered by Meta’s Movie Gen AI model, and are expected to launch on the social network sometime next year, Mosseri said…

Top 5 No-Code and Low-Code Tools of 2025

No-code and low-code tools have revolutionized software development by enabling all kinds of users to create powerful applications without requiring extensive coding expertise. These tools empower developers and non-developers alike to automate workflows, build websites, and create mobile apps using intuitive drag-and-drop interfaces, pre-built templates, and seamless integrations. It doesn’t matter whether you’re a small…

Over 20 venture firms pledge to not take money from China, Russia 

Founders now have a way to ensure that their investors haven’t taken money from countries like China, Russia, Iran or Cuba.  Over 20 venture firms have signed the Clean Capital Certification, attesting that they have not and will not take money from foreign adversaries. Some of the firms that have signed include Marlinspike Partners, Humba…

Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm

Cybercriminals are selling hundreds of thousands of credential sets stolen with the help of a cracked version of Acunetix, a powerful commercial web app vulnerability scanner, new research finds. The cracked software is being resold as a cloud-based attack tool by at least two different services, one of which KrebsOnSecurity traced to an information technology…

World(coin) must let Europeans comprehensively delete their data, under privacy order

It took a lot more than the initially slated few weeks to arrive, but a pivotal privacy decision that’s been hanging over Sam Altman’s World (aka Worldcoin) for months has finally landed, via a late December decision from the Bavarian data protection authority enforcing the bloc’s General Data Protection Regulation (GDPR), a comprehensive privacy framework…

Chinese cyber center points finger at U.S. over alleged cyberattacks to steal trade secrets

China’s national cyber incident response center accused the U.S. government of launching cyberattacks against two Chinese tech companies in a bid to steal trade secrets. In a notice Wednesday, the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT) said a suspected U.S. intelligence agency was behind the attacks, and that CNCERT had…

Kindo Unveils New Channel Partner Program for AI-Powered DevSecOps Solutions

Cybersecurity company, Kindo, is launching a new channel partner program aimed at empowering value-added resellers (VARs), MSPs, and other partners to deliver their AI-augmented security operations to DevSecOps teams on a global scale to accelerate growth and expand market reach. Program signals Kindo’s desire for mutual success According to the company, its channel partner program…

Smashing Security podcast #398: Fake CAPTCHAs, Harmageddon, and Krispy Kreme

This week, we delve into the dark world of fake CAPTCHAs designed to hijack your computer. Plus, the AI safety clock is ticking down – is doomsday closer than we think? And to top it off, we uncover the sticky situation of Krispy Kreme facing a ransomware attack. All this and more is discussed in…

Data Security in 2025: Five Steps to Strategic Success in 2025

As 2024 comes to a close, IT security and business leaders will be braced for another challenging year ahead. In the long-term, economic uncertainty and geopolitical instability seem set to continue, creating the conditions in which threat actors thrive. They will increasingly have the tools at their disposal to launch more impactful cyber-attacks in greater…

Ukrainian sentenced to five years in jail for work on Raccoon Stealer

Ukrainian national Mark Sokolovsky was sentenced Wednesday to five years in federal prison for his role in operating Raccoon Infostealer malware, which infiltrated millions of computers worldwide to steal personal data. According to court documents, Sokolovsky, 28, was integral to operations that allowed the leasing of Raccoon Infostealer for $200 per month, payable via cryptocurrency.…

Radware expands AI-driven application and network protection for a top 5 bank in Italy

Addresses rising Web DDoS attacks and DORA compliance deadline COMPANY NEWS: Radware, a global leader in application security and delivery solutions for multi-cloud environments, announced it expanded its agreement with one of Italy’s top 5 banks. Based on the agreement, the financial institution will use Radware’s end-to-end suite of network and application security and application…

Tesla is courting Texas cities to test its promised robotaxi service

Tesla is evaluating multiple Texas cities where it wants to test a long-promised robotaxi service, including Austin, according to emails obtained by Bloomberg News. An employee has apparently been in touch with Austin officials since May, and recently held an event in December to “train first responders on how to best work with Tesla’s autonomous…

Hotel booking platform Safara raises $14M, acquires rival Skipper

Doug Schuessler has always been a founder. This passion, which has been with him since childhood, saw him launch two startups, move to San Francisco, and take a job at Square to see what a “real rocket shop looked like.” He later became chief revenue officer at restaurant booking platform Resy, before becoming a founder once…

Machine Identity Was the Focus at Gartner’s IAM Summit

Last week’s Gartner IAM Summit in Grapevine, Texas, was a whirlwind of insights, particularly around machine identity management (MIM). The event underscored the transformative trends and challenges shaping the domain, providing both thought leadership and actionable strategies for businesses navigating these complexities. Expanding IAM to Embrace Machine and Non-Human Identities Human identity management and machine…

Culina Health nabs $7.9M to provide virtual access to registered dietitians

As a dietitian, Vanessa Rissetto’s main goal is to help people stay healthy. She also knew that there were some roadblocks to achieving that. For example, the Black community deals with pressing health concerns, in addition to a disproportionate lack of access to care. More than 80% of registered dietitians in the U.S. are white,…

Decart adds another $32M at a $500M+ valuation

A young startup that emerged from stealth less than two months ago with big-name backers and bigger ambitions to make a splash in the world of AI is returning to the spotlight.  Decart is building what its CEO and co-founder Dean Leitersdorf describes as “a fully vertically integrated AI research lab,” alongside enterprise and consumer…

From reactive to proactive: Redefining incident response with unified, cloud-native XDR

In today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The average security operations center (SOC) team receives 4,484 alerts every day and can spend up to 3 hours manually triaging to understand which signals represent a genuine threat and which are just noise. However, this model traps SOCs in…

Oura closes $200M round, bringing its valuation to $5.2B

Smart ring maker Oura announced on Thursday that it has closed a $200 million Series D funding round, bringing the company’s valuation to $5.2 billion. The round included participation from Fidelity Management and glucose device maker Dexcom. Oura says the new capital will allow it to expand its product offerings and further invest in product, science,…

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools

Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve second-stage payloads, respectively. “While typosquatting attacks are

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Juniper Networks is warning that Session Smart Router (SSR) products with default passwords are being targeted as part of a malicious campaign that deploys the Mirai botnet malware. The company said it’s issuing the advisory after “several customers” reported anomalous behavior on their Session Smart Network (SSN) platforms on December 11, 2024. “These systems have…

With Neverless, former Revolut execs want to make meme coins easy to buy

There’s an ocean of meme coins beyond Dogecoin, and a new startup called Neverless wants to make it easier to get started with trading crypto, with a particular focus on providing access to small-cap tokens. This is an interesting new crypto startup, founded by three former executives at Revolut, the London-based fintech juggernaut. Phuc To…

Veeam, the world’s #1 leader in data resilience, welcomes new investors with a $15 billion valuation

Insight Partners owned Veeam expands investor base in a $2 billion secondary equity offering led by TPG with participation from Temasek, Neuberger Berman Capital Solutions, and others COMPANY NEWS: – Veeam® Software, the #1 global leader in Data Resilience by market share, announced an expansion of its shareholder base in a $2 billion secondary offering,…

The year in ransomware: Security lessons to help you stay one step ahead

Operation Cronos, a Europol-led coalition of law enforcement agencies from 10 countries, announced in February that it had disrupted LockBit — one of the most prolific ransomware gangs in the world — at “every level” of its operations. Being responsible for 25% to 33% of all ransomware attacks in 2023, LockBit had become target No.…

North Korea-linked hackers accounted for 61% of all crypto stolen in 2024

With the rising adoption and value of crypto assets, the potential for theft is also on the rise. This year, the total value of cryptocurrency stolen surged 21%, reaching a substantial $2.2 billion. And according to a Chainalysis report released on Thursday, more than half of this amount was stolen by North Korea-affiliated hacking groups.…

The promise and warning of Truth Terminal, the AI bot that secured $50,000 in Bitcoin from Marc Andreessen

“I think the most ironic way the world could end would be if someone makes a memecoin about a man’s stretched anus and it brings about the singularity.” That’s Andy Ayrey, the founder of decentralized AI alignment research lab Upward Spiral, who is also behind the viral AI bot Truth Terminal. You might have heard…

AI-powered networks and Wi-Fi 7

GUEST OPINION:  “Data growth is driving network infrastructure modernisation in Australia, fuelled by AI-powered applications and IoT devices. With increasing demands from businesses and consumers, the network is more crucial than ever. By 2025, Australian networks are expected to be more scalable, agile, AI-ready, flexible, intelligent and secure, with Wi-Fi 7 leading the charge. 

EU asks for views on plan to force Apple to open up iOS

The European Commission has published draft proposals for how Apple must meet interoperability requirements flowing from the bloc’s Digital Markets Act (DMA) — inviting feedback on proposed measures targeted at areas like iOS notifications, data transfer, and device set-up by January 9, 2025. European Union regulators then have until around mid March to adopt final…

US eyes ban on TP-Link routers amid cybersecurity concerns

The US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for American homes and small businesses, amid concerns about national security risks. Reports suggest these routers have vulnerabilities that cybercriminals exploit to compromise sensitive enterprise data. Investigations by the Commerce, Defense, and Justice Departments indicate that the routers may have…

Balancing security and customer experience: 4 tips for fraud prevention during peak seasons

GUEST OPINION:  Consumers spend billions during the end-of-year shopping season, with businesses on Stripe processing over AUD 47 billion globally over the Black Friday/Cyber Monday weekend. Pre-Christmas sales in Australia are expected to grow by 2.7% from last year. With increased activity meaning the potential for more fraud, one important way retailers can make the most…

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits

Fortinet has issued an advisory for a now-patched critical security flaw impacting Wireless LAN Manager (FortiWLM) that could lead to disclosure of sensitive information. The vulnerability, tracked as CVE-2023-34990, carries a CVSS score of 9.6 out of a maximum of 10.0. “A relative path traversal [CWE-23] in FortiWLM may allow a remote unauthenticated attacker to…

Anatomy of a 6-day Credential Stuffing Attack From 2.2M Residential IPs

In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service company (spoiler: there were some pretty clear signs of device spoofing, as you’ll see below). By the end of the bot attack, which lasted 6 days, Castle blocked The post Anatomy of a 6-day Credential…

Apple and Meta go to war over interoperability vs. privacy

Apple and Meta are warring in Europe over the balance between interoperability and privacy, Reuters reports. The fight focuses on the European Union’s Digital Markets Act (DMA), a competition regulation that requires designated gatekeepers (including Apple and Meta) not to restrict rivals’ access to so-called core platform services. In Apple’s case, this means: iOS, iPadOS,…

After raising $26M, Hyme Energy signs global deal to scale thermal storage

With lithium battery storage too weak for many industries, companies are desperately looking elsewhere for energy storage. Molten-salt batteries offer high energy and power density, and can work for long periods. Now, Denmark’s Hyme Energy — which has raised $26 million to date — has signed a deal which could see its technology scale to…

CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01, ordering federal civilian agencies to secure their cloud environments and abide by Secure Cloud Business Applications (SCuBA) secure configuration baselines. “Recent cybersecurity incidents highlight the significant risks posed by misconfigurations and weak security controls,

Turning Insights into Action: The Importance of Vulnerability Remediation after VAPT

Vulnerability Assessment and Penetration Testing (VAPT) has become an essential practice for organizations aiming to secure their digital assets. However, identifying vulnerabilities is only half the battle; the real challenge lies in addressing them effectively. This is where vulnerability remediation comes into play. It is the critical step that turns insights from VAPT into actionable…

BlueQubit raises $10M to take Quantum software into real-world applications

Integrating quantum computing into real-world computer applications is an ongoing problem, as the platforms are architected fundamentally differently. BlueQubit, a San Francisco-based quantum software startup founded by Stanford alumni, thinks it might have the answer.  Its Quantum Software as a Service (QSaaS) platform attempts to tackle the above problem by providing end-users with access to…

Indian startups raised 32% fewer rounds in 2024 as VCs got selective

Indian startups raised 32% fewer funding rounds in 2024 compared to last year, per new numbers from data intelligence platform Tracxn, signaling that investors are being more selective when striking deals. The number of startup funding rounds fell to 1,448 compared to 2,114 last year, but overall funding rose 6% to $11.3 billion — the…

Die 10 häufigsten LLM-Schwachstellen

Diese Schwachstellen sollten Sie kennen, damit Ihnen Ihr Large Language Model nicht um die Ohren fliegt. VectorMine | shutterstock.com Das Open Worldwide Application Security Project (OWASP) hat seine Top Ten der kritischsten Schwachstellen bei Large Language Models (LLMs) aktualisiert. Mit ihrer Top-Ten-Liste (PDF) wollen die OWASP-Security-Experten Unternehmen(sanwender) über die potenziellen Risiken beim Einsatz von großen…

Sehr geehrter CEO,

Mit einem offenen Brief appelliert CISO-Veteran Tyler Farrar an die CEOs dieser Welt. fizkes | shutterstock.com Nie stand mehr auf dem Spiel. Jede Woche machen neue Cybersicherheitsvorfälle Schlagzeilen, kosten Millionen, fügen der Reputation von Unternehmen irreparablen Schaden zu und treten neue Wellen der Verunsicherung los, die sich gleichermaßen auf Kunden und Stakeholder auswirken. Die wesentliche…

In potential reversal, European authorities say AI can indeed use personal data — without consent — for training

The European Data Protection Board (EDPB) issued a wide-ranging report on Wednesday exploring the many complexities and intricacies of modern AI model development. It said that it was open to potentially allowing personal data, without owner’s consent, to train models, as long as the finished application does not reveal any of that private information. This…

‘We want to pay it forward’: Funding Societies raises $25M to boost capital for SMEs in Southeast Asia

Small and medium-sized enterprises (SMEs) account for nearly 50% of Southeast Asia’s GDP, contributing to job creation, innovation, and overall economic expansion. Nevertheless, as in other parts of the world, SMEs in Southeast Asia face challenges when it comes to sufficient working capital. In a nutshell, SMEs are typically deemed too risky for traditional banks…

Video: How To Run Your IT Business With MSP Unplugged

In Part 1 of this two part episode of Channel Insider: Partner POV, host Katie Bavoso is joined by two of the three hosts of what some say is the longest running MSP podcast, MSP Unplugged. Paco Lebron and Corey Kirkendoll are both CEOs of their managed services businesses. Lebron runs ProdigyTeks out of Chicago,…

WordPress Appliance - Powered by TurnKey Linux