Geek-Guy.com

Month: January 2025

Russian-Speaking Attackers Target Ethereum Devs with Fake Hardhat npm Packages

Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated these platforms through malicious npm packages, exfiltrating critical data such as private keys, mnemonics,

Personal liability sours 70% of CISOs on their role

With legal accountability tightening around those charged with maintaining enterprise cybersecurity, security leaders appear to be increasingly frustrated with their roles, eyeing the exit, and hesitant to pursue CISO gigs in the future.  More than two thirds (70%) of CISOs recently surveyed said that “stories of CISOs being held personally liable for cybersecurity incidents has…

12 cybersecurity resolutions for 2025

As cyber threats continue to evolve, CISOs must prepare for an increasingly complex threat landscape. From dealing with AI-driven attacks to managing changing regulatory requirements, it’s clear that 2025 will be another big year for CISOs. But staying ahead requires more than just implementing the next cutting-edge set of tools or technologies. It demands a…

Weekly Update 433

It sounds easy – “just verify people’s age before they access the service” – but whether we’re talking about porn in the US or Australia’s incoming social media laws, the reality is way more complex than that. There’s no unified approach across jurisdictions and even within a single country like Australia, the closest we’ve got…

Samsung brings live translate to its TVs at CES 2025

At CES 2025, Samsung announced that it’s bringing a popular feature from the company’s phones and tablets to its TVs. Live Translate does what it says on the box, offering users real-time translation for live broadcasts. The feature will work in seven different languages — though it’s not entirely clear which at the time of…

7 fundamentale Cloud-Bedrohungen

Dieser Artikel hilft, Unsicherheiten in Cloud-Umgebungen vorzubeugen. Foto: Roman Samborskyi | shutterstock.com Für jedes Unternehmen, das sich auf die Cloud verlässt, um Services bereitzustellen, steht Cybersicherheit ganz oben auf der Prioritätenliste. Allerdings stellen Anwender in der Regel schnell fest, dass das leichter gesagt als getan ist. Zumindest, wenn Daten und Unternehmens-Assets über die gesamte Online-Infrastruktur…

Withings’ Omnia is a full-size body-scanning health mirror

The Omnia is still very much in concept mode — a phenomenon popular in the automotive world that has since spilled over into consumer electronics. That is to say that Withings’ splashiest product of CES 2025 may never be a product. Among other things, a body-scanning smart mirror would likely be cost prohibitive for consumers.…

OpenAI is beginning to turn its attention to ‘superintelligence’

In a post on his personal blog, OpenAI CEO Sam Altman said that he believes OpenAI “know[s] how to build [artificial general intelligence]” as it has traditionally understood it — and is beginning to turn its aim to “superintelligence.” “We love our current products, but we are here for the glorious future,” Altman wrote in…

This fuzzy, purse-mounted robot is designed to ‘delight bystanders’

Best known for its Qooba cat pillow, Yukai Engineering has made a name for itself with some of the strangest little robots around. Who could forget, for example, Amagami Ham Ham, whose sole purpose is to gnaw on fingers, offering a “somewhat pleasing sensation.” At CES 2025, Yukai unveiled its latest, Mirumi, and it follows…

Timekettle’s new earbuds offer real-time translation on calls

Timekettle unveiled its latest earbuds, the W4 Pro, this week at CES 2025 in Las Vegas. The product aims to up the ante on the startup’s focus by bringing real-time two-way translation to phone and video calls. The earbuds will automatically begin translating calls in 40 different languages, without any input from the user. Predictably, there…

Circular unveils its next gen Ring 2 with ECG functionality and AFib detection at CES 2025

Smart ring maker Circular announced its next-gen Ring 2 with ECG (electrocardiogram) functionality and AFib (atrial fibrillation) detection at CES 2025 Unveiled on Sunday in Las Vegas. The wearable is set to go on sale in February or Mach for $380. The ring’s ECG capability and FDA-cleared AFib detection will gives users the ability to…

Accel could raise billions for India, but it’s sticking to $650 million

Accel has maintained its India fund size at $650 million for its eighth vehicle, even as other venture firms in the region are racing to raise increasingly larger pools of capital. The firm had ample opportunity to raise “multi-billion dollars,” said Shekhar Kirani, partner at Accel, in an interview with TechCrunch. But unlike peers who…

Sam Altman has choice words for the OpenAI board members who fired him

OpenAI CEO Sam Altman has strong words for the former board members who abruptly fired him late last November. “[A]ll those people that I feel, like, really f—ed me and f—ed the company were gone, and now I had to clean up their mess,” he told Bloomberg in a wide-ranging interview. Just over a year…

Toyota’s CES 2025 press conference: How to watch

Five years ago, Toyota Chairman Akio Toyoda went to CES to share with the world his “personal field of dreams” — a plan to build a prototype city on a 175-acre site at the foot of Mount Fuji in Japan, where people would live and work amongst all of Toyota’s projects, including autonomous vehicle technology,…

How Reliable Secret Storage Enhances Cloud Security

Why is Effective Secret Storage So Crucial to Cloud Security? In an increasingly digitized world where every information is stored in the digital form, it’s crucial to question: how are these confidential secrets stored, and how do they affect our overall cloud security? This question lies at the heart of effective data protection strategies today.…

Unlocking the Potential of Machine Identity Management

The Untapped Potential of Machine Identity Management Are you aligning your cybersecurity efforts with the contemporary needs and trends? Organizations often overlook the significance and strategic depth of Non-Human Identities (NHIs) and Secrets Security Management. This lapse can expose businesses, particularly those operating in the cloud, to potential security breaches and data leaks. The Concept…

Feel Supported by Advanced Machine Identity Management

Why Does Machine Identity Management Matter? Why should advanced machine identity management be a key concern for CISOs? With rapid technological advancements and the increasing dependence on cloud environments, businesses are confronted with a new array of security challenges. One such critical challenge is the safe management of Non-Human Identities (NHIs) along with their corresponding…

YouTuber LegalEagle sues PayPal over ‘sleeping leech’ Honey extension

A new lawsuit alleges that the PayPal-owned browser extension Honey is cheating creators out of money. Honey, which PayPal acquired for $4 billion in 2019, works by automatically presenting users with relevant coupon codes as they shop. However, in a video posted last month, YouTuber MegaLag described Honey as a “scam” that’s “stealing money from…

Roborock’s Roomba competitor gets a robot arm

iRobot’s on-going financial crisis aside, the world of robot vacuums is still humming along. At CES Sunday, Roborock announced the Saros Z70. The Roomba competitor showcases what the company believes will be the next big step in robovac evolution: an arm. The idea of mounting a a manipulator is no doubt as old as robot…

Seeing Machines secures US$32.8 million ‘strategic investment’ from Mitsubishi Electric Mobility as part of collaboration agreement

Advanced computer vision technology company Seeing Machines has entered into a collaboration agreement with Mitsubishi Electric Mobility Corporation to pursue joint growth opportunities in the supply of driver and occupant monitoring system technology solutions to “enhance safety” in automotive.

UBH Group ‘pioneers Australia’s Path’ to nuclear sovereignty

Sovereign technology leader becomes first company in the Southern Hemisphere to earn ISO 19443 Certification for nuclear supply chain excellence COMPANY NEWS: Defence veteran owned and sovereign Australian technology company UBH Group has announced that it has achieved a landmark milestone as the first organisation in the Southern Hemisphere to secure ISO 19443 certification.

United Airlines accelerates its Starlink rollout, with first commercial flight planned for spring

A few months ago, United Airlines announced its deal with Starlink to offer in-flight internet access for its passengers. At the time, the airline said it would start testing the new service in early 2024 and then offer it on passenger flights later in the year. United has now accelerated this timeline a bit, with…

Making FedRAMP ATOs Great with OSCAL and Components

OMB Memo M-24-15 published on July 24, 2024 directed GSA and the FedRAMP PMO to streamline the FedRAMP ATO process using NIST OSCAL. By late 2025 or early 2026 (18 months after the issuance of the memo), GSA must ensure the ability to receive FedRAMP authorization and continuous monitoring artifacts through automated, machine-readable means. Additionally,…

Stay Assured: Critical Insights into Secrets Rotation

Why Is Secrets Rotation a Critical Aspect of Cybersecurity? Isn’t it intriguing how an object as intangible as ‘information’ can hold immense value in today’s digitally connected world? In the realm of cybersecurity, Secrets Rotation plays a key role in safeguarding this valuable asset. Secrets Rotation constitutes a dynamic process of creating, dispensing, and disabling…

Confidently Secure: Leveraging PAM for Enhanced Protections

Why is Harnessing Non-Human Identities Central to Your Cybersecurity Strategy? In the realm of information security, managing identities – whether human or machine – is critical. This attention escalates further when you delve into the realm of Non-Human Identity (NHI) management. The importance can easily get obscured in the vast sphere of cybersecurity, but why…

Taming the heat: lessons from the Death Star, the Human Torch, and sustainable IT

There’s a delightful irony in Star Wars’ infamous Death Star: for all its futuristic might, it was ultimately undone by a good old-fashioned exhaust port. An oversight in waste-heat management (yes, that big hole was basically a vent) led to the most explosive operational failure in galactic history. It’s a classic example of why sustainability…

Lyft will credit NYC riders for congestion fee throughout January

New York City’s congestion pricing is scheduled to take effect Sunday — but for the first month, Lyft said it will be crediting riders who pay the fee. New York’s program, which is supposed to reduce traffic in lower Manhattan while also raising funding for mass transit, was paused by Governor Kathy Hochul in June,…

DEF CON 32 – The Interplay between Safety and Security in Aviation Systems3

Author/Presenter: Lillian Ash Baker Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – The Interplay between Safety and Security in Aviation Systems3…

Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution

A high-severity security flaw has been disclosed in ProjectDiscovery’s Nuclei, a widely-used open-source vulnerability scanner that, if successfully exploited, could allow attackers to bypass signature checks and potentially execute malicious code. Tracked as CVE-2024-43405, it carries a CVSS score of 7.4 out of a maximum of 10.0. It impacts all versions of Nuclei later than…

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps

Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/execution. The backdoor, according to Google’s Managed Defense team, shares functional overlaps with a known remote administration tool referred to as Gh0st RAT, which had its source

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims. These attacks have been publicly attributed to a Chinese state-sponsored threat actor tracked as Flax Typhoon (aka Ethereal Panda or

Critical Windows LDAP flaw could lead to crashed servers, RCE attacks

Researchers have published a proof-of-concept exploit for a pair of Windows Lightweight Directory Access Protocol (LDAP) flaws that could lead to server crashes or remote code execution (RCE) on Windows servers. “Active Directory Domain Controllers (DCs) are considered to be one of the crown jewels in organizational computer networks,” noted researchers at security firm SafeBreach,…

New ship, new year: SpaceX to deploy model Starlink satellites on next Starship launch

SpaceX is significantly upping the ante of its Starship test flight program, with the next rocket launch expected to demonstrate payload deployment for the first time.  The payload in question will be 10 Starlink “simulators” that will be similar in size and weight to the next-gen satellites SpaceX plans to use Starship to deploy in…

Feel Relieved: Advanced Secrets Management Techniques

Could Advanced Secrets Management be Your Way to Feeling Relieved? Think about it. If you could significantly decrease the likelihood of security breaches and data leaks in your organization, wouldn’t that be a massive weight lifted off your shoulders? But how to systematically fortify your cybersecurity? The answer lies in Non-Human Identities (NHIs) and Secrets…

Ensure Your Data’s Safety: Best Practices in Cloud Security

Where Does Your Cloud Security Stand? Does your organization’s data management strategy consider non-human identities (NHIs) and secret security management? In the intricate dance of safeguarding data, ensuring the security of machine identities, or NHIs, and their corresponding secrets is pivotal. This practice remains an essential element of best cloud security practices and an effective…

Uber CEO Dara Khosrowshahi resigns from self-driving truck startup Aurora’s board

Dara Khosrowshahi is resigning from the board of autonomous vehicle technology company Aurora Innovation, citing a desire to focus on his ongoing responsibilities as CEO of Uber and reduce external board commitments, according to a Friday regulatory filing. Khosrowshahi’s resignation was effective as of Tuesday. Aurora says Khosrowshahi’s decision to leave the board was not…

Inside the wild fall and last-minute revival of Bench, the VC-backed accounting startup that imploded over the holidays

Friday, December 27, was supposed to be the start of a relaxing holiday weekend. But it was chaos for thousands of small business owners who use Bench, an accounting and tax startup based in Canada that raised $113 million from investors like Bain Capital Ventures and Shopify. That morning, they found themselves unable to log…

Imperva’s Wildest 2025 AppSec Predictions

Humans are spectacularly bad at predicting the future. Which is why, when someone appears to be able to do it on a regular basis, they are hailed as visionaries, luminaries and celebrated with cool names like Nostradamus and The Amazing Kreskin. Nostradamus made his fame on predictions about the distant future, but that technique has…

Scout Motors EVs will have satellite connectivity

Volkswagen offshoot Scout Motors is getting a jump start on CES 2025 next week, with some good news for people who plan to take the company’s EVs way, way outdoors: The forthcoming Traveler SUV and Terra pickup will have a built-in satellite connection. Scout Motors isn’t saying where it’s sourcing the satellite link-up hardware from,…

Generative AI funding reached new heights in 2024

If there was any doubt, the generative AI bubble didn’t burst in 2024. Investments in generative AI, which encompasses a range of AI-powered apps, tools, and services to generate text, images, videos, speech, music, and more, reached new heights last year. According to data from financial tracker PitchBook compiled for TechCrunch, generative AI companies worldwide…

US government sanctions Chinese cybersecurity company linked to APT group

The US Department of Treasury’s Office of Foreign Assets Control (OFAC) has issued sanctions against a Beijing cybersecurity company for its role in attacks attributed to a Chinese cyberespionage group known as Flax Typhoon. The company, called Integrity Technology Group (Integrity Tech), is accused of providing the computer infrastructure that Flax Typhoon used in its…

DEF CON 32 – The Past, Present, and Future of Bioweapons

Authors/Presenters: Lucas Potter, Meow-Ludo Disco Gamma Meow-Meow, Xavier Palmer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – The Past, Present, and…

U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet

The U.S. government on Friday sanctioned a Chinese company that Western nations had connected to a Beijing-sponsored hacking group’s botnet, which had compromised hundreds of thousands of devices before a joint takedown operation last year. Flax Typhoon hackers made use of infrastructure at Integrity Technology Group to exploit victims, according to the Treasury Department’s Office…

Microsoft to spend $80 billion in FY’25 on data centers for AI

Microsoft has earmarked $80 billion in fiscal 2025 to build data centers designed to handle artificial intelligence workloads, according to a company blog post. Specifically, the tech giant plans to build out AI-enabled data centers “to train AI models and deploy AI and cloud-based applications around the world.” Of that $80 billion allocation, more than…

Turo CEO: Attackers had clean records, so background checks wouldn’t have stopped them

Two individuals rented cars from Turo, a peer-to-peer car-sharing platform, and used them to perform acts of violence earlier this week. First, a military veteran driving a Ford F-150 Lightning drove into a crowd of people, killing at least 15. Then, an active-duty Green Beret rented a Tesla Cybertruck, parked it in front of the…

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation

On Jan. 20, Jessica Rosenworcel will leave the Federal Communications Commission, capping off a 12-year tenure that saw her rise from commissioner to chairwoman in 2021. Under her leadership, the agency has taken an aggressive approach to regulating cybersecurity, data privacy and emergent artificial intelligence use in the communications sector. Over the past four years,…

FTC orders AI accessibility startup accessiBe to pay $1M for misleading advertising

The U.S. Federal Trade Commission (FTC) has fined accessiBe, a startup that claims to make websites more compatible with the screen readers blind people rely on to access the internet, for false advertising and compensating reviewers without disclosing that it sponsored the reviews. In a proposed order, the FTC would require accessiBe to pay $1 million…

Turo taps national security and counterterrorism experts after Cybertruck explosion

Two individuals rented cars from Turo, a peer-to-peer car-sharing platform, and used them to perform acts of violence earlier this week. First, a military veteran driving a Ford F-150 Lightning drove into a crowd of people, killing at least 15. Then, an active-duty Green Beret rented a Tesla Cybertruck, parked it in front of the…

Bench saved by the bell, and other last-minute deals that closed 2024

Welcome to Startups Weekly — your weekly recap of everything you can’t miss from the world of startups. Want it in your inbox every Friday? Sign up here. Welcome to 2025! The first half of the week was relatively quiet in terms of startup announcements, but activity is already starting to pick up. We’re also…

WordPress Appliance - Powered by TurnKey Linux