Geek-Guy.com

Month: February 2025

General Catalyst is reportedly weighing a potential IPO

General Catalyst, the powerhouse venture firm, is considering an IPO, Axios reported Friday morning, citing “multiple sources.” TechCrunch has reached out to the firm’s managing partner, Hemant Taneja, for comment. In the meantime, those following General Catalyst’s trajectory won’t be surprised by the prospect. Founded 25 years ago as a small Cambridge, Mass.-based venture firm,…

SolarWinds CISO says security execs are ‘nervous’ about individual liability for data breaches 

SolarWinds’ top cybersecurity executive said chief information security officers are increasingly grappling with how to do their jobs while avoiding individual legal liability for breaches that happen on their watch. Tim Brown, now CISO at SolarWinds, was a vice president and the highest-ranking security official at the company when hackers working on behalf of the…

SymbyAI raises $2.1M seed to make science research easier

SymbyAI, a SaaS platform that uses AI to streamline scientific research, announced a $2.1 million seed round with participation from Drive Capital and CharacterVC, among others.  Launched just last year by Aisha Livaudais and Michael House, the platform provides organized workspaces for researchers to access papers, code, data, and experiences within one place. It helps…

How Stable is Your Cloud Infrastructure Security?

Are Your Machine Identities Protected Within Your Cloud Infrastructure? Let’s delve into a thought-provoking question: Within your seemingly secure systems, how comprehensively are your Non-Human Identities (NHIs) and their secrets protected? NHIs, as machine identities, play a crucial role in maintaining robust cybersecurity. However, their management often gets overlooked despite holding the key to cloud…

Certain About Your Data Privacy Measures?

Are You Confident in Your Data Privacy Measures? Professionals in financial services in healthcare, travel, DevOps, and SOC teams that managing securitization processes in the cloud; do you feel confident about your data privacy measures? Where marked by increasing cybersecurity threats, the assurance of robust data privacy is no longer a luxury but a necessity.…

Independent Audit for Your Secrets Management?

Why Should Organizations Focus on Independent Audit for Secrets Management? Are you overlooking an essential aspect of your organization’s cybersecurity strategy? This aspect is the management of Non-Human Identities (NHIs) and their secrets, which are often overlooked but vital components of securing your organization’s cloud-based systems. By adopting a comprehensive approach to NHI and secrets…

OpenAI plans to bring Sora’s video generator to ChatGPT

OpenAI intends to eventually integrate its AI video generation tool, Sora, directly into its popular consumer chatbot app, ChatGPT, company leaders said during a Friday office hours session on Discord. Today, Sora is only available through a dedicated web app OpenAI launched in December, which lets users access the AI video model of the same…

OpenAI plans to integrate Sora’s video generator into ChatGPT

OpenAI intends to eventually integrate its AI video generation tool, Sora, directly into its popular consumer chatbot app, ChatGPT, company leaders said during a Friday office hours session on Discord. Today, Sora is only available through a dedicated web app OpenAI launched in December, which lets users access the AI video model of the same…

DeepSeek: Everything you need to know about the AI chatbot app

DeepSeek has gone viral. Chinese AI lab DeepSeek broke into the mainstream consciousness this week after its chatbot app rose to the top of the Apple App Store charts (and Google Play, as well). DeepSeek’s AI models, which were trained using compute-efficient techniques, have led Wall Street analysts — and technologists — to question whether the U.S. can maintain its…

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned. Security experts say the Russia-based service provider Prospero OOO (the triple O is the Russian version of “LLC”) has long been a…

Alvaka Remediation Resources Available Through Ingram Micro

Ransomware and remediation solutions vendor Alvaka recently announced a strategic alliance with global technology distributor and B2B platform company Ingram Micro to keep channel partners and customers informed and ready to respond to ransomware attacks. Remediation and recovery now available to Ingram Micro partners Through this new engagement program, Alvaka will offer Ingram Micro channel…

DEF CON 32 – Inside Dash Cam Custom Protocols And Discovered 0days

Authors/Presenters: Hyo Jin Lee & Hanryeol Park Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Inside Dash Cam Custom Protocols And…

Researchers uncover unknown Android flaws used to hack into a student’s phone

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The…

DMARC Adoption among Europe’s Higher Education Sector

This installment of DMARC adoption initiates a series on DMARC adoption, focusing on policy levels and best practices, in the higher education sector. We’ll begin with Europe. The post DMARC Adoption among Europe’s Higher Education Sector appeared first on Security Boulevard.

Google Sheets gets a Gemini-powered upgrade to analyze data faster and create visuals

Google is giving Sheets a Gemini-powered upgrade that is designed to help users analyze data faster and turn spreadsheets into charts using AI. With this update, users can access Gemini’s capabilities to generate insights from their data, such as correlations, trends, outliers, and more. Users now can also generate advanced visualizations, like heatmaps, that they…

Bluesky-based Instagram alternative Flashes launches publicly

Instagram alternative Flashes publicly launched its Bluesky-based photo-sharing app on the App Store this week, gaining nearly 30,000 downloads in its first 24 hours. The app offers a classic Instagram-like experience, allowing users to upload up to four photos and videos of up to a minute in length. Built by Berlin-based developer Sebastian Vogelsang, Flashes…

Microsoft files lawsuit against LLMjacking gang that bypassed AI safeguards

Microsoft has filed a civil lawsuit against an international gang of cybercriminals that exploited stolen credentials to access generative AI services, including its own. The gang, tracked as Storm-2139, used the stolen credentials along with AI jailbreaking techniques to set up paid services of their own capable of generating content that bypassed built-in ethical safeguards…

Alkami is buying fintech Mantl for $400 million

Digital banking services provider Alkami Technology is acquiring Mantl, which has been described as “the Shopify of account opening,” for $400 million. Mantl, founded in 2016 by Nathaniel Harley and Benjamin Conant, developed software to make it easier for people to open accounts digitally at community banks and credit unions. The end goal is that…

Tesla applies for ride-hail permit in California — but there’s a catch

Tesla applied for a permit with the California Public Utilities Commission to operate a transportation service in the state — a required first step if the automaker wants to eventually operate a robotaxi service there. Tesla’s application for a transportation charter-party carrier permit was first reported by Bloomberg. TechCrunch has independently confirmed with the CPUC…

Mozilla responds to backlash over new terms, saying it’s not using people’s data for AI

Mozilla has responded to user backlash over the Firefox web browser’s new Terms of Use, which critics have called out for using overly broad language that appears to give the browser maker the rights to whatever data you input or upload. The company says the new terms aren’t a change in how Mozilla uses data,…

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. “The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite,” the international…

Is your enterprise ‘cyber resilient’? Probably not. Here’s how other boards fixed that

In the escalating battle against cyberthreats, most businesses pour more security resources into prevention and detection: Keep attackers at bay, and if (er, when) a breach occurs, respond to it faster. While that focus has merit, another strategy is gaining traction. With attacks becoming all but inevitable, more boards and business leaders want more focus…

Last week to apply to speak at TechCrunch Sessions: AI

AI Leaders, ready to make an impact?  Do you have game-changing insights that could shape the future of AI? Share your vision with 1,200 AI founders, investors, and industry pioneers at TechCrunch Sessions: AI on June 5 at Zellerbach Hall in UC Berkeley. Take the stage, lead the conversation, and drive the next wave of…

Apply to Speak at TechCrunch All Stage 2025

Founders, VCs and startup experts, now’s your chance! Have crucial scaling insights to offer? Share them with 1,200+ founders, investors, and entrepreneurs at TechCrunch All Stage 2025 presented by Fidelity, on July 15 in Boston, and share your expertise! We’re assembling the best minds from the startup and VC communities to lead exciting sessions, interactive…

TechCrunch Disrupt 2025: Final 24 hours to save up to $1,130

The early bird gets the worm and time is running out! You have less than 24 hours left to save up to $1,130 when purchasing passes to TechCrunch Disrupt 2025. If you want massive savings on Disrupt 2025 individual passes and up to 30% on group tickets, secure your low ticket rate today. These offers…

Only 3 more days to save up to $325 at TechCrunch Sessions: AI

The AI revolution won’t wait — will you? Secure your seat at TechCrunch Sessions: AI before time runs out! You’ve got only three days left to save up to $325. The clock stops on March 2 at 11:59 p.m. PT. Don’t miss out on the lowest rates of the year! AI is transforming everything, and…

5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs

Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow’s content delivery network (CDN) to deliver the Lumma stealer malware. Netskope Threat Labs said it discovered 260 unique domains hosting 5,000 phishing PDF files that redirect victims to malicious websites. “The attacker uses SEO to…

How to Avoid Costly Technical Debt and Get Your Software Project Back on Track

Software projects don’t always go as planned. Deadlines slip, budgets overrun, and technical challenges mount. What starts as a minor issue can quickly snowball into…Read More The post How to Avoid Costly Technical Debt and Get Your Software Project Back on Track appeared first on ISHIR | Software Development India. The post How to Avoid…

Acronis Launches Acronis Ultimate 365 for MSPs

Cybersecurity and data protection leader Acronis recently announced the debut of a comprehensive Microsoft 365 protection solution for managed service providers (MSPs) called Acronis Ultimate 365. Ultimate 365 allows MSPs to manage cybersecurity, backup, and compliance with a single, natively integrated, multi-tenant platform to help boost efficiency, reduce technician workload, maximize profitability, and simplify customer…

CrowdStrike Highlights Four Key Tech, Sales Milestones

Cybersecurity giant CrowdStrike recently announced new milestones and advancements in the cloud security, identity protection, and next-generation cybersecurity sectors. The announcements relate to the organization’s business within the AWS Marketplace, their Oracle Cloud partnership, Falcon Identity Protection for Microsoft Entra ID, and achieving additional FedRAMP Authorization. CrowdStrike’s AWS Marketplace milestone CrowdStrike announced it is the…

Hacker verschlüsseln Daten von rund 12.000 Patienten

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?quality=50&strip=all 16634w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Hacker haben sich Zugriff auf Daten von Tausenden Patienten aus Hamburg verschafft. Inactive design – Shutterstock.com Laut einem Bericht des Hamburger Abendblatt wurde das Praxisinformationssystem der MVZ Herz-Lungen-Praxis…

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. The campaign, called LLMjacking, has targeted various AI offerings, including Microsoft’s Azure OpenAI Service. The tech giant is

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices…

Interna von Ransomware-Gruppe Black Basta durchgesickert

Über die vergangenen Jahre hat Black Basta mit mehr als 500 Opfern weltweit von sich Reden gemacht. Durchgesickerte Chat-Protokolle enthüllen die innere Funktionsweise und interne Konflikte der Gruppe. DC Studio – shutterstock.com Black Basta betrat erstmals im April 2022 die Hackerbühne und nutzte den inzwischen weitgehend verschwundenen QakBot, auch bekannt als QBot. Einem von der…

What is zero trust? The security model for a distributed and risky era

What is zero trust? Zero trustis a cybersecurity model or strategy in which no person or computing entity is considered inherently trustworthy, regardless of whether they are inside or outside the organization’s network. It’s distinct from a more traditional way of thinking about computer networks that considers everything inside some defined boundary — everyone on…

Airbnb co-founder Joe Gebbia takes wraps off his first assignment for DOGE

Almost two weeks after The New York Times reported that Airbnb co-founder Joe Gebbia had joined Elon Musk’s “Department of Government Efficiency,” Gebbia clarified his role on Thursday, announcing on X that as a starting point, he’ll be leveraging his design expertise as part of an effort to overhaul the government’s notoriously slow, paper-heavy retirement…

Schwachstellen managen: Die besten Vulnerability-Management-Tools

Schwachstellen zu managen, muss keine Schwerstarbeit sein. Wenn Sie die richtigen Tools einsetzen. Das sind die besten in Sachen Vulnerability Management. Foto: eamesBot – shutterstock.com Nicht nur das Vulnerability Management hat sich im Laufe der Jahre erheblich verändert, sondern auch die Systeme, auf denen Schwachstellen identifiziert und gepatcht werden müssen. Systeme für das Schwachstellen-Management fokussieren…

Beyond SMS: HYPR’s Perspective on Gmail’s Shift to QR Code Authentication

SMS-based, two-factor authentication (2FA) has long been a staple security measure for many online services, including Gmail. However, as the tech industry shifts towards more secure authentication methods, it has become evident that SMS codes are no longer the ideal solution. In a recent reveal, a Gmail spokesperson has confirmed that Google is planning to…

Meta is reportedly planning a standalone AI chatbot app

Meta reportedly plans to release a standalone app for its AI assistant, Meta AI, in a bid to better compete with AI-powered chatbots like OpenAI’s ChatGPT and Google’s Gemini. According to CNBC, Meta could launch a standalone Meta AI app as soon as the company’s next fiscal quarter (April-June). Meta AI is currently only available…

Army soldier linked to Snowflake attack spree allegedly tried to sell data to foreign spies

U.S. authorities say a 21-year-old U.S. Army soldier attempted to sell stolen sensitive information to a foreign intelligence service as part of a broader effort to extort victims and leak call records of high-ranking public officials. In November while on active duty, Cameron Wagenius made multiple attempts to extort $500,000 from a major telecommunications company…

Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI

How Morpheus revolutionizes security automation with dynamically generated, context-aware workflows. The post Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI appeared first on D3 Security. The post Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI appeared first on Security Boulevard.

Snowflake grows startup accelerator with $200M in new capital

Snowflake plans to expand its startup accelerator with $200 million in additional commitments, the tech giant that specializes in cloud-based data storage said Thursday. The new injection of capital follows a string of activity by Snowflake over the past several months that illustrates that company’s growth ambitions. The Snowflake Startup Accelerator, formerly known as the…

Optimistic About Future Cybersecurity Trends?

Can We Be Optimistic About Future Cybersecurity Trends? Driven by the incessant need for safer digital environments where data and machine identities form the core of many organizational operations. A seasoned data management expert and cybersecurity specialist, must ponder, how promising are the future cybersecurity trends? Can we remain optimistic about the future of security?…

Is Your NHI Lifecycle Management Capable?

Is Your Approach to NHI Lifecycle Management Robust Enough? Have you ever wondered about the invisibility of your organizational cyber risk? When did you last evaluate the strength of your Non-Human Identity (NHI) lifecycle management? The management of NHIs and their secrets has become paramount. NHIs are machine identities that play a pivotal role in…

Do Powerful Tools Enhance Your Data Security?

How Can Powerful Security Tools Impact Your Data Protection Strategy? Has it ever occurred to you how critical it is to have a robust data protection framework in massive digitalization? The need for advanced cybersecurity measures becomes more critical. One aspect of data security that demands attention from organizations operating in the cloud is the…

Video: Channel Chief Stalwart Frank Rauch On Retirement, Legacy, And The Future Of Channel Partnerships

In this episode of Channel Insider: Partner POV, host Katie Bavoso sits down with long-time channel innovator and advocate Frank Rauch, one of the most respected channel chiefs in the industry. With four decades of experience leading channel programs at companies like VMware, HP, and most recently Cato Networks, Frank reflects on his storied career,…

Here’s what Google is (and isn’t) planning with SMS account verification

Google is gradually phasing out SMS-based verification as part of its two-step verification (2SV) process across its suite of services, signaling a significant shift in how the tech giant approaches user authentication and security. The change, which will affect Gmail and all other Google services where users sign in with their Google accounts, marks a…

CFPB nominee signals openness to continuing data-broker work

President Donald Trump’s nominee to lead the consumer-focused federal agency that Elon Musk wants to “delete” and that Republican lawmakers have railed against since its creation indicated to senators Thursday that he could continue some data-focused work started by his Democratic predecessor. In his nomination hearing to lead the Consumer Financial Protection Bureau, Jonathan McKernan…

“Opportunism and Fear”: Crypto Industry Sets Its Sights on Governors’ Mansions

Mayor Steve Fulop of Jersey City, New Jersey, was running for governor when he announced that he would invest part of his city’s pension fund in bitcoin. Rep. Ritchie Torres, D-N.Y., was toying with a challenge to New York Gov. Kathy Hochul when he co-sponsored a resolution calling blockchain technology “the future of innovation.” Between…

Meta fires around 20 employees for leaking confidential information

Meta has fired “roughly” 20 employees for leaking confidential information, The Verge reports. “We tell employees when they join the company, and we offer periodic reminders, that it is against our policies to leak internal information, no matter the intent,” Meta told the publication. “We recently conducted an investigation that resulted in roughly 20 employees…

Waymo has doubled its weekly robotaxi rides in less than a year

Waymo is logging more than 200,000 paid robotaxi rides every week, according to Alphabet CEO Sundar Pichai, who shared the stat about the tech giant’s subsidiary on X. Waymo commercially operates robotaxis in Los Angeles, San Francisco, and Phoenix. The 200,000-weekly trips milestone is notable for a company that was providing only 10,000 rides a…

Twitch is letting more streamers access its monetization tools

Twitch CEO Dan Clancy published an open letter on Thursday outlining the platform’s plans for 2025, which include upcoming features, updates to the mobile experience, as well as a significant change to its monetization policy.   Of note, Clancy revealed that Twitch is opening up subscriptions and “Bits,” the virtual items that viewers buy to cheer…

CMMC is Here: Simplifying Compliance with Enclaves 

A joint blog featuring CISO Global’s Compliance Team & PreVeil The long-anticipated CMMC rule (CFR 32) is now live, marking a crucial turning point for defense contractors. The Compliance Team at CISO Global recently passed our CMMC Audit and are well on the way to becoming a CMMC Certified Third-Party Assessor Organization, or C3PAO. Although…

WordPress Appliance - Powered by TurnKey Linux