Geek-Guy.com

Month: February 2025

Bridging AI Readiness in Australia

GUEST OPINION:  With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Across APAC use cases for AI and cloud adoption are countless including enhancing cybersecurity through to transforming network resiliency,…

1Password Introduces Password Manager Solution for MSPs

1Password recently announced the introduction of 1Password Enterprise Password Manager – MSP Edition, a new solution enabling MSPs to boost client security posture and productivity while ensuring operational efficiency and increasing profitability. New solution targets MSP needs and expectations The solution’s features are tailored to MSPs’ unique needs. It will enable MSPs to scale their…

Troubled electric truck maker Nikola files for bankruptcy

Hydrogen electric trucking startup Nikola Corp. filed for Chapter 11 bankruptcy protection Wednesday after it failed to find a buyer or secure additional funds to maintain operations.  Nikola was once a Silicon Valley darling, valued at $30 billion in June 2020 after it went public through a special purpose acquisition merger. But a series of…

F5 Redefines ADC for the AI Era

COMPANY NEWS: Next-generation Application Delivery Controllers address hybrid, multicloud, and AI-driven IT complexity crisis F5 is leading ADC transformation with convergence of high-performance application delivery with sophisticated application security capabilities into a single platform New reference architecture and partner alliances help customers deliver a secure future for AI-powered digital world

Coder Chief Product Officer on AI & Bringing CDEs to the Enterprise

Coder recently announced its availability on the AWS Marketplace, the latest in a series of product announcements. The company has championed its mission of easing the onboarding difficulties of developers and enabling individuals and small teams through its solutions. Channel Insider spoke with Coder’s Chief Product Officer, Eric Ledyard, to learn more about his views…

Foxit Announces New Software Kits Targeting PDFs

Foxit’s suite of products provides PDF and eSignature solutions to knowledge workers needing more from their documents and workflows than traditional tools offer. The vendor announced new functionalities targeting document conversion and PDF developer tools today. SDKs target PDF needs and add new conversion features Foxit’s February rollout includes new features in two areas. One,…

Hyperlume wants to make chip-to-chip communication faster and more efficient

Data centers consumed 4.4% of U.S. electricity in 2023 and are estimated to use up to 12% by 2028. The majority of the energy data centers suck up is used to help transfer data from chip to chip. A company called Hyperlume is looking to make that process more energy-efficient while also speeding it up.…

Superhuman introduces AI-powered categorization to reduce spammy emails in your inbox

It has been more than two years since ChatGPT burst on the scene. Shortly after that, it seemed like almost every email app integrated AI-powered email writing and summaries. Some also introduced AI-powered search for you to sift through your inbox quickly. Superhuman is now using AI to try and tackle one of the primary…

Augury raises $73M on a $1B+ valuation for AI to detect malfunctions in factory machines

As companies like Nvidia and SoftBank make industrial robotics into a key focus for future R&D, a startup has raised funding today for another facet of how AI is being used on the factory room floor. Augury, which develops AI-based hardware that measures vibrations, sound, temperature and other factors to understand how machines are working…

NIH funding uncertainty spurs new biotech venture fund

Earlier this month, the Trump administration directed the National Institutes of Health (NIH) to impose limits on specific types of funding it provides to research institutions. Although a federal judge has temporarily blocked the policy change, government grants to early-stage biotech startups could still face delays or be eliminated entirely, said Chris Gibson, co-founder and…

Murena now sells a ‘deGoogled’ Pixel Tablet

Murena, the French privacy firm that’s forked Android to deliver so-called deGoogled smartphones, has repeated the trick with a tablet. So if you’re keen to get your hands on a shiny Pixel Tablet — but without the usual bundle of Google apps and services — Murena has you covered. The Murena Pixel Tablet runs the…

Maximizing Efficiency: How CNC Press Brakes Are Revolutionizing Sheet Metal Fabrication

CNC press brakes have transformed the sheet metal fabrication industry, providing a level of efficiency, precision, and cost-effectiveness that traditional methods cannot match. These computer-controlled machines streamline bending operations, minimize material wastage, and enable complex, repeatable designs with unparalleled accuracy. As industries increasingly rely on automation, ACCURL CNC press brakes stand out for their advanced…

Tenable strengthens Identity Exposure capabilities to ‘protect against compromises’

Tenable Identity Exposure addresses identity sprawl security challenges with 360-degree visibility into identity risk Tenable, the exposure management company, today announced the launch of Identity 360 and Exposure Center, two new Tenable Identity Exposure capabilities designed to help organisations pinpoint identity risks and take swift, targeted action to prevent identity-based attacks.

Edge device vulnerabilities fueled attack sprees in 2024

Edge devices harboring zero-day and n-day vulnerabilities were linked to the most consequential attack campaigns last year, Darktrace said in an annual threat report released Wednesday. Darktrace’s threat researchers found the most frequent vulnerability exploits in customers’ instances of Ivanti Connect Secure and Ivanti Policy Secure appliances, along with firewall products from Fortinet and Palo…

Guidde taps AI to help create software training videos

Creating corporate training videos for software is a time-consuming ordeal, especially if you’re an organization with a lot of software licenses. Training videos can help get employees up to speed, but they’re a big lift. They often take entire teams to produce. Tel Aviv-based entrepreneur Yoav Einav thought there might be an alternative, cheaper way…

Sustainable Cutting Solutions: How Techni Waterjet is Leading the Industry with Eco-Friendly Waterjet Technology

Waterjet cutting has revolutionized modern manufacturing, offering precision and versatility in cutting various materials. Unlike traditional cutting methods, which often generate excessive heat and waste, waterjet cutting provides a cleaner, more efficient alternative. As industries move toward sustainable practices, the demand for eco-friendly cutting solutions has surged.

Hackers gain root access to Palo Alto firewalls through chained bugs

A high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS software, patched last week, is now being actively exploited by threat actors to gain root-level access to affected firewall systems. Tracked as CVE-2025-0108, the vulnerability allows an unauthenticated attacker with network access to the PAN-OS management web interface to bypass authentication requirements. The flaw received…

Boomi Unveils Comprehensive API Management to Combat API Sprawl and Power Agentic AI

Boomi, the intelligent integration and automation leader, unveiled its comprehensive API Management (APIM) solution, delivering cloud-scale APIM alongside market-leading integration and automation, data management, and AI capabilities as part of the Boomi Enterprise Platform. Comprised of Boomi’s existing API Management offering along with assets recently acquired from both Cloud Software Group and APIIDA, Boomi API…

The Ultimate MSP Guide to Structuring and Selling vCISO Services

The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to offer virtual Chief Information Security Officer (vCISO) services—delivering high-level cybersecurity leadership without the cost of a full-time hire. However, transitioning to vCISO services is not without its challenges

X doubles its Premium+ plan prices after xAI releases Grok 3

Hours after Elon Musk’s AI company xAI released the latest version of its AI model, Grok 3, X has significantly hiked the price for its top Premium+ subscription plan, which gives users access to the latest model, to almost $50 per month. On the support page that lists X’s premium plans, the monthly subscription price…

Java security: If you ain’t cheatin,’ you ain’t tryin’

Most industries have rules of engagement. In sports, there are referees. In business, there are regulations. In government, there are Robert’s Rules of Order. Cybersecurity is different. There are regulations, but they don’t limit how much we can defend ourselves. They focus on compliance, breach reporting, and risk management, not on dictating the strategies we…

Kuda and CEO face allegations of sex discrimination and unfair dismissal from former executive, per filing

An employment tribunal case has placed Kuda Technologies, one of Africa’s fastest-growing digital banks, under scrutiny over allegations of workplace discrimination, harassment, and wrongful dismissal. Rosemary Hewat, Kuda’s former Group Chief People Officer (CPO), filed a complaint accusing the company and its CEO, Babatunde Ogundeyi, of sex discrimination, victimization, and unfair dismissal. According to the…

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

Users who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts. The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month. Targets of…

Mehrheit der Deutschen fürchtet sich vor Cyberangriffen

Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen. Andrea Danti – Shutterstock.com Eine deutliche Mehrheit der Menschen in Deutschland hat Angst vor Cyberangriffen oder gar einem Cyberkrieg. Bei einer repräsentativen Umfrage des Digitalverbandes Bitkom sagten 61 Prozent, dass sie Cyberangriffe durch Staaten befürchten, mit denen Infrastruktur, öffentliche Einrichtungen oder Unternehmen gezielt gestört,…

Think being CISO of a cybersecurity vendor is easy? Think again

When people in this industry hear that a CISO is working at a cybersecurity vendor, it can trigger a number of assumptions — many of them misguided. There’s a stereotype that the role isn’t “real” CISO work, that it’s more akin to being a field CISO, someone primarily outward-facing and focused on supporting sales or…

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below – CVE-2025-0108 (CVSS score: 7.8) – An authentication bypass vulnerability in the Palo Alto…

Customer Identity & Access Management: Die besten CIAM-Tools

Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) bildet eine Unterkategorie von Identity & Access Management (IAM). CIAM wird dazu eingesetzt, die Authentifizierungs- und Autorisierungsprozesse von Applikationen zu managen, die öffentlich zugänglich sind, beziehungsweise von Kunden bedient werden.…

Hidden Dangers of Security Threats in the Tide of DeepSeek

Recently, DeepSeek attracted global attention and triggered worldwide discussion with its advanced AI models. Meanwhile, it has become the target of hackers and suffered frequent attacks. However, with the continuous improvement of AI large model capabilities, frequent security incidents and increasing risks expose users to greater threats. This post will use the NSFOCUS Large Model…

OpenSSH fixes two flaws that enable a man-in-the-middle attack and denial of service

OpenSSH, the most widely used tool for remotely managing Linux and BSD systems, received patches for two vulnerabilities. One of the flaws could allow attackers to perform a man-in-the-middle attack against OpenSSH clients with a certain configuration and impersonate a server to intercept sensitive communications. While the second vulnerability can lead to CPU resource exhaustion.…

Launch of Progress Data Cloud Creates Platform to Accelerate AI Strategies and Digital Transformation

New offering empowers enterprises to simplify data operations and enhance AI capabilities in the cloud COMPANY NEWS: Progress (Nasdaq: PRGS), the trusted provider of AI-powered digital experiences and infrastructure software provider has announced the launch of Progress® Data Cloud℠, a managed Data Platform as a Service designed to simplify enterprise data and artificial intelligence (AI)…

Google Play Books purchases on iOS now skirt the App Store’s commission

Google has gained permission to sell its e-books and audiobooks directly to customers through its iOS app, Google Play Books. While iOS apps today can offer access to content previously purchased elsewhere, like e-books bought via a website, developers have to request a specific exception to link their iOS app’s users to the company’s own…

Apple purges apps without contact info from EU app store, as DSA deadline hits

A change requiring app developers to disclose their address, phone number, and email information to consumers has gone live on the App Store within the European Union. Apple on Tuesday announced it has removed any EU apps that haven’t yet complied with the Digital Services Act (DSA), a regulation that had added a requirement in…

Safe Superintelligence, Ilya Sutskever’s AI startup, is reportedly close to raising roughly $1B

Safe Superintelligence, an AI startup founded by former OpenAI chief scientist Ilya Sutskever, could be close to raising more than $1 billion at a $30 billion valuation — a higher valuation than reported just weeks ago. Bloomberg reports that VC firm Greenoaks Capital Partners is leading the deal and pledging to invest half a billion…

How Phished Data Turns into Apple & Google Wallets

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new…

Thinking Machines Lab is ex-OpenAI CTO Mira Murati’s new startup

Former OpenAI CTO Mira Murati has announced her new startup. Unsurprisingly, it’s focused on AI. Called Thinking Machines Lab, the startup, which came out of stealth today, intends to build tooling to “make AI work for [people’s] unique needs and goals,” and to create AI systems that are “more widely understood, customizable, and generally capable”…

Thinking Machine Labs is ex-OpenAI CTO Mira Murati’s new startup

Former OpenAI CTO Mira Murati has announced her new startup. Unsurprisingly, it’s focused on AI. Called Thinking Machine Labs, the startup, which came out of stealth today, intends to build tooling to “make AI work for [people’s] unique needs and goals,” and to create AI systems that are “more widely understood, customizable, and generally capable”…

Fintech fundraising is giving me 2021 flashbacks

Welcome to TechCrunch Fintech!  This week we’re looking at some big valuation jumps, how Stripe is eyeing another shareholder sale, a colorful conversation with an early-stage VC, and more! To get a roundup of TechCrunch’s biggest and most important fintech stories delivered to your inbox every Tuesday at 8:00 a.m. PT, subscribe here. The big…

Fiverr wants gig workers to offload some of their work to AI

Gig marketplace Fiverr wants to let freelancers train AI on their bodies of work and use it to automate future jobs. At an event on Tuesday, Fiverr announced the launch of several new efforts aimed at attracting gig workers to its platform and equipping them with generative AI tools. Perhaps the most ambitious is a…

Facebook now only stores live videos for 30 days, will delete old broadcasts

Facebook announced on Tuesday that live videos will now only be stored on the social network for 30 days, after which they will be deleted. Previously, these videos were stored indefinitely. The change goes into effect on Wednesday. All live videos that are currently older than 30 days will be removed from the platform as…

Video: How To Extend Your MSP Team In One Week With Hirexe

Chris Keith, founder and CEO of Hirexe, joins host Katie Bavoso in this engaging episode of Partner POV to discuss the challenges managed service provider leaders face when trying to fill roles at their businesses – and that struggle is increasing. By 2026, IDC predicts that 90% of businesses worldwide will face an IT skills…

Amazon kills ‘Inspire,’ its TikTok-style feed for discovering products

Amazon is shutting down “Inspire,” its TikTok-like, short-form video and photo feed that was previously available in its mobile app. The feed allowed users to discover products and shop from content created by influencers, brands, and other customers. A company spokesperson confirmed the move to TechCrunch, saying “We regularly evaluate various features to better align…

OpenAI may give board special voting rights to ward off takeover attempts

To fend off future hostile takeover attempts, OpenAI is considering giving its non-profit board special voting rights, according to a new report in the Financial Times. The rights would allow the board to overrule major investors in the company, preserving some of its powers after OpenAI completes its transition to a for-profit. OpenAI was founded…

X challenges German court order granting data access to election researchers

Earlier this month, a Berlin court ordered Elon Musk-owned X to provide immediate access to public platform data to two civil society organizations seeking to study systemic risk around the country’s upcoming election. In a post on X, the social media company said Tuesday it is challenging the order, claiming the summary proceeding “egregiously undermines…

WordPress Appliance - Powered by TurnKey Linux