Geek-Guy.com

Month: February 2025

DeepSeek: Everything you need to know about the AI chatbot app

DeepSeek has gone viral. Chinese AI lab DeepSeek broke into the mainstream consciousness this week after its chatbot app rose to the top of the Apple App Store charts (and Google Play, as well). DeepSeek’s AI models, which were trained using compute-efficient techniques, have led Wall Street analysts — and technologists — to question whether the U.S. can maintain its…

Apply to Speak at TechCrunch Sessions: AI

AI Innovators, this Is your moment! Have insights to share with 1,200 AI founders, investors, and enthusiasts eager to push the boundaries of innovation?  Take the stage, shape the AI conversation, and exchange ideas at TechCrunch Sessions: AI on June 5 at UC Berkeley’s Zellerbach Hall!  We’re bringing together top AI minds from the startup…

Call for Speakers: TechCrunch All Stage 2025

Founders, VCs, and startup experts—This is your moment! Got scaling insights? Now’s your chance to share them with 1,200 founders, investors, and entrepreneurs at TechCrunch All Stage 2025 presented by Fidelity, on July 17 in Boston! We’re gathering leading experts from the startup and VC communities to host engaging sessions, interactive roundtables, and dynamic breakouts.…

ICON, a pioneer in 3D home printing, raises $56M led by Norwest, Tiger Global

ICON, which builds homes using 3D printing, has closed on $56 million in Series C funding co-led by Norwest Venture Partners and Tiger Global, the company has confirmed to TechCrunch exclusively. The raise represents a first close for the Austin-based ICON, according to a spokesperson. Existing backers CAZ Investments, LENX, Moderne Ventures, Oakhouse Partners and…

Azul Achieves DORA Compliance

In December Azul announced that the integrated risk management practices for its OpenJDK solutions fully support the requirements of the European Union’s Digital Operational Resilience Act (DORA) provisions. The stability, resilience and integrity of Azul’s solution not only ensure DORA compliance but also enhance digital resilience and mitigate risks. Azul received assurance in December, but…

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Check out best practices for preventing buffer overflow attacks. Plus, Europol offers best practices for banks to adopt quantum-resistant cryptography. Meanwhile, an informal Tenable poll looks at cloud security challenges. And get the latest on ransomware trends and on cybercrime legislation and prevention! Dive into six things that are top of mind for the week…

Hacker attackieren Bundeswehr-Universität

Die Studierenden an der Universität der Bundeswehr dürften wenig begeistert darüber sein, dass Hacker ihre Daten abgegriffen haben. Universität der Bundeswehr Hacker haben die Universität der Bundeswehr in Neubiberg bei München angegriffen. Laut einem Bericht des Handelsblatts seien dabei auch sensible Daten abgeflossen. Die Attacke sei von verschiedenen Quellen aus Universitätskreisen bestätigt worden, hieß es.…

AI and Civil Service Purges

Donald Trump and Elon Musk’s chaotic approach to reform is upending government operations. Critical functions have been halted, tens of thousands of federal staffers are being encouraged to resign, and congressional mandates are being disregarded. The next phase: The Department of Government Efficiency reportedly wants to use AI to cut costs. According to The Washington…

Bluestonex Exec: Data Governance the Key to Long-Term AI Success

Bluestonex is an SAP specialty SaaS vendor that is heavily focused on enabling its customers’ AI journeys through data governance solutions. We spoke with Co-Founder and Maextro Solution Owner Feroz Khan to get his insights on where the AI adoption journey stalls and what conversations around data quality need to be held more often. AI…

Data Governance the Key to Increasing Efficiency: EncompaaS CPO

Generative AI adoption has disrupted virtually every market, but it has also renewed interest in strong data governance protocols that comply with various regulatory and efficiency standards. Tech vendor EncompaaS was founded to simplify the often complex processes involved in keeping organizations compliant with data regulations worldwide. Chief Product Officer Jaimie Tillbrook spoke with Channel…

whoAMI name confusion attacks can expose AWS accounts to malicious code execution

Thousands of active AWS accounts are vulnerable to a cloud image name confusion attack that could allow attackers to execute codes within those accounts. According to DataDog research, vulnerable patterns exist in the way multiple software projects retrieve Amazon Machine Image (AMIs) IDs to create Amazon elastic compute cloud (EC2) instances. “The vulnerable pattern allows…

Europe denies dropping AI liability rules under pressure from Trump

The European Union has denied that recent moves to row back on some planned tech regulation — principally by ditching the AI Liability Directive, a 2022 draft law which had been aimed at making it easier for consumers to sue over harms caused by AI-enabled products and services — were made in response to pressure…

AI-Powered Social Engineering: Ancillary Tools and Techniques

Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: ‘As technology continues to evolve, so do cybercriminals’ tactics.’ This article explores some of the impacts of this GenAI-fueled acceleration.…

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024. The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas

Razzia gegen Telefonbetrüger

Über Callcenter haben Kriminelle einen Schaden in zweistelliger Millionenhöhe angerichtet. chainarong06 – shutterstock.com Der Polizei ist ein Schlag gegen eine international agierende Bande von Telefonbetrügern gelungen. Nach Durchsuchungen in mehreren Bundesländern sei in Hagen in Nordrhein-Westfalen eine 50 Jahre alte Griechin festgenommen worden, die als einer der führenden Köpfe der Bande gilt. Das teilten das…

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network’s domain controller as part of their post-compromise strategy. “RansomHub has targeted over 600 organizations globally, spanning sectors

Plain pulls in $15M to agregate B2B customer services chats into one platform

Internal customer support platforms are moving from platforms like email ticketing systems and chat to channels like Slack, Microsoft Teams, and even Discord. But with Slack, for instance, able to host hundreds of channels, the whole thing can become quite unwieldy.  Plain, out of the UK, thinks it has the answer. Its API-first platform consolidates…

Democrats Swear They’ll Fight Elon Musk. But What About the Cash They Took From SpaceX?

There’s a pesky fact for congressional Democrats crying foul about Elon Musk’s hostile takeover of the U.S. government: Many of them took campaign cash from a Musk company PAC. The SpaceX political action committee doled out more than half a million dollars to Democrats during the last campaign cycle — including thousands that flowed to…

What is anomaly detection? Behavior-based analysis for cyber threats

Anomaly detection is an analytic process for identifying points of data or events that deviate significantly from established patterns of behavior. In cybersecurity, anomaly detection is one of the top defensive skills organizations should consider fine-tuning to ensure they can detect and remedy adverse cyber events quickly before they take root and proliferate. The concept…

Die besten IAM-Tools

Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter und -Tools. Foto: ne2pi – shutterstock.com Identität wird zum neuen Perimeter: Unternehmen verlassen sich immer seltener auf die traditionelle Perimeter-Verteidigung und forcieren den Umstieg auf Zero-Trust-Umgebungen. Sicherer Zugriff und Identity Management bilden die Grundlage jeder Cybersicherheitsstrategie. Gleichzeitig sorgt die…

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7. The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql.…

Palo Alto Networks PAN-OS Authentication Bypass Vulnerability (CVE-2025-0108)

Overview Recently, NSFOCUS CERT detected that Palo Alto Networks issued a security announcement and fixed the identity bypass vulnerability in PAN-OS (CVE-2025-0108). Due to the problem of path processing by Nginx/Apache in PAN-OS, unauthenticated attackers can bypass authentication to access the management web interface of PAN-OS device and call some PHP scripts, thus obtaining sensitive…

Microsoft Security Update Notification in February of High-Risk Vulnerabilities in Multiple Products

Overview On February 12, NSFOCUS CERT detected that Microsoft released a security update patch for February, which fixed 63 security issues involving widely used products such as Windows, Microsoft Office, Azure, Apps, and Microsoft Visual Studio, including high-risk vulnerabilities such as privilege escalation and remote code execution. Among the vulnerabilities fixed in Microsoft’s monthly update…

Hotstar and JioCinema merge into JioHotstar as Reliance tightens grip on streaming in India

Hotstar and JioCinema, two widely used video streaming apps in India, have merged into JioHotstar. JioStar, a joint venture between Reliance-owned Viacom18 and Star India, said Friday it had integrated JioCinema’s content into a revamped version of Disney’s Hotstar platform. The merged service will feature movies and TV shows from Disney, Warner Bros, NBCUniversal and…

PostgreSQL patches SQLi vulnerability likely exploited in BeyondTrust attacks

Attackers who exploited a zero-day vulnerability in BeyondTrust Privileged Remote Access and Remote Support products in December likely also exploited a previously unknown SQL injection flaw in PostgreSQL, a widely used open-source object-relational database system. The PostgreSQL issue was fixed on Thursday and users are advised to upgrade their database servers as soon as possible.…

UK drops ‘safety’ from its AI body, now called AI Security Institute, inks MOU with Anthropic

The U.K. government wants to make a hard pivot into boosting its economy and industry with AI, and as part of that, it’s pivoting an institution that it founded a little over a year ago for a very different purpose. Today the Department of Science, Industry and Technology announced that it would be renaming the…

A New Chapter in Cybersecurity Excellence: Nuspire Becomes PDI Security & Network Solutions

In the rapidly evolving landscape of cybersecurity, transformation isn’t just about adaptation—it’s about strengthening capabilities to better serve and protect organizations worldwide. That’s why we’re excited to announce a transformative milestone: Nuspire’s integration into PDI Security & Network Solutions, set to take effect in early 2025.  The Journey to Integration  Since joining the PDI Technologies…

From Reactive to Predictive: Building Cyber Resilience for 2025

When you’re resilient to something, you don’t just endure; you adapt, recover, and emerge stronger. This idea is what should motivate companies to focus more on cyber resilience. It’s not enough to simply weather the storm of a cyberattack; true resilience means predicting the storm’s arrival, minimizing its impact, and ensuring business operations bounce back…

DLP solutions vs today’s cyberthreats: The urgent need for modern solutions

Today’s hybrid network environments are more complex than ever. With workforces and offices now widely distributed, data is actively used across thousands of endpoints, managed and unmanaged, on and off the network. In this new complex environment, insider threats, whether intentional data exfiltration or accidental leaks, add significant challenges for organizations. The rapid adoption of…

Google Gemini now brings receipts to your AI chats

Google’s Gemini AI chatbot can now tailor answers based on the contents of previous conversations, the company announced in a blog post on Thursday. Gemini can summarize a previous conversation you’ve had with it, or recall info you shared in another conversation thread. This means you won’t have to repeat information you’ve already shared with…

Arm is launching its own chip this year with Meta as a customer

Public semiconductor company Arm will start making its own chips this year after landing a high-profile enterprise customer. Arm, which is majorly owned by SoftBank, will start making its own chips now that Meta has signed on as a customer, according to the Financial Times. The chip is expected to be a CPU for servers…

OpenAI removes certain content warnings from ChatGPT

OpenAI says it has removed the “warning” messages in its AI-powered chatbot platform, ChatGPT, that indicated when content might violate its terms of service. Laurentia Romaniuk, a member of OpenAI’s AI model behavior team, said in a post on X that the change was intended to cut down on “gratuitous/unexplainable denials.” Nick Turley, head of…

Nearly a Year Later, Mozilla is Still Promoting OneRep

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search companies. Shortly after that investigation was published, Mozilla said it would stop bundling Onerep with the Firefox browser and wind down its partnership with the company. But nearly a year later, Mozilla is still promoting it…

DEF CON 32 – MFT Malicious Fungible Tokens

Authors/Presenters: Mauro Eldritch, Cybelle Oliveira Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – MFT Malicious Fungible Tokens appeared first on Security…

Tim Cook teases Apple product news for February 19 — likely the iPhone SE

Apple CEO Tim Cook took to X Thursday to tease “the newest member of the family,” set to arrive February 19. The safe money is on a fourth generation iPhone SE. The budget-minded handset had previously been tipped for a potential release a week prior, but we got new Beats headphones instead. It’s been three…

Salt Typhoon remains active, hits more telecom networks via Cisco routers

Salt Typhoon, the Chinese nation-state threat group linked to a spree of attacks on U.S. and global telecom providers, remains active in its intrusion and has hit multiple additional networks worldwide, including two in the United States, Recorded Future said in a report released Thursday. Recorded Future’s Insikt Group observed seven compromised Cisco network devices communicating…

Anthropic’s next major AI model could arrive within weeks

AI startup Anthropic is gearing up to release its next major AI model, according to a report Thursday from The Information. The report describes Anthropic’s upcoming model as a “hybrid” model that can switch between “deep reasoning” and fast responses. The company will reportedly introduce a “sliding scale” alongside the model to allow developers to…

Energy Regulations Are Rising: Stay Ahead with Modern DCIM

As data centers continue to serve as the backbone of the digital economy, they face an escalating challenge: the tightening grip of global energy consumption regulations. Governments and regulatory bodies worldwide are implementing stricter policies to curb carbon footprints, optimize energy use, and enforce sustainability commitments. In this evolving landscape, modern Data Center Infrastructure Management…

Phase raises $13M to speed up the UX design process with its no-code platform

UX and UI designers work closely with engineers throughout product development to build and implement design concepts and wireframes for functional user interfaces. Regular communication, feedback and testing are required for the collaboration to work smoothly and deliver a user experience that aligns with the intended design goals. Nick Budden, a serial entrepreneur who used…

Another robotaxi operation heads to Texas and Archer scores $300M for its defense mission

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Raise your hand if you’re exhausted by the firehose of information coming from every direction. Yeah, me too.  At TechCrunch, we’re focused on helping readers (that’s you!)…

Tofu is building an omni-channel marketing platform for enterprises

When EJ Cho started his first company in 2018, he was exposed to what it takes to market a product. He was surprised to find a market filled with different single-use tools. “It was a very frustrating experience,” Cho told TechCrunch. “I had to learn and juggle all these different tools. It felt like a…

OpenAI scrubs diversity commitment web page from its site

OpenAI has eliminated a page on its website that used to express its commitment to diversity, equity, and inclusion. The URL “https://openai.com/commitment-to-dei/” now redirects to “https://openai.com/building-dynamic-teams/,” a page that talks about people with “different backgrounds” with no use of the word diversity. The previous page stated that the company’s “investment in diversity, equity and inclusion”…

Seagate acquires Intevac, which makes equipment for hard disk drives, for $119M

Seagate, the data storage company, has announced its intent to acquire Intevac, a hard drive equipment producer, in an all-cash deal worth $119 million. Seagate said on Thursday that it’ll pay $4 per share in a tender offer for Intevac, which is publicly traded. Seagate will initially purchase a minimum of “at least one share…

CyberArk acquires Zilla Security in $175 million deal 

Identity security giant CyberArk has acquired Boston-based Zilla Security, a cloud-native identity governance and administration startup, in a deal worth up to $175 million. The acquisition, announced Thursday, includes $165 million in cash and a $10 million earn-out contingent on performance milestones. Zilla’s co-founders, CEO Deepak Taneja and Nitin Sonawane, along with their team, will…

Unusual attack linked to Chinese APT group combines espionage and ransomware

In an intriguing development, researchers have observed a ransomware actor using tools previously associated with China-based cyberespionage efforts. While mixing espionage and ransomware activities is common for North Korean APTs, it’s unusual for Chinese groups. “The most likely scenario is that an actor, possibly one individual, was attempting to make some money on the side…

Alibaba confirms Apple deal bringing AI features to iPhones in China

Alibaba on Thursday confirmed recent reports of a partnership with Apple that’s set to bring AI features to iPhones sold in China. The deal is an important one for Apple, as iPhone sales have dropped precipitously in the world’s largest smartphone market. The handset experienced an 11% year-over-year drop in China, according to Apple’s most…

Startup Battlefield 200: The competition starts on the waitlist

Is your pre-Series A startup solving big problems with game-changing potential? Do you have the drive to compete against the world’s top early-stage startups? Or know a founder whose vision deserves to be seen? TechCrunch’s Startup Battlefield 200 is where the most innovative early-stage startups battle it out in front of world-renowned VC judges in…

EU’s Disinformation Code moves closer to becoming DSA benchmark

Staying on the right side of the European Union’s online rulebook when it comes to the slippery topic of disinformation is set to get easier for platforms that commit to the bloc’s long-standing Code of Practice on Disinformation. You know, the voluntary Code that Elon Musk pulled X (formerly Twitter) out of back in 2023.…

Publishers sue AI startup Cohere over alleged copyright infringement

A consortium of fourteen publishers including Condé Nast, The Atlantic, and Forbes have filed a lawsuit against Cohere alleging that the generative AI startup has engaged in “massive, systematic” copyright infringement. In the complaint, the publisher plaintiffs accuse Cohere of using at least 4,000 copyrighted works to train its AI models and display large portions…

The Future of AI Agent Authentication: Ensuring Security and Privacy in Autonomous Systems

Dive into the world of AI agent authentication, where cutting-edge security meets autonomous systems. Discover how delegation tokens, real-time verification, and multi-layer security protocols work together to ensure safe and private AI operations while maintaining operational efficiency. The post The Future of AI Agent Authentication: Ensuring Security and Privacy in Autonomous Systems appeared first on…

US Coast Guard told to improve its cybersecurity, after warning raised that hacked ports could cost $2 billion per day

The US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation System (MTS), which includes ports, waterways, and vessels essential for transporting over $5.4 trillion worth of goods annually. Read more in my article on the Tripwire State of Security blog.

Germany’s Helsing doubles down on drones for Ukraine, scales up manufacturing

Helsing, the German defense tech startup backed by Spotify’s Daniel Ek and others, is producing 6,000 HX-2 strike drones in addition to the 4,000 HF-1 strike drones financed by Germany that are currently being delivered to Ukraine. “We are scaling up production of HX-2 in response to additional orders from Ukraine,” Helsing co-founder Gundbert Scherf…

Blue Origin cuts 10% of staff one month after first successful New Glenn launch

Blue Origin is laying off 10% of its workforce, according to Reuters, just one month after the successful first launch of its New Glenn mega-rocket. The company reportedly has more than 10,000 employees, meaning the cut could affect around 1,000 people. CEO Dave Limp told employees in an all-hands meeting Thursday morning the company is…

Spyware maker caught distributing malicious Android apps for years

Italian company SIO, which sells to government customers, is behind an Android spyware campaign called Spyrtacus that spoofed popular apps like WhatsApp, per security researchers. © 2024 TechCrunch. All rights reserved. For personal use only.

YouTube Shorts adds Veo 2 so creators can make gen AI videos

YouTube Shorts is integrating with Google DeepMind’s latest video model, Veo 2, allowing creators to generate AI video clips for their posts. Veo 2 is Google’s response to Sora, OpenAI’s text-to-video generator. YouTube, owned by Google, already allowed creators to generate AI backgrounds for their Shorts with a text prompt through a feature called Dream…

Workday Announces New Agent System of Record, Role-Based AI Agents

AI platform for managing people and money, Workday, has recently announced the Workday Agent System of Record to help organizations manage their entire fleet of AI agents in a single place. New solution to govern increasingly common agentic AI This system, which manages AI agents from both Workday and third-party vendors, enables businesses to utilize…

WordPress Appliance - Powered by TurnKey Linux