Geek-Guy.com

Month: February 2025

OpenAI unveils GPT-4.5 ‘Orion’, its largest AI model yet

OpenAI announced on Thursday it is launching GPT-4.5, the much-anticipated AI model code-named Orion. GPT-4.5 is OpenAI’s largest model to date, trained using more computing power and data than any of the company’s previous releases. Despite its size, OpenAI notes in a whitepaper that it does not consider GPT-4.5 to be a frontier model. Subscribers…

OpenAI’s GPT-4.5 is better at convincing other AIs to give it money

OpenAI’s next major AI model, GPT-4.5, is highly persuasive, according to the results of OpenAI’s internal benchmark evaluations. It’s particularly good at convincing another AI to give it cash. On Thursday, OpenAI published a white paper describing the capabilities of its GPT-4.5 model, code-named Orion, which was released Thursday. According to the paper, OpenAI tested…

TikTok sunsets its creator marketplace for TikTok One, a broader solution with AI tools

TikTok is preparing to sunset its creator marketplace in favor of a new, more expanded experience, the company has informed businesses and creators via email. The online platform, which connects brands with creators for collaborating on ads and other sponsorships, will stop allowing creator invitations or the creation of new campaigns as of Saturday the…

Figure will start ‘alpha testing’ its humanoid robot in the home in 2025

Figure is planning to bring its humanoids into the home sooner than expected. CEO Brett Adcock confirmed on Thursday that the Bay Area robotics startup will begin “alpha testing” its Figure 02 robot in the home setting, starting later in 2025. The executive says the accelerated timeline is a product of the company’s “generalist” Vision-Language-Action…

Microsoft Copilot gets a macOS app

Microsoft finally released a macOS app for Copilot, its free generative AI chatbot.  Similar to OpenAI’s ChatGPT and other AI chatbots, Copilot enables users to ask questions and receive responses generated by AI. Copilot is designed to assist users in numerous tasks, such as drafting emails, summarizing documents, writing cover letters, and more. There’s also…

Microsoft IDs developers behind alleged generative AI hacking-for-hire scheme

Microsoft has identified individuals from Iran, China, Vietnam and the United Kingdom as primary players in an alleged international scheme to hijack and sell Microsoft accounts that could bypass safety guidelines for generative AI tools. In December, Microsoft petitioned a Virginia court to seize infrastructure and software from 10 unnamed individuals who the company claims…

Lucid loses its CEO, and ‘founder mode’ comes for Flexport

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Lucid Motors delivered a surprise this week when it announced that CEO and CTO Peter Rawlinson was resigning. Speculation about the departure, which includes vacating a board…

Stripe CEO says AI startups are growing faster than SaaS ever did and calling them wrappers ‘misses the point’

In its annual letter released Thursday, payments giant Stripe declared that it was “seeing an AI boom” with its data revealing that artificial intelligence startups are growing more rapidly than traditional SaaS companies have historically. In a chart, Stripe showed that the top 100 AI companies (by revenue) were able to achieve $5 million in…

AI models trained on unsecured code become toxic, study finds

A group of AI researchers has discovered a curious — and troubling — phenomenon: Models say some pretty toxic stuff after being fine-tuned on unsecured code. In a recently published paper, the group explained that training models, including OpenAI’s GPT-4o and Alibaba’s Qwen2.5-Coder-32B-Instruct, on code that contains vulnerabilities leads the models to give dangerous advice,…

“Emergent Misalignment” in LLMs

Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“: Abstract: We present a surprising result regarding LLMs and alignment. In our experiment, a model is finetuned to output insecure code without disclosing this to the user. The resulting model acts misaligned on a broad range of prompts that are unrelated to coding: it…

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #327 – Including QA Tasks At Sprint Planning

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #327 – Including QA Tasks At Sprint Planning appeared first on Security Boulevard.

Apple introduces new child safety initiatives, including an age verification system for apps

Apple on Thursday announced a range of new initiatives designed to help parents and developers create a safer experience for kids and teens using Apple devices. In addition to easier setup of child accounts, parents will now be able to share information about their kids’ ages, which can then be accessed by app developers to…

Meta’s new AR glasses for research can measure heart rate

Meta has unveiled the next generation of its Project Aria augmented reality glasses for research: Aria Gen 2. Aria Gen 2, which arrives roughly five years after the first-generation Aria device, adds new capabilities to the platform, including an upgraded sensor suite and Meta’s custom silicon. Aria Gen 2 has a PPG sensor for measuring…

Archipelo comes out of stealth with $12M funding to secure human and AI-driven code

When it comes to AI software, you can build something clever, but that’s not always the same as building something that is secure. With so much software now getting written by AI, having a window into its security can be a challenge. That’s the premise of Archipelo, a San Francisco-based cybersecurity startup that is today…

Katy Perry, Gayle King, and Lauren Sánchez headed to space on Blue Origin mission

Jeff Bezos’ rocket company, Blue Origin, announced the crew for its next mission on Thursday, which can only mean one thing: more random rich people are going to space. The crew most notably includes popstar Katy Perry and broadcast journalist Gayle King. They will be joined by two scientists — Aisha Bowe and Amanda Nguyen…

Workhelix taps years of research to help enterprises figure out where to apply AI

AI has the power to transform how people work, but getting tangible value out of AI isn’t as easy as throwing any AI application at any workflow. It can be hard for enterprises to figure out which AI applications help their business and which are just hype. Workhelix wants to solve that problem. Workhelix is…

Meta fixes error that exposed Instagram users to graphic and violent content

Meta has fixed an error that caused some users to see a flood of graphic and violent videos in their Instagram Reels feed. The fix comes after some users saw horrific and violent content despite having Instagram’s “Sensitive Content Control” enabled. “We have fixed an error that caused some users to see content in their…

ResilienceVC bucks trend, unveils $56M fund to back fintechs working on financial inclusion

ResilienceVC, a new seed-stage fintech venture capital firm based out of Washington, D.C., is announcing its $56 million debut fund, the firm shared exclusively with TechCrunch. Founded by Tahira Dosani and Vikas Raj in 2023, ResilienceVC’s mission is a straightforward one: to back fintech companies dedicated to helping Americans find financial stability. It’s writing checks…

In challenge to YouTube, TikTok revamps its desktop platform

In a bid to take on YouTube, TikTok is revamping its desktop platform with the addition of several new features. The company announced on Thursday that its web-based experience features a new modular layout, refreshed For You feed, a new Explore tab, immersive full-screen LIVE gaming streaming, and a floating player. The social network’s new…

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country’s National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications. “The sender claimed that the malicious file…

2025 TechCrunch Events Calendar

For two decades, TechCrunch has provided a front row view to the future of technology, shaping conversations that matter and spotlighting the next big things before they break — both on the page and in person at our world-renowned events.  This year, as we celebrate our 20th anniversary, we’re launching our most ambitious events calendar…

Sicherheitsrisiko: Microsoft entfernt VSCode-Erweiterungen

Forscher haben herausgefunden, dass zwei VSCode-Erweiterungen mit Schadcode infiziert sind. VZ_Art – Shutterstock.com Die IT-Forscher Amit Assaraf und Itay Kruk entdeckten kürzlich, dass die beiden Erweiterungen für Visual Studio Code – “Material Theme – Free” und “Material Theme Icons – Free” Schadcode enthalten. Berichten zufolge erfreuten sich diese Erweiterungen großer Beliebtheit und wurden insgesamt fast…

eBay makes it easier to find fast-shipping items and local listings

eBay announced on Thursday that it has updated its platform to help buyers find fast-shipping items and local listings, thanks to changes to Search item cards and additional usage of AI. The company is making it easier to identify items with fast delivery, as search item cards now display delivery range estimates for all fast…

TechCrunch Disrupt 2025: Just 2 days left to save up to $1,130

Clock’s ticking! You’ve got just 48 hours left to lock in your spot at TechCrunch Disrupt 2025 and save up to $1,130 on individual ticket types or 30% on group tickets. Don’t wait — secure your pass now before prices go up on February 28 at 11:59 p.m. PT. Disrupt 2025 takes place on October…

Just Move In raises $8M Series A for its home setup service 

Fintech has fragmented into increasingly specialized, cucumber-sliced micro-services, ranging from embedded buy-now-pay-later loans to specialized neo banks to yet more payment processing systems. What opportunities remain for innovators in such a fragmented landscape? One U.K. startup, Just Move In, zoomed out and realised that the home had been overlooked by everyone in the industry. And…

Stripe finalizes tender sale at a $91.5B valuation, says payment volumes grew to $1.4T in 2024

Digital payments platform Stripe has yet to lay out plans to go public, but in the meantime the company has thrown past and present employees a line for some liquidity. The company on Thursday confirmed a tender offer where investors will buy up shares from those employees at a valuation of $91.5 billion. Stripe said…

A Comprehensive Look at OSINT

Leveraging Publicly Available Data for Better Security  Open Source Intelligence (OSINT) is a term you’ve likely encountered in conversations about cybersecurity, intelligence gathering, and investigative journalism. As our personal and professional lives become increasingly digital, OSINT has become a crucial practice for organizations, law enforcement agencies, and everyday users seeking to stay informed and protected.…

IBM closes $6.4B HashiCorp acquisition

IBM has finalized its multi-billion dollar HashiCorp acquisition, two days after the U.K.’s antitrust regulator gave the deal its blessing. A spokesperson confirmed to TechCrunch that the U.S. Federal Trade Commission (FTC) had quietly greenlighted the acquisition earlier this week prior to the announcement made by the U.K.’s Competition and Markets Authority (CMA) on Tuesday.…

Nerdio’s Landes on Optimizing Cloud: What MSPs Should Know

Several years after the cloud boom first began, some MSPs and their clients are beginning to worry cloud is to expensive to justify, or at least more complicated than first believed. Nerdio’s CRO and co-founder Joseph Landes shares why he sees cloud cost as an optimization concern, and how partners can course correct without losing…

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It’s tracking the activity under the name Erudite Mogwai.…

Renesas teams up with Applus+ Laboratories to achieve PSA Certified Level 1 with CRA Extension for three new MCU Groups

Certification Highlights Renesas Commitment to Cybersecurity Leadership COMPANY NEWS: Renesas Electronics Corporation (TSE: 6723), a premier supplier of advanced semiconductor solutions, today announced that it has successfully obtained PSA Certified Level 1 certification with the European Cyber Resilience Act (CRA) compliance extension for three of its latest microcontroller Groups (MCUs). This certification, evaluated by Applus+…

Agentic AI and software development: Here’s how to get ahead of rising risk

As technology leadership pushes ever harder to deeply embed AI agents into software development lifecycles — in some cases, even using agentic AI to replace midlevel developers — application security (AppSec) is about to go from complex to a lot more complicated. The post Agentic AI and software development: Here’s how to get ahead of…

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essential—yet such data remains surprisingly scarce. The “Enterprise GenAI Data Security Report 2025” by LayerX delivers unprecedented insights

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

Cybersecurity researchers have discovered an updated version of an Android malware called TgToxic (aka ToxicPanda), indicating that the threat actors behind it are continuously making changes in response to public reporting. “The modifications seen in the TgToxic payloads reflect the actors’ ongoing surveillance of open source intelligence and demonstrate their commitment to enhancing the

Flashpoint Releases Security Guide on OSINT Strategies

Flashpoint, a leader in threat data and intelligence, released a report this week meant to help security teams stay ahead of emerging threats such as doxxing, swatting, misinformation, and geopolitical targeting. The Complete Guide to OSINT for Executive Protection is a resource for security professionals, executive protection teams, and corporate risk leaders. It was established…

Trend Micro Introduces First Proactive Cybersecurity AI

Cybersecurity company Trend Micro recently launched a new AI Agent meant to drive proactive security outcomes. Trend Cybertron harnesses LLM technology to predict and prevent threats Trend Cybertron is a specialized cybersecurity large language model (LLM) designed to predict and prevent threats across an organization’s entire attack surface in any environment. “Trend is building a…

Amazon debuts Ocelot, its first quantum computing chip

Amazon Web Services (AWS) has introduced Ocelot, its first quantum computing chip. The news brings it into line with its big cloud rivals Microsoft and Google, which have also unveiled their own quantum chips in recent months, respectively Majorana and Willow. The cloud computing giant has long been investing in the quantum computing space, starting…

How to streamline enterprise modernisation in a multi-workload world

GUEST OPINION: Streamlining enterprise modernisation is a critical priority for organisations navigating a multi-workload world. Enterprises need efficient strategies to integrate cloud and on-premises workloads while managing complex environments. Modern transformation initiatives demand agility and seamless scalability, addressing the operational and financial pressures of technological evolution.

Critical Microsoft Partner Center vulnerability under attack, CISA warns

A critical vulnerability in Microsoft’s Partner Center platform is under attack, enabling unauthenticated attackers to escalate privileges, potentially leading to data breaches, malware deployment, and lateral movement across enterprise networks. The US Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw, tracked as CVE-2024-49035, to its Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation…

Orange Group von Datenleck betroffen

Die Orange Group wurde von einer Ransomware-Attacke getroffen. JeanLucIchard – Shutterstock.com Ein Mitglied der Ransomware-Bande HellCat behauptet, rund 6,5 Gigabyte an Daten von der Orange Group gestohlen zu haben. Das erbeutete Datenpacket umfasst demnach 380.000 eindeutige E-Mail-Adressen, Quellcode, Rechnungen, Verträge sowie Kunden- und Mitarbeiterinformationen. Der französische TK-Anbieter bestätigte gegenüber dem Technikmagazin Bleeping Computer, dass es…

Unique, a Swiss AI platform for finance, raises $30M

A four-year-old Swiss startup has raised a sizable chunk of change to capitalize on the burgeoning “agentic AI” movement. Unique said on Thursday that it has raised $30 million in a Series A funding round that was led by London-based VC firm DN Capital and CommerzVentures, the investment offshoot of Germany’s Commerzbank. “Agentic AI” is…

Taktile helps fintechs build automated decision-making workflows

The automated logic behind many financial decisions — for example, decisions that determine whether a client is approved for a credit line — is hard-coded. Often, it’s not easily changed. If a head of credit at a bank wanted to adjust the bank’s lending criteria, for example, they’d likely have to raise a ticket with…

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of 2023. French cybersecurity company Sekoia said it observed the unknown threat actors leveraging CVE-2023-20118 (CVSS score: 6.5), a critical security flaw impacting Cisco Small Business…

Instagram may spin off Reels into a separate app

Meta is mulling launching a standalone app for short-form videos, The Information reported, citing an anonymous source who heard Instagram head Adam Mosseri talking about the project to staff. The project is reportedly code-named Project Ray that aims to improve recommendations for new users and existing users in the U.S., and feature more three-minute videos,…

It’s not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills

Cyberattacks carried out by China-backed nation-state actors surged last year, showcasing technical advancements and specialized targeting in a broader escalation of the country’s ability to infiltrate global critical infrastructure, CrowdStrike said in an annual threat report released Thursday. “After decades of investment into China’s offensive capabilities, they’re now on par with other world powers,” Adam…

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company’s CEO Ben Zhou declared a “war against Lazarus.” The agency said the Democratic People’s Republic of Korea (North Korea) was responsible for the theft of the virtual assets from the cryptocurrency exchange,…

5 things to know about ransomware threats in 2025

Ransomware attacks continue to be one of the most significant cybersecurity threats organizations and cybersecurity leaders face. Attacks lead to wide-scale disruptions, large data breaches, huge payouts and millions of dollars in costs to businesses. In response, large, coordinated law enforcement operations have targeted major ransomware groups and disrupted operations, dismantled data leak sites and…

How to configure OAuth in Microsoft 365 Defender and keep your cloud secure

Cloud authentication provides so many advantages in business. It can allow your users to seamlessly authenticate between applications, it’s cost-efficient, and it’s scalable, and it offers great security options. But as with anything that is good in this line of work, it has the potential to be abused. One example of this is Open Authorization…

Der Kaufratgeber für Breach & Attack Simulation Tools

Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman Samborskyi | shutterstock.com Lösungen im Bereich Breach & Attack Simulation (BAS) unterstützen Unternehmen dabei, ihr Sicherheitsniveau zu verstehen. Dazu automatisieren die Tools die Tests spezifischer Bedrohungsvektoren. Als Grundlage dienen dabei in der Regel das MITRE-ATT&CK– oder Cyber-Killchain-Framework. BAS-Produkte simulieren…

U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason”

A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and for an answer to the question “can hacking be treason?” prosecutors in the case said Wednesday. The government disclosed the details in a court motion to keep the defendant in custody…

WordPress Appliance - Powered by TurnKey Linux