Geek-Guy.com

Month: February 2025

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members. The Russian-language chats on the Matrix messaging platform between September 18, 2023, and September 28, 2024, were initially…

Cyberangriffe: Fertigungsbranche noch immer schlecht vorbereitet

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?quality=50&strip=all 5568w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Einer Studie zufolge sind nur wenige Produktionsbetriebe bei Schutz und Abwehr von Cyberrisiken ausreichend vorbereitet. Halfpoint – Shutterstock.com Laut einer aktuellen Studie von Omdia verzeichneten 80 Prozent der…

Sherweb and Rewst Team Up to Enhance Efficiency for MSPs

Sherweb recently launched Rewst, an orchestration and automation platform for MSPs, in its marketplace to automate repetitive, time-intensive tasks for Sherweb’s MSP partners and help them enhance efficiency and docs on growth-driven initiatives. Sherweb, a cloud marketplace and distributor, introduced the Rewst platform to assist MSPs facing growing workloads, stretched resources, and the need to…

Regie.ai injects sales enablement with AI, but keeps humans in the loop

There’s no sure-fire approach to sales enablement, the process of providing a sales team with the resources it needs to close deals. Some teams are deficient on the prospecting side — that is, identifying and contacting potential customers. Others require help getting deals over the finish line. To meet these diverse wants, founders Matt Millen…

Anagram takes a gamified approach to employee cybersecurity training

Despite employers requiring their employees to complete yearly cybersecurity training courses, human-driven cybersecurity breaches still happen. The problem could even get substantially worse as generative AI increases the scale and personalization of social engineering campaigns. Anagram, formerly known as Cipher, is taking a new approach to employee cybersecurity training that the company hopes can keep…

Biggest Challenges in Developing Fintech Apps & How to Overcome Them

The fintech industry has revolutionized the way we manage money, invest, and conduct financial transactions. With the rise of digital banking, mobile wallets, and investment…Read More The post Biggest Challenges in Developing Fintech Apps & How to Overcome Them appeared first on ISHIR | Software Development India. The post Biggest Challenges in Developing Fintech Apps…

CISA’s AI cybersecurity playbook calls for greater collaboration, but trust is key to successful execution

As autonomous agents increasingly enter organizations, nation-state actors are turning to these AI-powered technologies to undermine our national security and critical infrastructures. As a result, today’s security teams need to be able to fight AI with AI, and understand the technology’s implications from both a defensive and offensive perspective. Similarly, our national defenses have to…

Nozomi Networks Labs Report finds wireless networks unprotected

GUEST RESEARCH:  The latest Nozomi Networks Labs OT & IoT Security Report released today finds wireless networks woefully unprotected as threat actors continue to gain deep access into critical infrastructure. In the 2nd half of last year, critical infrastructure organisations in the United States saw the highest number of attacks, with manufacturing at highest risk.

Framework’s first desktop PC is optimized for gaming and local AI inference

Framework, the company that is better known for its modular, repairable laptops, just released its first desktop computer. It’s a small desktop PC that punches above its weight. The most interesting part is what’s inside the device. Framework is one of the first companies to use AMD’s recently announced Strix Halo architecture, also known as…

Nomagic picks up $44M for its AI-powered robotic arms

Regions like the U.S. and Europe have been doubling down on rebuilding their industrial muscle, after decades of closing down factories and outsourcing the work to countries like China. To that end, a fast-growing Polish startup called Nomagic, which builds robots — specifically robotic arms — for logistics operations, is announcing $44 million in funding,…

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from Palo Alto Networks Unit 42. “Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote access trojan named DCRat (aka DarkCrystal RAT). The Ukrainian cybersecurity authority said it observed the latest attack wave starting in mid-January 2025. The activity is…

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads

Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer. The package in question is automslc, which has been downloaded over 104,000 times to date. First published in May 2019, it remains available on PyPI as of writing. “Although automslc,…

Gozem nets $30M to expand vehicle financing, digital banking in Francophone Africa

Since its launch in 2018 as a ride-hailing service in Togo, Gozem has steadily expanded across French-speaking West Africa, integrating a wide range of services as it sought to become a super-app. The company now offers ride-hailing, commerce, vehicle financing, and digital banking across Togo, Benin, Gabon, and Cameroon. Now, in a bid to scale…

BeyondTrust Pathfinder delivers a one-platform approach to identity-centric security

COMPANY NEWS: A unified platform enables customers to escape fragmented, siloed solutions that render organisations vulnerable to identity threats while enjoying adaptive, intelligent, and risk-aware identity security. An entirely integrated, AI-driven identity security platform consolidates the visualisation, management, and governance of identities, entitlements, and access into one cohesive system.

What CISOs need from the board: Mutual respect on expectations

There has been an extremely strong focus of late on organizational boards’ concerns about cyber threats. This focus has come alongside amplified regulatory attention, much of which pushes for stronger board engagement on cybersecurity. As a result, board directors are increasingly asking questions of their CISOs. In November 2023, the New York Department of Financial…

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are as follows – CVE-2024-49035 (CVSS score: 8.7) – An improper access control

ElevenLabs now lets authors create and publish audiobooks on its own platform

Voice AI company ElevenLabs is now letting authors publish AI-generated audiobooks on its own Reader app, TechCrunch has learned and the company confirmed. The announcement comes days after the company partnered with Spotify for AI-narrated audiobooks. ElevenLabs, which raised a $180 million mega-round last month, started inviting authors to try out their publishing program through…

German startup wins accolade for its fusion reactor design

Proxima Fusion, a two-year-old, German nuclear fusion startup, has published plans for a working fusion power plant in a peer-reviewed journal, in what is being touted as a step-change in the race to generate limitless energy. Today’s nuclear fission reactors create radioactive waste, whereas nuclear fusion releases vast amounts of energy, with zero carbon emissions and…

Claude: Everything you need to know about Anthropic’s AI

Anthropic, one of the world’s largest AI vendors, has a powerful family of generative AI models called Claude. These models can perform a range of tasks, from captioning images and writing emails to solving math and coding challenges. With Anthropic’s model ecosystem growing so quickly, it can be tough to keep track of which Claude…

Geopolitical tensions fuel surge in OT and ICS cyberattacks

Attacks against operational technology (OT) networks are on the rise, fueled by geopolitical tensions and conflicts, as OT security fast becomes a mainstream concern. Two new threat groups emerged in 2024, joining seven other active attackers of OT systems, and two new malware families targeting industrial control systems (ICS) were added to the attackers’ arsenals…

Anthropic’s latest flagship AI might not have been incredibly costly to train

Anthropic’s newest flagship AI model, Claude 3.7 Sonnet, cost “a few tens of millions of dollars” to train using less than 10^26 FLOPs of computing power. That’s according to Wharton professor Ethan Mollick, who in an X post on Monday relayed a clarification he’d received from Anthropic’s PR. “I was contacted by Anthropic who told me…

Perplexity launches $50M seed and pre-seed VC fund

Perplexity, the developer of an AI-powered search engine, is raising a $50 million seed and pre-seed investment fund, CNBC reported. Although the majority of the capital is coming from limited partners, Perplexity is using some of the capital it raised for the company’s growth to anchor the fund.  Perplexity has reportedly raised $500 million at…

Anthropic’s Claude AI is playing Pokémon on Twitch — slowly

On Tuesday afternoon, Anthropic launched Claude Plays Pokémon on Twitch, a live stream of Anthropic’s newest AI model, Claude 3.7 Sonnet, playing a game of Pokémon Red. It’s become a fascinating experiment of sorts, showcasing the capabilities of today’s AI tech and people’s reactions to them. AI researchers have used all sorts of video games,…

Deceptive Signatures: Advanced Techniques in BEC Attacks

KEY TAKEAWAYS Sophistication of BEC Attacks: Business Email Compromise (BEC) attacks are becoming increasingly sophisticated, leveraging advanced social engineering, AI-driven personalization, and phishing kits in order to overcome MFA protections. Exploitation of Trust: Some threat actor groups have been discovered levering a technique that involves embedding phishing lures within email signature blocks on user accounts.…

Lucid Motors CEO Peter Rawlinson steps down

Lucid Motors is changing CEOs for the first time in nearly six years. The company announced Tuesday that Peter Rawlinson is stepping down from the CEO and CTO roles that he’s held since before the company went public. Lucid appointed its chief operating officer Marc Winterhoff as its interim CEO. Rawlinson will serve as “strategic…

Apptronik’s humanoid robots take the first steps toward building themselves

Apptronik, an Austin-based maker of humanoid robots, on Tuesday announced a new pilot partnership with American supply chain/manufacturing stalwart, Jabil. The deal arrives two weeks after Apptronik announced a $350 million Series A financing round aimed at scaling up production of its Apollo robot. The Jabil deal is the second major pilot announced by Apptronik.…

OpenAI rolls out deep research to paying ChatGPT users

OpenAI announced on Tuesday that it’s rolling out deep research, its web browsing agent that creates thorough research reports, to all paying ChatGPT users. ChatGPT Plus, Team, Enterprise, and Edu subscribers will get 10 deep research queries per month. OpenAI’s Deep research was previously only available to ChatGPT Pro users, the company’s $200-a-month tier; they…

Apple shareholders vote down anti-DEI proposal

Apple shareholders rejected an anti-DEI proposal at its investor meeting Tuesday. The proposal was brought by a conservative group called the National Center for Public Policy Research (NPPR). It asked Apple to end its DEI activities. Boards typically ask shareholders to reject shareholder proposals, and this was one of four such shareholder proposals. This proposal…

DEF CON 32 – Exploiting Bluetooth: From Your Car To The Bank Account$$

Authors/Presenters: Yso & Martin Strohmeier Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Exploiting Bluetooth: From Your Car To The Bank…

Tumblr backs Tapestry, a timeline app for the open social web

Automattic-owned blogging site and social platform Tumblr has financially backed Tapestry, the newly launched app designed to organize feeds from across the open web, including RSS, Mastodon, Bluesky, and others. Launched as a Kickstarter project in January 2024, Tapestry went on to raise over $177,000 via crowdfunding for its app, which opened up to the…

Cisco Expands Partnership with NVIDIA to Boost AI Adoption

Global technology giant Cisco recently announced that it would expand its partnership with NVIDIA to provide AI solutions to enterprises, accelerating AI adoption. Partnership focuses on AI workload demands Through this expanded partnership, Cisco and NVIDIA aim to give organizations flexibility and choice as those organizations seek to meet the demand of AI workloads for…

Crypto analysts stunned by Lazarus Group’s capabilities in $1.46B Bybit theft

Last week’s $1.46 billion Ethereum theft by North Korean-linked Lazarus Group has sent shockwaves through the cybercrime ecosystem, as it has not only joined the ranks of the largest known financial thefts in history but also demonstrated that the group’s skillset is presenting new challenges for defenders.  In the wake of the theft, numerous experts…

Purging cyber review board was ‘a great idea,’ DHS deputy secretary nominee says

Expelling all members of an independent federal cybersecurity advisory panel as it was investigating Salt Typhoon was necessary due to previous leadership and the board “going in the wrong direction,” President Donald Trump’s nominee for deputy secretary of the Department of Homeland Security said Tuesday. Troy Edgar, who is serving as a senior adviser to…

Brex eyes $500M in revenue as it adds the likes of Anthropic and Robinhood as customers

Fintech Brex expects its annual net revenue to reach $500 million in 2025, according to a person familiar with the company’s operations as cited by Bloomberg and The Information. While the startup did not comment on the specific revenue projection, it did share that Brex has seen “3x overall revenue growth” year-over-year. It also told…

Opera integrates Bluesky, Slack, and Discord into its browser

Bluesky is getting added to the Opera web browser. On Tuesday, the Norway-based software maker announced the addition of the new social network alongside Slack and Discord, which will all be integrated into the browser’s sidebar alongside other messaging and communication services. Opera users have been able to customize their browsers with shortcuts to messaging…

Sweden’s Lovable, an app-building AI platform, rakes in $15M after spectacular growth

Using generative AI to create software has been possibly the largest use case since it first appeared a couple years ago. But platforms like Cursor and Copilot are mostly confined to a world inhabited by trained engineers.  Lovable, a Swedish AI startup, reached the front page of both Product Hunt and Hacker News last year…

What to expect from Amazon’s Alexa event on Wednesday

Amazon is hosting an Alexa-focused press event in NYC on Wednesday. Considering the company hasn’t held a major device presser in nearly two years — the last one was September 2023 — we’re expecting some splashy announcements. The event will not be live streamed. However, TechCrunch will be reporting on the ground. The festivities, emceed…

DocUnlock wants to solve a customs bottleneck

When goods enter the U.S., they have to be declared to U.S. customs so the importer can be charged the proper taxes. That applies to everything from a consumer ordering clothes from a brand based overseas to every single item on a massive container ship. When it comes to commercial importing, filling out the necessary…

House Dems say DOGE is leaving publicly exposed entry points into government systems

Democrats on the House Oversight Committee say the Department of Government Efficiency (DOGE) is jeopardizing cybersecurity by publicly exposing entry points into U.S. government systems, and told the Trump administration it needs to provide information on department officials’ access. “Decades of efforts by both Republican and Democratic administrations, along with bipartisan collaboration in Congress, have…

University spin-out Afynia secures $5M seed to commercialize its microRNA panel test for endometriosis

Canadian biotech startup Afynia Laboratories, a spin-out from McMaster University in Ontario, has picked up $5 million in seed funding to commercialize a blood test for endometriosis — a medical condition that can afflict people with a uterus, causing problems like chronic pelvic pain and fertility issues. Endometriosis affects nearly 200 million people worldwide. Getting…

Pax8 Names Marianne Wolf as Chief Ethics and Compliance Officer

Pax8, the leading cloud commerce marketplace, announced the appointment of Marianne Wolf as its Chief Ethics and Compliance Officer. In this role, Wolf is responsible for leading the global ethics and compliance program, which includes overseeing cross-functional internal teams responsible for managing the company’s compliance and risk profile. Wolf reports to Carrie Schiff, Chief Legal…

Pax8 Names Marianne Wolf as Chief Ethics and Compliance Officer

Pax8, the leading cloud commerce marketplace, announced the appointment of Marianne Wolf as its Chief Ethics and Compliance Officer. In this role, Wolf is responsible for leading the global ethics and compliance program, which includes overseeing cross-functional internal teams responsible for managing the company’s compliance and risk profile. Wolf reports to Carrie Schiff, Chief Legal…

Clicks brings its BlackBerry-style keyboard case to Android phones

Clicks is bringing its BlackBerry-style physical keyboard case to Android. The company on Tuesday announced the launch of three new products aimed at Android users, including Clicks keyboards for the Google Pixel, Motorola Razr+, and Samsung Galaxy. The cases are available for pre-order starting today and will initially be offered at lower price points than…

YouTube is working to make ad slots less interruptive

YouTube announced it’s making changes to mid-roll ads to improve the viewing experience for users while also helping creators potentially earn more revenue. Starting May 12, the Google-owned platform is going to show fewer ads during moments that feel interruptive or may cause viewers to abandon the video — like in the middle of a…

Data Security And Quality Challenges Slow Liquidity Ambitions As Australian Companies’ AI Plans Progress

GUEST RESEARCH:  Boomi, the intelligent integration and automation leader, has unveiled the Australian findings of its Data Liquidity Index Study, conducted by Hanover Research. The survey found strong data integration capabilities within Australian organisations, but identified gaps in liquidity as companies battle challenges with data privacy/security and data quality/accuracy.

Data Security And Quality Challenges Slow Liquidity Ambitions As Australian Companies’ AI Plans Progress

GUEST RESEARCH:  Boomi, the intelligent integration and automation leader, has unveiled the Australian findings of its Data Liquidity Index Study, conducted by Hanover Research. The survey found strong data integration capabilities within Australian organisations, but identified gaps in liquidity as companies battle challenges with data privacy/security and data quality/accuracy.

DeepSeek Lure Using CAPTCHAs To Spread Malware

IntroductionThe rapid rise of generative AI tools has created opportunities and challenges for cybercriminals. In an instant, industries are being reshaped while new attack surfaces are being exposed. DeepSeek AI chatbot that launched on January 20, 2025, quickly gained international attention, making it a prime target for abuse. Leveraging a tactic known as brand impersonation,…

WordPress Appliance - Powered by TurnKey Linux