Geek-Guy.com

Month: April 2025

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity

Witnesses at a House hearing on medical device cybersecurity Tuesday called out the need for more proactive tracking of products used across the country, saying the status quo leaves many health system owners and operators in the dark about vulnerabilities, exploitation and patching updates. Testifying before the House Energy and Commerce Subcommittee on Oversight and…

Google adds end-to-end email encryption to Gmail

Google has introduced a new end-to-end encryption (E2EE) feature in Gmail, enabling organizations to send encrypted emails that even Google cannot read to other Gmail users. Later this year, the feature will be expanded to allow the sending of encrypted emails to any email users, including those from other providers. E2EE differs from encrypting email…

Can You Confidently Handle NHI Threats?

Can You Confidently Handle NHI Threats? Why do breaches persist despite the increased attention and budget allocated to cybersecurity? I have noticed a recurring issue – organizations are underestimating the importance of Non-Human Identities (NHIs) in their security frameworks. How can you confidently manage NHI threats and ensure that your security strategy is comprehensive and…

Scaling Your Identity Management Securely

Can Your Cybersecurity Keep Pace with Growth? When organizations scale, it’s not just revenues and team sizes that grow. The complexity and potential vulnerabilities of a company’s digital also multiply. Hence, a critical question arises: Can your cybersecurity strategy scale with your organization, particularly around identity management? Scalable identity management is a pivotal aspect of…

Driving Innovation with Robust NHIDR Strategies

Are You Incorporating Robust NHIDR Strategies into Your Cybersecurity Approach? This evolutionary process, has spurred an exponential increase in cybersecurity risks. When businesses across multidisciplinary sectors increasingly migrate to the cloud, managing Non-Human Identities (NHIs) and their associated secrets has emerged as a critical approach. Understanding Non-Human Identities and Their Role in Cybersecurity NHIs, or…

Researchers suggest OpenAI trained AI models on paywalled O’Reilly books

OpenAI has been accused by many parties of training its AI on copyrighted content sans permission. Now a new paper by an AI watchdog organization makes the serious accusation that the company increasingly relied on non-public books it didn’t license to train more sophisticated AI models. AI models are essentially complex prediction engines. Trained on…

CaaStle board confirms financial distress, furloughing employees

CaaStle, a startup that launched in 2011 as a plus-sized clothing subscription service and later became an inventory monetization platform for clothing retailers, is facing financial difficulties, the company confirmed to TechCrunch following a report by Axios. Citing a letter from the board, Axios reported that the company is almost out of money, CEO Christine…

Apple issues fixes for vulnerabilities in both old and new OS versions

Apple released security updates Monday to address software defects in the latest version of the company’s Safari browser and other applications across iOS, iPadOS and macOS.  The security issues addressed across the latest versions of Apple’s most popular platforms include 62 vulnerabilities affecting iOS 18.4 and iPadOS 18.4, 131 vulnerabilities affecting macOS Sequoia 15.4 and…

Atera US GM: Agentic AI Fueling Task Automation, MSP Success

IT management platform vendor Atera has spent the past three years collaborating with AI providers, including OpenAI, to develop practical solutions for MSPs and internal IT teams seeking to automate mundane and repetitive tasks. US General Manager Yoav Susz discusses how Atera’s partners and end users have influenced the company’s success in the market with…

Renew — but improve — billion-dollar cyber grant program to states and locals, House witnesses say

It’s vital that Congress renew the expiring $1 billion state and local cybersecurity grant program, witnesses testified before a House panel, but they added that it could benefit from some upgrades, too. New York Rep. Andrew Garbarino, chairman of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection that held the hearing Tuesday, said…

The UK’s Cyber Security and Resilience Bill will boost standards – and increase costs

If you’re a UK enterprise, this might not be good news: extra investment by infrastructure providers to meet the demands of the government’s forthcoming Cyber Security and Resilience Bill is likely to raise the cost of some services. This looks like the inevitable outcome of a bill, previewed in a policy statement by the government…

The urgent reality of machine identity security in 2025

The importance of machine identity security has reached a critical juncture in 2025. With machine identities now far outnumbering human ones, securing these digital credentials has become a top cybersecurity priority for enterprises. However, as the CyberArk 2025 State of Machine Identity Security Report shows, many of the 1,200 security leaders in organizations we surveyed—across the U.S., U.K., Australia,…

How CISOs can use identity to advance zero trust

AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust and launch identity-based attacks with staggering scale and sophistication. I’m talking about mutating polymorphic malware, prolonged ransomware sneak attacks that lead to double-extortion and deepfakes that defraud victims every few minutes. CISOs must adapt to this reality by implementing zero…

BSidesLV24 – Keynotes – Day One: “Secure AI” Is 20 Years Old

Authors/Presenters: Sven Cattell Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Keynotes – Day One: “Secure AI” Is 20 Years Old appeared first on Security…

Mark Cuban backs Skylight, a TikTok alternative built on Bluesky’s underlying technology

Skylight, a startup taking on TikTok with a more open alternative, is launching its mobile app to the public on Tuesday after just ten weeks of active development. The app, which is backed by Mark Cuban and others, is now one of many to build on top of the AT Protocol — the same technology…

Democratic groups sue to block Trump administration’s elections order

The Democratic Party has filed a lawsuit against the Trump administration over its elections executive order, arguing the president lacks the constitutional authority to regulate elections by fiat. The suit, filed Monday in the District of Columbia District Court, was brought by Senate Minority Leader Chuck Schumer, D-N.Y., House Minority Leader Hakeem Jeffries, D-N.Y., the…

TikTok is shutting down its Instagram competitor TikTok Notes

TikTok is shutting down its Instagram competitor, TikTok Notes, on May 8. The photo-sharing app launched in testing in Canada, Australia, and Vietnam last year. The company is notifying TikTok Notes users of its decision to retire the app and is directing them to ByteDance-owned Lemon8, which isn’t surprising given that the apps are quite…

March Recap: New AWS Sensitive Permissions and Services

As March 2025 comes to a close, we’re back with the latest round of AWS sensitive permission updates, newly supported services, and key developments across the cloud landscape. Staying current with these changes is essential for maintaining a secure and well-governed environment—especially as new permissions continue to emerge with the potential to impact everything from…

IONIX Unveils Parked Domain Classification 

IONIX is proud to announce the launch of our new Parked Domain Classification capability within our Exposure Management platform. This feature enables security teams to intelligently categorize and monitor parked domains as distinct assets, significantly reducing alert noise while maintaining comprehensive visibility across your entire domain portfolio. By implementing risk-based prioritization for these assets, organizations……

The AI Fix #44: AI-generated malware, and a stunning AI breakthrough

In episode 44 of The AI Fix, ChatGPT won’t build a crystal meth lab, GPT-4o improves the show’s podcast art, some students manage to screw in a lightbulb, Google releases Gemini 2.5 Pro Experimental and nobody notices, and Mark invents a clock for measuring AI time. Graham explains how ChatGPT’s love for Young Adult fiction…

Qualcomm acquires generative AI division of Vietnamese startup VinAI

Qualcomm has acquired the generative AI division of VinAI, an AI research company headquartered in Hanoi, for an undisclosed amount, the companies announced on Monday. The move marks Qualcomm’s continued expansion into the AI tooling sector. VinAI, which was founded by former DeepMind research scientist Hung Bui, develops a range of generative AI technologies, including…

Identity lapses ensnared organizations at scale in 2024

Cybercriminals predominantly relied on weaknesses in identity controls to afflict organizations in 2024, with valid accounts being the main way they gained access for the second year in a row, Cisco Talos said in an annual report released Monday. Across the incident response cases Cisco Talos responded to last year, 60% involved an identity attack…

BSidesLV24 – Keynotes – Day One: “Secure AI” Is 20 Years Old

Authors/Presenters: Sven Cattell Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Keynotes – Day One: “Secure AI” Is 20 Years Old appeared first on Security…

Meet Ponte Labor, a startup matching Hispanic immigrants to jobs using WhatsApp

While working on their MBAs at Harvard Business School, Colombian immigrants Stephanie Murra and Lorenza Vélez noticed that most of the workers in the cafeteria were Hispanic. In conversations with them, a common theme kept coming up: how difficult it was for people who legally moved to the U.S. from Spanish-speaking countries to find their…

ReliaQuest secures $500 Million in funding, boosting AI-driven cybersecurity operations

U.S.-based cybersecurity firm ReliaQuest has secured a significant funding boost with a new investment round totaling over $500 million, elevating the company’s valuation to $3.4 billion. The funding round was led by global investors EQT Partners, KKR, and FTV Capital, alongside existing investors Ten Eleven Ventures and Finback Investment Partners. This fresh capital injection underscores…

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing

A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and Rich Communication Services (RCS) for Android. Lucid’s unique selling point lies in its weaponizing of legitimate communication platforms to sidestep traditional SMS-based detection mechanisms. “Its scalable,

Altgeräte bedrohen Sicherheit in Unternehmen

width=”2500″ height=”1406″ sizes=”(max-width: 2500px) 100vw, 2500px”>Schwachstellen in alten Netzwerkgeräten stellen ein erhebliches Sicherheitsrisiko für Unternehmen dar. SeventyFour – shutterstock.com Eine Analyse von Ciscos Threat-Intelligence-Team Talos zeigt, zwei der drei häufigsten Schwachstellen, auf die es Angreifer im Jahr 2024 abgesehen hatten, waren in alten Netzwerkgeräten zu finden. Das Problem ist, dass Hersteller dazu keine Patches mehr…

Navigating the Quantum Shift: A Practical Approach to Crypto-Agility with PQC-Enabled PKI

The conversation around quantum computing is shifting from theory to reality, especially when it’s centered on security and mounting threats against current encryption algorithms. The UK National Cyber Security Centre’s (NCSC) recent guidance on “PQC Migration Timelines” underscores the urgency for organizations to transition to post-quantum cryptography (PQC). Urgency is being driven by the rising…

Sherweb Launches usecure for MSPs in Marketplace

Sherweb, a cloud marketplace and distributor for managed service providers (MSPs), recently announced usecure, an automated Human Risk Management (HRM) platform for MSPs, is now available. usecure brings security training offering to Sherweb MSPs The usecure platform will allow MSPs to provide their clients with automated, user-tailored training to improve security awareness without complexity. It…

Businesses boost AI investment, but workforce upskilling ‘remains a growing challenge’

GUEST RESEARCH 57% of Australian HR professionals report an increase in AI-related budgets in 2025 (up from 38% in 2024). 83% believe AI will significantly impact HR this year, with 32% calling it ‘transformative’.1 in 4 (27%) say workforce upskilling will be their organisation’s biggest challenge in the next 12 months – up from fourth…

ChatGPT isn’t the only chatbot that’s gaining users

OpenAI’s ChatGPT may be the world’s most popular chatbot app. But rival services are gaining, according to data from analytics firms Similarweb and Sensor Tower. SimilarWeb, which estimates traffic to websites including chatbot web apps, has recorded healthy recent upticks in usage across bots like Google’s Gemini and Microsoft’s OpenAI-powered Copilot. Gemini’s web traffic grew…

Lip-Bu Tan says Intel will spin off non-core units

Intel’s new CEO Lip-Bu Tan wasted no time laying out his plans for the semiconductor giant. Speaking at the Intel Vision conference this week, Tan told attendees that the company will spin off assets that aren’t core to its mission, Bloomberg reported. Tan didn’t specify what was classified as core and non-core to the company’s…

Ente wants to take on Google Photos with its privacy-first photo storage service

Despite Google’s intentions for its default image viewing and editing app for Android, the Photos app has, over the years, become one of the most popular photo backup services around. In fact, it was one of the most attractive offerings for years until it stopped offering unlimited storage in 2020. That change in the tech…

OpenSSF guidelines encourage OSS developers to build securely

Developers have always had a conflicted relationship with security. While they don’t want to produce software with security flaws, they don’t want to be security experts either. With that in mind, the Open Source Security Foundation (OpenSSF) has released the Open Source Project Security Baseline. The post OpenSSF guidelines encourage OSS developers to build securely…

Tax Season Threat Surge 

Veriti Research has identified a significant rise in tax-related malware samples across multiple platforms. The research team discovered malware samples targeting Android, Linux, and Windows, all connected to the same adversary operating from a single IP address.  We believe the attacker is running multiple parallel campaigns and using “Malware-as-a-Service” tools to target various platforms simultaneously,…

Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices

Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild to older models and previous versions of the operating systems. The vulnerabilities in question are listed below – CVE-2025-24085 (CVSS score: 7.3) – A use-after-free bug in the Core Media component that could permit a malicious application already…

Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign

Cybersecurity researchers are warning of a spike in suspicious login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect gateways, with nearly 24,000 unique IP addresses attempting to access these portals. “This pattern suggests a coordinated effort to probe network defenses and identify exposed or vulnerable systems, potentially as a precursor to targeted exploitation,” threat

China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions

Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government, technology, logistics, manufacturing, telecommunications, IT services, and retail in the Asia-Pacific (APAC) and Latin American (LATAM) regions. “The first sighting of its activity was in the second quarter of 2023; back then,…

New Case Study: Global Retailer Overshares CSRF Tokens with Facebook

Are your security tokens truly secure? Explore how Reflectiz helped a giant retailer to expose a Facebook pixel that was covertly tracking sensitive CSRF tokens due to human error misconfigurations. Learn about the detection process, response strategies, and steps taken to mitigate this critical issue. Download the full case study here.  By implementing Reflectiz’s recommendations,…

LLMs are now available in snack size but digest with care

As large language models (LLMs) gain mainstream, they are pushing the edges on AI-driven applications, adding more power and complexity. Running these massive models, however, comes at a price. The high costs and latency associated with them make them impractical for many real-world scenarios. Enter model distillation. A technique AI engineers are using to pack…

WordPress Appliance - Powered by TurnKey Linux