Geek-Guy.com

Month: April 2025

Google’s DeepMind UK team reportedly seeks to unionize

Around 300 London-based members of Google’s AI-focused DeepMind team are seeking to unionize with the Communication Workers Union, according to a Financial Times report that cites three people involved with the unionization effort. These DeepMind employees are reportedly unhappy about Google’s decision to remove a pledge not to use AI for weapons or surveillance from…

Stay Ahead in Cloud-Native Security

Is Staying Current in Cloud-Native Security Trends Important? Absolutely! Staying ahead in cloud-native security trends is essential for organizations of all sizes and across various industries. Non-Human Identities (NHIs) and their secrets are fundamental to these trends, requiring expertise in data management and cybersecurity for effective protection and oversight. What are Non-Human Identities and why…

Adapting to Modern Threats in Cloud Security

Are You Effectively Managing Your Non-Human Identities? For quite a while, organizations have been grappling with numerous cybersecurity challenges. However, one obstacle stands out – the management of Non-Human Identities (NHIs) and their secrets. These NHIs, linked with a unique secret as an identifier, pose quite a number of threats that many fail to address…

Feel Supported by Robust PAM

Can Robust PAM Systems Make a Difference? We delve into the intricacies of Non-Human Identities (NHIs) and Secrets Security Management. A well-configured PAM system, especially for organizations operating, can be the cornerstone of a solid cybersecurity strategy. A Deep Dive into Non-Human Identities and Secrets: Non-Human Identities (NHIs) are the machine identities that play crucial…

Secure Your Secrets with Effective Rotation

Why Does Secrets Rotation Matter in Cybersecurity? Secrets rotation, a cybersecurity best practice, is a procedure to refresh and modify privileged credentials regularly. It’s a critical facet of managing Non-Human Identities (NHIs) and their associated secrets, a fundamental component of contemporary cybersecurity strategies. But why does it hold such significance? NHIs, or machine identities, complement…

Amazon’s big book sale just happens to overlap with Independent Bookstore Day

Amazon is raising eyebrows with the timing of its big book sale for 2025, which runs from April 23 to 28 — which means it’s competing directly with Independent Bookstore Day. As writer Maris Kreisman explained in Lit Hub, Independent Bookstore Day is an annual event organized by the American Booksellers Association (ABA), with events,…

BSidesLV24 – Ground Truth – Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs

Author/Presenter: Suha Sabi Hussain Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Ground Truth – Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs…

Instagram Edits topped 7M downloads in first week, a bigger launch than CapCut’s

Instagram Edits, Meta’s newly released video creation app, had a bigger debut than its direct competitor, ByteDance’s CapCut, once did. The new app, which today helps users craft videos for Instagram reels, stories, and other social posts, was downloaded an estimated 702,900 times on iOS devices during its first two days on the market. That’s…

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka…

Musk’s xAI Holdings is reportedly raising the second-largest private funding round ever

Elon Musk’s xAI Holdings is in talks to raise $20 billion in fresh funding, potentially valuing the AI and social media combo at over $120 billion, according to a new Bloomberg report that says talks are in the “early stages.” If successful, the deal would constitute the the second-largest startup funding round ever, behind only…

TechCrunch Mobility: Slate’s ‘transformer’ EV truck breaks cover and Tesla’s dueling realities

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Busy week, so let’s get to it. Starting with federal regulations! Woohoo. Exciting stuff.  I’m talking about the U.S. Department of Transportation’s new Automated Vehicle Framework, which…

Anthropic sent a takedown notice to a dev trying to reverse-engineer its coding tool

In the battle between two “agentic” coding tools — Anthropic’s Claude Code and OpenAI’s Codex CLI — the latter appears to be fostering more developer goodwill than the former. That’s at least partly because Anthropic has issued takedown notices to a developer trying to reverse-engineer Claude Code, which is under a more restrictive usage license…

SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability

Attackers have been exploiting a critical zero-day vulnerability in the Visual Composer component of the SAP NetWeaver application server since early this week. SAP released an out-of-band fix that’s available through its support portal and it should be applied immediately, especially on systems that are directly exposed to the internet. “Unauthenticated attackers can abuse built-in…

Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor

An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this space.  The work of cloud and Kubernetes security company Armo, the PoC is called ‘Curing’, a portmanteau word that combines the idea of a ‘cure’…

Anton’s Security Blog Quarterly Q1 2025

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Dall-E security blogging image Top 10 posts with the most lifetime views (excluding paper announcement blogs, Medium posts only): Security Correlation Then…

Deel files countersuit against Rippling as rivalry escalates

In the latest development of an increasingly public dispute between HR and payroll services rivals, Deel has filed a countersuit against Rippling. To recap: Rippling publicly announced on March 17 that it was suing Deel over alleged corporate espionage, with accusations ranging from violation of the RICO racketeering act (typically used to prosecute organized crime)…

Slate Auto eyes former Indiana printing plant for its EV truck production

Slate Auto, the buzzy new EV startup that broke stealth this week, is close to locking in a former printing plant located in Warsaw, Indiana as the future production site for its cheap electric truck, a review of public records shows. The company is expected to lease the 1.4 million-square-foot facility for an undisclosed sum.…

TechCrunch StrictlyVC in Athens in May will feature a special guest: Greece’s prime minister

We’re thrilled to announce that Greece’s prime minister, Kyriakos Mitsotakis, will be joining us at our upcoming StrictlyVC event in Athens, co-hosted with Endeavor, on Thursday night, May 8, at the stunning Stavros Niarchos Foundation Cultural Center. For those who might not be familiar with his background, Mitsotakis brings a fascinating blend of experiences to…

Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help

Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest risk to their operations. Existing scoring systems are invaluable but can lack context. Here’s how Tenable’s Vulnerability Watch classification system can help. Background Over the past six years working in Tenable’s research organization, I’ve watched…

To Catch A Thief | Rubrik

For this special live recording of To Catch a Thief at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth sits down with those who have been directly targeted by, traced, or directly engaged China’s state-sponsored hackers, diplomatically, or in the cyber domain:…

House bill seeks better tech to combat financial fraud scams against elderly

A bipartisan trio of House lawmakers is pushing a bill that would give law enforcement more resources to tackle financial fraud, pig butchering and other scams that specifically target older Americans. The Guarding Unprotected Aging Retirees from Deception (GUARD) Act from Reps. Zach Nunn, R-Iowa, Josh Gottheimer, D-N.J., and Scott Fitzgerald, R-Wis., would give state,…

AI Innovation at Risk: FireTail’s 2025 Report Reveals API Security as the Weak Link in Enterprise AI Strategies – FireTail Blog

Apr 25, 2025 – Alan Fagan – Washington, D.C. — 25th April 2025 — FireTail, the leading AI & API security platform, has released its annual report, The State of AI & API Security 2025, revealing a critical blind spot in the way organizations are securing their AI investments. Despite record-breaking AI adoption, the report…

SAP zero-day vulnerability under widespread active exploitation

Threat hunters and security researchers have observed widespread exploitation of a zero-day vulnerability affecting SAP NetWeaver systems. The unrestricted file upload vulnerability — CVE-2025-31324 — has a base score of 10 on the CVSS scale and allows attackers to upload files directly to the system without authorization.  The software defect, which affects the SAP Visual…

ChatGPT: Everything you need to know about the AI-powered chatbot

ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users. 2024 was a big year for OpenAI, from its partnership…

Startups Weekly: Tech IPOs and deals proceed, but price matters

Welcome to Startups Weekly — your weekly recap of everything you can’t miss from the world of startups. Want it in your inbox every Friday? Sign up here. This week confirmed that deals can still happen in a troubled world, but price considerations and adjustments are now part of the picture. Most interesting startup stories…

Arms Cyber Launches Preemptive Anti-Ransomware Capabilities

Arms Cyber recently announced a new capability of its solution for companies with endpoints running on Linux or Windows that combines preemptive deception, movement, and hiding capabilities to help them detect, block, and remediate from encryption and business interruption activities. “The size and scope of ransomware attacks are increasing every day,” said Arms Cyber Chief…

CrowdStrike Expanding Google Cloud Partnership to Secure AI Innovation

Cybersecurity vendor CrowdStrike recently announced it would expand integration with Google Cloud to enable end-to-end security for AI innovation with CrowdStrike Falcon Cloud Security. Google Cloud recently named CrowdStrike its Security Partner of the Year for Cloud Workload Security, honoring the company as a leader in implementing security solutions, including infrastructure, workloads, applications, identities, data,…

Backblaze Launches New Solution for High-Performance Cloud Storage

Cloud storage provider Backblaze recently announced B2 Overdrive, a high-performance cloud storage solution delivering terabit-speed throughput starting at $15 per terabyte. Built for organizations seeking to optimize data throughput performance, it is designed to eliminate the compromise between performance and economics that have constrained data-intensive workloads. The B2 Overdrive builds on Backblaze’s cloud storage infrastructure…

Google’s AI search numbers are growing, and that’s by design

Google started testing AI-summarized results in Google Search, AI Overviews, two years ago, and continues to expand the feature to new regions and languages. By the company’s estimation, it’s been a big success. AI Overviews is now used by more than 1.5 billion users monthly across over 100 countries. AI Overviews compiles results from around…

Roelof Botha, the head of Sequoia Capital, is coming to TechCrunch Disrupt 2025

We’re thrilled to announce that Roelof Botha, the managing partner of Sequoia Capital and one of the most influential figures in the venture capital world, will join us live onstage at TechCrunch Disrupt 2025 at Moscone West in San Francisco, which will take place from October 27 to 29. As part of our ongoing mission…

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread

Last day to boost your brand and host a Side Event at TechCrunch Sessions: AI

This is your last chance to put your brand at the center of the AI conversation during TechCrunch Sessions: AI Week — with applications to host a Side Event closing tonight at 11:59 p.m. PT. From June 1-7, TechCrunch is curating a dynamic weeklong series of Side Events leading up to and following the main…

Prince Harry meets, funds youth groups advocating for social media and AI safety

Prince Harry, Duke of Sussex, walked into the sunlight-lit hotel conference room in Brooklyn on Thursday to meet with a dozen youth leaders working in tech safety, policy, and innovation. The young adults chatted away at black circular tables, many unaware of his presence until he plopped down at a table and started talking with…

Die Bösen kooperieren, die Guten streiten sich

Eine Koalition einflussreicher CISOs sieht den G7-Gipfel 2025 als ideale Gelegenheit, die G7- und OECD-Mitgliedsstaaten zu einer stärkeren Zusammenarbeit und Harmonisierung der Cybersicherheitsvorschriften zu bewegen. Maxx-Studio – shutterstock.com Da Cyberangriffe immer weiter zunehmen und internationale Banden vermehrt miteinander kooperieren, bedarf es einer stärkeren, grenzüberschreitenden Zusammenarbeit der „Guten“. Das zumindest behaupten Führungskräfte namhafter Unternehmen wie Salesforce,…

Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25

Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at unprecedented speeds, and vulnerabilities, whether human or AI-generated, are lingering far too long. What’s the logical outcome? Increased exploitation in your production environment. The strategic imperative is clear: We must implement robust detection and response capabilities…

Critical Commvault SSRF could allow attackers to execute code remotely

Commvault is warning customers of a critical vulnerability affecting Command Center, a web-based management console for its data protection and backup offerings. The flaw, tracked as CV-2025-34028, could allow remote attackers to execute arbitrary code without authentication on affected Linux as well as Windows installations. “This Commvault vulnerability underscores a significant risk: attackers can exploit…

Darcula phishing toolkit gets AI boost, democratizing cybercrime

Enterprise security teams face an immediate escalation in phishing threats as the notorious Darcula toolkit has now started weaponizing generative AI to create highly convincing phishing pages at unprecedented speed and scale. Researchers at cybersecurity firm Netcraft detected this alarming development on April 23, documenting how the platform has evolved to enable even novice attackers…

Avaya Transforms Contact Centers with New Infinity Platform

Avaya just released its new Infinity platform, which is designed to solve the problem of “fragmented” customer experiences. The platform helps businesses transform their contact centers into what they’re calling “connection centers” that build stronger relationships with customers.  Infinity is designed to blend AI and intelligent orchestration into existing business systems, connecting previously siloed channels,…

NVIDIA Announces General Availability for NeMo Microservices

Multinational technology company NVIDIA recently announced that its NeMo microservices will now be generally available to help enterprise IT build AI teammates using data flywheels to scale employee productivity. These microservices provide an end-to-end platform for building AI agents to scale employee productivity with data flywheels using human and AI feedback, and are informed by…

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  “The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this…

Vor diesen Ransomware-Banden sollten Sie sich hüten

loading=”lazy” width=”400px”>Ransomware-Attacken werden immer mehr. Höchste Zeit, die Schutzmaßnahmen hochzufahren. Zephyr_p – shutterstock.com In den ersten drei Monaten des laufenden Jahres gab es einen neuen Höchststand bei den weltweit gemeldeten Ransomware-Vorfällen. Laut dem aktuellen Bericht State of Ransomware von Check Point Research (CPR) haben Hacker im ersten Quartal 2025 insgesamt 2.289 Unternehmen erpresst – 126…

Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this month that saw malware infiltrate its internal systems, and access data related to customers’ SIM cards. Read more in my article on the Hot for Security blog.

Cybercriminals switch up their top initial access vectors of choice

Third-party involvement in breaches and exploitation of vulnerabilities have become more important factors in security breaches, according to the latest edition of Verizon’s Data Breach Investigation Report (DBIR). An analysis of 22,000 security incidents, including 12,195 confirmed data breaches in 139 countries, found that credential abuse (22%) and exploitation of vulnerabilities (20%, up from 14.9%…

6 types of risk every organization must manage — and 4 strategies for doing it

Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your organization. That’s a straightforward description of a generic process, but as any IT leader knows, risk management applied to your industry or company is anything but. To help break down this complex process, this article provides an overview…

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below – CVE-2025-27610 (CVSS score: 7.5) – A path…

RSAC 2025 Innovation Sandbox | Aurascape: Reconstructing the Intelligent Defense Line of AI Interactive Visibility and Native Security

Company Overview Aurascape is a cybersecurity startup founded in 2023 and headquartered in Santa Clara, California, USA. The company was co-founded by senior security experts and engineers from world-class technology companies such as Palo Alto Networks, Google, and Amazon. The team has deep expertise in the fields of network security, artificial intelligence, and network infrastructure,…

A Smarter Alternative to Entra Permissions Management

Microsoft has announced the retirement of Entra Permissions Management (formerly CloudKnox), with sales ending June 30, 2025. EPM offered valuable visibility into cloud permissions, helping teams identify overprivileged identities across AWS, Azure, and GCP. But for many organizations, that visibility came with significant manual overhead: Policy rewrites, change windows, and time-consuming investigations. As EPM sunsets,…

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were “installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024,” JPCERT/CC researcher Yuma

WordPress Appliance - Powered by TurnKey Linux