Geek-Guy.com

Month: April 2025

4 big mistakes you’re probably still making in vulnerability management…and how to fix them

Let’s be honest folks, vulnerability management isn’t the same game it was five years ago. But if you’re still running periodic scans, ‘offering’ updates vs enforcing, and chasing CVSS scores like they’re all that matters, you’re playing by outdated rules. Today’s environments are fast, fragmented, and full of moving targets; all while attackers are evolving…

Wallarm Extends API Security Reach to AI Agents

Wallarm at the 2025 RSA Conference announced that, starting this summer, it will extend the reach of its platform for securing application programming interfaces (APIs) to include artificial intelligence (AI) agents. Tim Erlin, vice president of product for Wallarm, said the Agentic AI Protection capability added to the platform makes it possible to thwart attack..…

Lightrun grabs $70M using AI to debug code in production

AI-based coding has exploded in popularity on the promise that it will make developers’ jobs faster and easier. But it’s also resulted in something else: a vast increase in lines of code, and thus the likelihood of bugs resulting in crashes or other mishaps. Today, an Israeli startup called Lightrun — which has built an…

⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed with powerful tools that do the heavy lifting — from AI-powered phishing kits to large botnets ready to strike. And they’re not just after big corporations. Anyone can be a target when fake identities, hijacked infrastructure, and insider…

How Breaches Start: Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches. These five real vulnerabilities, uncovered by Intruder’s bug-hunting team, reveal how attackers turn overlooked flaws into serious security incidents. 1. Stealing AWS Credentials with a Redirect Server-Side Request…

Da bloccati a supportati: aiutare i miei clienti ad atterrare in sicurezza con FireMon

Quando Skybox Security ha chiuso, ho avuto seri dubbi, non solo riguardo al mio lavoro, ma anche su come la situazione avrebbe potuto influire sulla mia credibilità professionale che ho… The post Da bloccati a supportati: aiutare i miei clienti ad atterrare in sicurezza con FireMon appeared first on Security Boulevard.

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024. The attacks, per Trend Micro, have leveraged custom malware, rootkits, and cloud storage services for data exfiltration. The Philippines, Vietnam, Thailand, and Malaysia are among…

OmniRetail shakes up Africa’s B2B e-commerce market with $20M Series A

When Deepankar Rustagi last raised money for OmniRetail in 2022, excitement was high for African startups addressing the supply chain and operational challenges in the fast-moving consumer goods (FMCG) sector. At one point, these startups received more capital than all sectors, except fintech. Recently, though, the industry’s enthusiasm and venture capital’s interest have faded, as…

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a “critical patch” but deploy a backdoor instead. WordPress security company Patchstack described the activity as sophisticated and a variant of another campaign observed in December 2023 that employed a fake CVE ploy to…

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day attacks to breach servers and gain unauthorized access. The attacks, first observed by Orange Cyberdefense SensePost on February 14, 2025, involve chaining the below vulnerabilities – CVE-2024-58136 (CVSS score: 9.0) – An improper protection of alternate path flaw…

StrictlyVC heads to london and Athens this May: Featuring Prime Minister of Greece and Europe’s leading tech and VC voices

It’s been a busy year for TechCrunch events — and it’s about to get even bigger. StrictlyVC, our boutique, highly exclusive event series for VCs and startups, is crossing the Atlantic this May with stops in London and Athens! We’re bringing StrictlyVC’s insider conversations to Europe. On May 8, we’ll dive into Athens’ booming tech…

IT-Security ist keine Vertrauenssache

G Data warnt davor, die Komplexität heutiger Bedrohungsszenarien zu unterschätzen. Pictrider – shutterstock.com Geht es um Cybersicherheit, fühlt sich die Mehrheit der Anwender bei ihren IT-Kollegen gut aufgehoben. Knapp acht von zehn Beschäftigten in Deutschland (78 Prozent) sind überzeugt, dass die IT-Abteilung den aktuellen Anforderungen an eine effektive IT-Sicherheit gewachsen ist.   Zu diesem Ergebnis kommt…

From coding tests to billion-dollar startups, Ali Partovi’s eight-year experiment is paying off

In Silicon Valley, where the same high-wattage names tend to dominate the headlines, Ali Partovi has long wielded outsized influence despite limited name recognition. The Iranian-born Harvard graduate built an impressive resume early on — joining the founding team of LinkExchange (acquired by Microsoft in 1998 for $265 million), co-founding iLike (sold to MySpace for…

Are You Capable of Managing NHIDs Efficiently?

Are You Understanding the Complexities of Managing NHIDs? When it comes to reinforcing cybersecurity, how confident are you in providing adequate protection for your Non-Human Identities (NHIs)? Are you familiar with the mechanisms that drive efficient identity management, specifically focusing on NHIDs and Secrets Management? It’s a pivotal part of fortifying your cloud security, yet…

Optimistic About Your Cybersecurity Strategy?

Why should Cybersecurity Strategy Spark Optimism? Why is there a growing wave of optimism surrounding cybersecurity strategies, especially with the increasing incidence of cyber threats? The answer lies in the revolutionary approach of Non-Human Identities (NHIs) and Secrets Security Management. The proactive nature of this approach, focused on end-to-end protection, is shifting cybersecurity as we…

Delivering Value with Advanced IAM

Why is Advanced Identity and Access Management Necessary? Have you ever imagined the chaos that would ensue if all the people in a bustling city, for instance, Los Angeles or New York, swapped their identities suddenly? A similar scenario might unfold in an organization without a robust Identity and Access Management (IAM) system. Without a…

Creating Impenetrable Cloud Compliance Practices

Are Your Cloud Compliance Practices Truly Impenetrable? Non-Human Identities (NHIs) and Secrets Management have emerged as critical components of an effective cybersecurity strategy. These effectively address the security gaps that often exist between the security and R&D teams within an organization, ensuring a secure and compliant cloud environment. Grasping the Concept of Non-Human Identities NHIs…

Rapid7 launches Managed Detection & Response (MDR) for enterprise, a ‘fully managed and customised service’

Purpose-built for large enterprises, the latest evolution of Rapid7’s MDR offering delivers flexible, expert-led cybersecurity coverage that meets the unique demands of complex, distributed environments Extended risk and threat detection provider Rapid7 has announced the launch of Managed Detection & Response (MDR) for Enterprise, a fully managed and customisable detection and response service designed to…

New geolocus-cli For ONYPHE’s Geolocus Database

ONYPHE has made available a free API and free MMDB download of their new Geolocus database. It provided IP address metadata in the form of: { “abuse”: [ “amzn-noc-contact@amazon.com”, “aws-routing-poc@amazon.com”, “aws-rpki-routing-poc@amazon.com”, “trustandsafety@support.aws.com” ], “asn”: “AS14618”, “continent”: “NA”, “continentname”: “North America”, “country”: “US”, “countryname”: “United States”, “domain”: [ “amazon.com”, “amazonaws.com”, “aws.com” ], “ip”: “3.215.138.152”, “isineu”: 0,…

Welcome to Chat Haus, the coworking space for AI chatbots

Nestled between an elementary school and a public library in Brooklyn’s Greenpoint neighborhood sits a new kind of “luxury” coworking space.  Dubbed the Chat Haus, this space has many of the elements you’d find in a traditional coworking office: people hammering away at their computer keyboards, another person taking a phone call, someone else pausing…

Report finds Meta’s celebrity-voiced chatbots could discuss sex with minors

AI chatbots available on Meta’s platforms like Facebook and Instagram can engage in sexually explicit conversations with underage users, according to a new report in the Wall Street Journal. The WSJ says that after learning about internal concerns about whether the company was doing enough to protect minors, it spent months conducting hundreds of conversations…

BSidesLV24 – Ground Truth – Seek Out New Protocols, And Boldly Go Where No One Has Gone Before

Authors/Presenters: Douglas McKee Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Ground Truth – Seek Out New Protocols, And Boldly Go Where No One Has…

New Rubrik Identity Resilience Designed to Mitigate the Most Targeted Point of Cyber Attacks

Disrupt Identity-Based Attacks: Counter fastest-growing threat vector with advanced resilience for complex identity environments Unified Protection on One Platform: Designed for data and identity security to eliminate vulnerabilities from disparate point solutions Complete Resilience Coverage: Protect across on-premises, cloud, and SaaS with visibility into data and identity interactions to accelerate detection and recovery

Here are Latin America’s biggest startups based on valuation

Not so long ago, the idea of public tech companies emerging from Latin America seemed far-fetched, and Mercado Libre once appeared as rare and mythical as a true unicorn. Today, however, the region is home to several startups that have reached billion-dollar valuations. Some of these startups, propelled into the spotlight by cross-border expansion, are…

NSFOCUS APT Monthly Briefing – March 2025

Regional APT Threat Situation Overview In March 2025, the global threat hunting system of NSFOCUS Fuying Laboratory discovered a total of 19 APT attack activities. These activities were mainly distributed in South Asia, East Asia, Eastern Europe, and South America, as shown in the following figure. In terms of group activity, the most active APT…

GDPR Data Breach Notification Template With Examples [Download]

The GDPR is a law developed by the European Union (EU) to protect individuals’ personal data. Although it originated in the EU, several countries and organisations outside Europe have to date also adopted this regulation, which shows how detailed and well-thought-out it is. Among many of the GDPR’s guidelines, the data breach notification letter is…

Google’s DeepMind UK team reportedly seeks to unionize

Around 300 London-based members of Google’s AI-focused DeepMind team are seeking to unionize with the Communication Workers Union, according to a Financial Times report that cites three people involved with the unionization effort. These DeepMind employees are reportedly unhappy about Google’s decision to remove a pledge not to use AI for weapons or surveillance from…

Stay Ahead in Cloud-Native Security

Is Staying Current in Cloud-Native Security Trends Important? Absolutely! Staying ahead in cloud-native security trends is essential for organizations of all sizes and across various industries. Non-Human Identities (NHIs) and their secrets are fundamental to these trends, requiring expertise in data management and cybersecurity for effective protection and oversight. What are Non-Human Identities and why…

Adapting to Modern Threats in Cloud Security

Are You Effectively Managing Your Non-Human Identities? For quite a while, organizations have been grappling with numerous cybersecurity challenges. However, one obstacle stands out – the management of Non-Human Identities (NHIs) and their secrets. These NHIs, linked with a unique secret as an identifier, pose quite a number of threats that many fail to address…

Feel Supported by Robust PAM

Can Robust PAM Systems Make a Difference? We delve into the intricacies of Non-Human Identities (NHIs) and Secrets Security Management. A well-configured PAM system, especially for organizations operating, can be the cornerstone of a solid cybersecurity strategy. A Deep Dive into Non-Human Identities and Secrets: Non-Human Identities (NHIs) are the machine identities that play crucial…

Secure Your Secrets with Effective Rotation

Why Does Secrets Rotation Matter in Cybersecurity? Secrets rotation, a cybersecurity best practice, is a procedure to refresh and modify privileged credentials regularly. It’s a critical facet of managing Non-Human Identities (NHIs) and their associated secrets, a fundamental component of contemporary cybersecurity strategies. But why does it hold such significance? NHIs, or machine identities, complement…

Amazon’s big book sale just happens to overlap with Independent Bookstore Day

Amazon is raising eyebrows with the timing of its big book sale for 2025, which runs from April 23 to 28 — which means it’s competing directly with Independent Bookstore Day. As writer Maris Kreisman explained in Lit Hub, Independent Bookstore Day is an annual event organized by the American Booksellers Association (ABA), with events,…

BSidesLV24 – Ground Truth – Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs

Author/Presenter: Suha Sabi Hussain Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Ground Truth – Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs…

Instagram Edits topped 7M downloads in first week, a bigger launch than CapCut’s

Instagram Edits, Meta’s newly released video creation app, had a bigger debut than its direct competitor, ByteDance’s CapCut, once did. The new app, which today helps users craft videos for Instagram reels, stories, and other social posts, was downloaded an estimated 702,900 times on iOS devices during its first two days on the market. That’s…

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka…

Musk’s xAI Holdings is reportedly raising the second-largest private funding round ever

Elon Musk’s xAI Holdings is in talks to raise $20 billion in fresh funding, potentially valuing the AI and social media combo at over $120 billion, according to a new Bloomberg report that says talks are in the “early stages.” If successful, the deal would constitute the the second-largest startup funding round ever, behind only…

TechCrunch Mobility: Slate’s ‘transformer’ EV truck breaks cover and Tesla’s dueling realities

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Busy week, so let’s get to it. Starting with federal regulations! Woohoo. Exciting stuff.  I’m talking about the U.S. Department of Transportation’s new Automated Vehicle Framework, which…

Anthropic sent a takedown notice to a dev trying to reverse-engineer its coding tool

In the battle between two “agentic” coding tools — Anthropic’s Claude Code and OpenAI’s Codex CLI — the latter appears to be fostering more developer goodwill than the former. That’s at least partly because Anthropic has issued takedown notices to a developer trying to reverse-engineer Claude Code, which is under a more restrictive usage license…

SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability

Attackers have been exploiting a critical zero-day vulnerability in the Visual Composer component of the SAP NetWeaver application server since early this week. SAP released an out-of-band fix that’s available through its support portal and it should be applied immediately, especially on systems that are directly exposed to the internet. “Unauthenticated attackers can abuse built-in…

Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor

An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this space.  The work of cloud and Kubernetes security company Armo, the PoC is called ‘Curing’, a portmanteau word that combines the idea of a ‘cure’…

Anton’s Security Blog Quarterly Q1 2025

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Dall-E security blogging image Top 10 posts with the most lifetime views (excluding paper announcement blogs, Medium posts only): Security Correlation Then…

Deel files countersuit against Rippling as rivalry escalates

In the latest development of an increasingly public dispute between HR and payroll services rivals, Deel has filed a countersuit against Rippling. To recap: Rippling publicly announced on March 17 that it was suing Deel over alleged corporate espionage, with accusations ranging from violation of the RICO racketeering act (typically used to prosecute organized crime)…

Slate Auto eyes former Indiana printing plant for its EV truck production

Slate Auto, the buzzy new EV startup that broke stealth this week, is close to locking in a former printing plant located in Warsaw, Indiana as the future production site for its cheap electric truck, a review of public records shows. The company is expected to lease the 1.4 million-square-foot facility for an undisclosed sum.…

TechCrunch StrictlyVC in Athens in May will feature a special guest: Greece’s prime minister

We’re thrilled to announce that Greece’s prime minister, Kyriakos Mitsotakis, will be joining us at our upcoming StrictlyVC event in Athens, co-hosted with Endeavor, on Thursday night, May 8, at the stunning Stavros Niarchos Foundation Cultural Center. For those who might not be familiar with his background, Mitsotakis brings a fascinating blend of experiences to…