Geek-Guy.com

New DOJ proposal still calls for Google to divest Chrome, but allows for AI investments

The US Department of Justice is still calling for Google to sell its web browser Chrome, according to a Friday court filing.  The DOJ first proposed that Google should sell Chrome last year, under then-President Joe Biden, but it seems to be sticking with that plan under the second Trump administration. The department is, however,…

Google scrubs mentions of ‘diversity’ and ‘equity’ from responsible AI team webpage

Google has quietly updated the webpage for its Responsible AI and Human Centered Technology (RAI-HCT) team, the team charged with conducting research into AI safety, fairness, and explainability, to scrub mentions of “diversity” and “equity.” A previous version of the page used language such as “marginalized communities,” “diverse,” “underrepresented groups,” and “equity” to describe the…

Judge allows authors’ AI copyright lawsuit against Meta to move forward

A federal judge is allowing an AI-related copyright lawsuit against Meta to move forward, although he dismissed part of the suit. In Kadrey vs. Meta, authors including Richard Kadrey, Sarah Silverman, and Ta-Nehisi Coates have alleged that Meta has violated their intellectual property rights by using their books to train its Llama AI models, and…

Week in Review: OpenAI could charge $20K a month for an AI agent

Welcome back to Week in Review. This week we’re looking at OpenAI potentially charging $20,000 a month for a specialized AI agent, the unexpected return of early-internet darling Digg, a company genetically engineering mice to have mammoth-like fur, and more! Let’s do this. OpenAI could charge up to $20,000 per month for specialized AI “agents.”…

9 US AI startups have raised $100M or more in 2025

Last year was a monumental year for the AI industry in the U.S. and beyond. There were 49 startups that raised funding rounds worth $100 million or more in 2024, per our count at TechCrunch. Three companies raised more than one “mega-round” last year, and seven companies raised rounds at $1 billion or larger. How…

Chevy Silverado EV vs Rivian R1T: How two EVs handled the iconic Mint 400 off-road race

Something special went down in the desert outside of Las Vegas this weekend: two EVs took on the Mint 400 for the first time. Since the Mint 400 launched back in 1969, vehicles in this iconic desert endurance race have been powered by dead dinosaurs. Spectators and race participants alike are used to the smell…

BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of Risk

Author/Presenter: Thom Langford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of Risk appeared first on Security Boulevard.

5 devices to help ease your smartphone addiction

The downsides of doomscrolling and screen addiction are well documented, but while many of us would like to spend less time glued to a smartphone, it’s easier said than done. Much has been written about the so-called dumbphone revival, where individuals regain some respite from pings and push notifications by downgrading to a basic feature…

Weekly Update 442

We survived the cyclone! That was a seriously weird week with lots of build-up to an event that last occurred before I was born. It’d been 50 years since a cyclone came this far south, and the media was full of alarming predictions of destruction. In the end, we maxed out at 52kts just after…

Feds Link $150M Cyberheist to 2022 LastPass Hacks

In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022. In a court filing this week, U.S. federal agents investigating a spectacular $150 million cryptocurrency heist said they had…

Cursor in talks to raise at a $10B valuation as AI coding sector booms

Investor interest in AI-coding assistants is exploding. Anysphere, the developer of AI-powered coding assistant Cursor, is in talks with venture capitalists to raise capital at a valuation of nearly $10 billion, Bloomberg reported. The round, if it transpires, would come about three months after Anysphere completed its previous fundraise of $100 million at a pre-money…

How do I prioritize NHI risks in boardroom discussions?

Why is Risk Prioritization of Non-Human Identities Essential in Boardroom Discussions? Cybersecurity continues to command greater attention in organizational hierarchies, understanding the significance of Non-Human Identities (NHIs) risk prioritization becomes crucial. NHIs, defined as machine identities used in cybersecurity, provide a unique identifier similar to a passport. They play a monumental role in ensuring a…

How can NHIs affect our overall threat landscape?

Are We Overlooking Non-Human Identities in Our Cybersecurity Strategy? How often do we give due consideration to the Non-Human Identities (NHIs)? The role of NHIs and their ‘secrets’ management in creating a robust and secure IT infrastructure is often underestimated. NHIs, primarily machine identities, form the backbone of secure transactions. They are, in a way,…

What are the best governance practices for managing NHIs?

What Drives the Need for Effective Non-Human Identities (NHIs) Governance Practices? Are we really addressing the potential dangers that lurk behind poorly managed non-human identities (NHIs)? With a sharp increase in the interconnectedness of modern systems, the importance of proper NHIs management cannot be overstated. Organizations need to incorporate NHIs and secrets management into their…

Microsoft reportedly ramps up AI efforts to compete with OpenAI

Microsoft is accelerating its push to compete with OpenAI, its longtime collaborator, by developing its own powerful AI models and exploring alternatives to power products like Microsoft’s Copilot bot. Microsoft has developed its own AI “reasoning” models comparable to models like OpenAI’s o1 and o3-mini, the The Information reports. OpenAI is said to have refused…

Signal President Meredith Whittaker calls out agentic AI as having ‘profound’ security and privacy issues

Signal President Meredith Whittaker warned Friday that agentic AI could come with a risk to user privacy. Speaking on stage at the SXSW conference in Austin, Texas, the advocate for secure communications, referred to the use of AI agents as “putting your brain in a jar,” and cautioned that this new paradigm of computing —…

MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit

Go inside the landmark Kaseya Compliance Summit, a unique event featuring industry experts focused on compliance challenges and opportunities for small business. The post MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit appeared first on Kaseya. The post MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit appeared…

BSides Exeter 2024 – Keynote: Become A Better Security Engineer (By Not Doing Security)

Author/Presenter: Kane Narraway Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 – Keynote: Become A Better Security Engineer (By Not Doing Security) appeared first on Security Boulevard.

What is Instagram’s Threads app? All your questions answered

Twitter alternatives — new and old — have found audiences willing to try out a newer social networks since Elon Musk took over the company in 2022. Mastodon, Bluesky, Spill and T2 are some of the social media platforms people are among them. So is Meta’s Threads platform. What is Threads? How do you create…

Threads tests adding ‘interests’ on profiles to connect users with topical discussions

Meta’s Threads has begun testing a new feature that would allow people to add their interests to their profile on the social network. Instead of only advertising to profile visitors the sort of topics you might post about, the new interests feature will also direct users to active conversations about the topic. The company thinks…

Google removes ‘underrepresented’ language from its grant website

Just weeks after Google said it would review its diversity, equity, and inclusion programs, the Google for Startups Founders Fund webpage is peppered with changes. Most notably Google is now using past tense to describe all of its fund programs for underrepresented founders.  This is a change that took place after December, according to the internet…

Google debuts a new Gemini-based text embedding model

Google on Friday added a new, experimental “embedding” model for text, Gemini Embedding, to its Gemini developer API. Embedding models translate text inputs like words and phrases into numerical representations, known as embeddings, that capture the semantic meaning of the text. Embeddings are used in a range of applications, such as document retrieval and classification,…

Elon Musk’s AI company, xAI, acquires one-million-square-foot property in Memphis

xAI, Elon Musk’s AI company, has acquired a one-million-square-foot property in Southwest Memphis to expand its AI data center footprint, according to a press release from the Memphis Chamber of Commerce. The new land will host infrastructure to complement xAI’s existing Memphis data center. “xAI’s acquisition of this property ensures we’ll remain at the forefront…

TechCrunch Sessions: AI speaker applications close today, submit yours now

On June 5, TechCrunch Sessions: AI will kick off — and you can be part of the industry-changing conversations that will be taking place. We have an open invitation for members of the AI community to lead breakout sessions and discussions with over 1,200 startup founders, VC leaders, and AI aficionados attending our newest event, which…

Startups Weekly: Startups raised funding to help others navigate challenges

Welcome to Startups Weekly — your weekly recap of everything you can’t miss from the world of startups. Want it in your inbox every Friday? Sign up here. Sometimes problems are just that: problems. But often, they are also fodder. This week brought us a mix of startups facing adversity, sometimes of their own doing,…

Health expert warns of leaning too heavily on AI for social connections

With the rise of AI companions who serve as online friends or romantic interests, experts are questioning how the technology affects our real-world social connections and relationships. According to Kasley Killam, author of the social health-focused book “The Art and Science of Connection: Why Social Health is the Missing Key to Living Longer, Healthier, and…

Social health expert warns of leaning too heavily on AI for social connections

With the rise of AI companions who serve as online friends or romantic interests, experts are questioning how the technology affects our real-world social connections and relationships. According to Kasley Killam, author of the social health-focused book “The Art and Science of Connection: Why Social Health is the Missing Key to Living Longer, Healthier, and…

CISA completed its election security review. It won’t make the results public

When the Trump administration began sidelining and laying off personnel at the Cybersecurity and Infrastructure Security Agency, it started by targeting employees who worked on election security and disinformation. At the same time, the Department Homeland Security announced it would conduct a comprehensive review of CISA’s election security mission. This week, the agency confirmed that…

PEAK:AIO Expands Global AI Infrastructure Solutions with Dell

AI infrastructure provider PEAK:AIO recently announced the availability of a new version of its revolutionary AI Data Server to set a new standard for performance, density, and sustainability. The company’s 2U solution, engineered by Dell Technologies’ enterprise-grade precision and powered by PEAK:AIO’s software, provides 1.5PB of storage and 120GB/sec RDMA NFS and NVMe-oF performance. Efficiency…

Ransomware poseurs are trying to extort businesses through physical letters

The FBI and threat researchers are warning executives to be on the lookout for physical letters in the mail threatening to leak sensitive corporate data.  The letters, which are stamped “time sensitive read immediately” and shipped directly to executives through the Postal Service, are part of a nationwide scam designed to extort victims into paying…

DeepSeek: Everything you need to know about the AI chatbot app

DeepSeek has gone viral. Chinese AI lab DeepSeek broke into the mainstream consciousness this week after its chatbot app rose to the top of the Apple App Store charts (and Google Play, as well). DeepSeek’s AI models, which were trained using compute-efficient techniques, have led Wall Street analysts — and technologists — to question whether the U.S. can maintain its…

US charges admins of Garantex for allegedly facilitating crypto money laundering for terrorists and hackers

The administrators of Garantex, Aleksej Besciokov and Aleksandr Mira Serda, allegedly knew their crypto exchange was used to launder money, according to U.S. prosecutors. © 2024 TechCrunch. All rights reserved. For personal use only.

The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of Agentic Automation

Explore the evolution of Single Sign-On for autonomous AI agents, focusing on securing non-human identities and the future of agentic automation security. The post The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of Agentic Automation appeared first on Security Boulevard.

Russian crypto exchange Garantex seized in international law enforcement operation

U.S. and European law enforcement agencies have seized the infrastructure of Garantex, a cryptocurrency exchange accused of laundering billions in criminal proceeds, in a sweeping international operation that signals heightened focus on illicit financial flows in cryptocurrency markets. According to Justice Department documents unsealed Friday, the Moscow-based exchange processed approximately $96 billion in cryptocurrency transactions…

Google adds a Gemini panel to Calendar to help you manage your schedule

Google is testing a new AI-powered Gemini side panel within Google Calendar that lets users quickly and conversationally check their schedule, create an event, and look up event details. The feature is available as part of the tech giant’s early access testing program, Google Workspace Labs. You can access Gemini by clicking the “Ask Gemini”…

Russian propoganda is reportely influencing AI chatbot results

Russian propaganda may be influencing certain answers from AI chatbots including OpenAI’s ChatGPT and Meta’s Meta AI, according to a new report. NewsGuard, a company that develops rating systems for news and information websites, claims to have found evidence that a Moscow-based network named “Pravda” is publishing false claims to affect the responses of AI…

CollX raises $10M to grow its card collection marketplace

CollX, a company offering an online trading card marketplace, has raised $10 million in Series A funding. The round was co-led by Austin-based Brand Foundry Ventures and Philadelphia-based 114 Ventures, both of which were previous investors in the company. Other investors such as Next Coast Ventures, FJ Labs, and Ben Franklin Technology Partners also participated…

Last day to apply to be a TechCrunch Sessions: AI speaker

TechCrunch Sessions: AI kicks off on June 5 in Zellerbach Hall at UC Berkeley — and we want AI leaders to take part in industry-changing conversations. Make your mark by leading breakout sessions and discussions with over 1,200 startup founders, VC leaders, and other industry pioneers at TC Sessions: AI. But don’t wait, you have…

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Threat hunters have shed light on a “sophisticated and evolving malware toolkit” called Ragnar Loader that’s used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil). “Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in networks for long-term operations,”…

Compensating Controls, Customized Approach and Tokenization in PCI DSS 4.0

The Payment Card Industry Data Security Standard (PCI DSS) has always been considered one of the most prescriptive industry mandates around. And well might it be, given what’s at stake. As breach volumes surge and threat actors find it ever easier to bypass traditional cyber-defenses, the card industry must ensure that complying organizations are doing…

Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide

Microsoft has disclosed details of a large-scale malvertising campaign that’s estimated to have impacted over one million devices globally as part of what it said is an opportunistic attack designed to steal sensitive information. The tech giant, which detected the activity in early December 2024, is tracking it under the broader umbrella Storm-0408, a moniker…

Accrete CEO on Taking Agentic AI to the Enterprise

AI platform vendor Accrete recently announced its partnership with New Era Technologies, signalling a shift towards enterprise sales and a new business model for the eight year old company. Channel Insider spoke with CEO Prashant Bhuyan to learn more about he’s taking the company’s experience serving government agencies to Fortune 100 companies at scale. Platform…

Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactive

Are you tired of dealing with outdated security tools that never seem to give you the full picture? You’re not alone. Many organizations struggle with piecing together scattered information, leaving your apps vulnerable to modern threats. That’s why we’re excited to introduce a smarter, unified approach: Application Security Posture Management (ASPM). ASPM brings together the…

How to Build a Robust Cloud Security Strategy: Key Solutions and Tips

As businesses continue to shift their operations to the cloud, ensuring robust cloud security has never been more critical. While the cloud offers flexibility, scalability, and cost-effectiveness, it also introduces a host of new security challenges. Cloud security strategies must be adaptable, comprehensive, and proactive, especially in a constantly evolving cyber threat environment. In this…

Linux, macOS users infected with malware posing as legitimate Go packages

In a new typosquatting campaign, threat actors are seen using malicious Go packages posing as popular libraries to install malware on unsuspecting Linux and macOS systems. Researchers from the software supply chain cybersecurity platform, Socket, found seven packages impersonating widely used Go libraries like Hypert and Layout to trick developers. “These packages share repeated malicious…

Mangelhafte Cybersicherheit im Gesundheitswesen

15 Prozent der Endgeräte im Gesundheitssektor haben keine oder nicht-übereinstimmende Sicherheits- und Risikokontrollen. Panya_photo – Shutterstock.com Laut dem aktuellen Horizon Report 2025 wurden im Jahr 2024 weltweit 183 Millionen Patientendaten kompromittiert. Das ist ein Anstieg von neun Prozent im Vergleich zum Vorjahr. Doch weshalb fällt es für Gesundheitseinrichtungen so schwer, sich ausreichend vor Ransomware-Angriffen zu…

FBI says scammers are targeting US executives with fake BianLian ransom notes

The FBI is warning that scammers are impersonating the BianLian ransomware gang using fake ransom notes sent to U.S. corporate executives. The fake ransom notes, first reported by U.S. cybersecurity company GuidePoint Security, claim that hackers have gained access to an organization’s network to steal sensitive data, and threaten to publish the stolen data unless…

This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions

Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that’s equipped to steal a victim’s Ethereum private keys by impersonating popular libraries. The package in question is set-utils, which has received 1,077 downloads to date. It’s no longer available for download from the official registry. “Disguised as a simple…

U.S. Secret Service Seizes Russian Garantex Crypto Exchange Website

A coalition of international law enforcement agencies has seized the website associated with the cryptocurrency exchange Garantex (“garantex[.]org”), nearly three years after the service was sanctioned by the U.S. Treasury Department in April 2022. “The domain for Garantex has been seized by the United States Secret Service pursuant to a seizure warrant obtained by the…

BSI veröffentlicht neue Sicherheitsanforderungen für Datenbanksysteme

Die neuen BSI-Anforderungen gelten sowohl für relationale als auch NoSQL-Datenbanksysteme und berücksichtigen alle Betriebsarten. shutterstock – nitpicker Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat die Version 1.0 seiner Eckpunkte der IT-Sicherheitsanforderungen für Datenbanksysteme veröffentlicht. Die Dokumente basieren BSI-Angaben zufolge auf einer umfassenden Analyse verschiedener Typen von Datenbankmanagementsystemen. Schwerpunkt: Security by Default Ein zentrales…

What is risk management? Quantifying and mitigating uncertainty

What is risk management? Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your company or organization. No business venture or organizational action can completely avoid risk, of course, and working too hard to do so would mean foregoing potentially lucrative opportunities and strategies. Risk management as a…

Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a “highly sophisticated, state-sponsored attack,” stating the North Korean threat actors behind the hack took steps to erase traces of the malicious activity in an effort to hamper investigation efforts. The multi-signature (multisig) platform, which has roped in…

PHP-CGI RCE Flaw Exploited in Attacks on Japan’s Tech, Telecom, and E-Commerce Sectors

Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. “The attacker has exploited the vulnerability CVE-2024-4577, a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows, to gain initial access to victim machines,” Cisco Talos researcher Chetan Raghuprasad said in…

11 ruinöse Ransomware-Bedrohungen

Für Unternehmen ist Ransomware weiterhin eine existenzielle Bedrohung, für Kriminelle ein immer einträglicheres (Service)geschäft. Gonin | shutterstock.com Ransomware bleibt branchenübergreifend auf dem Vormarsch und entwickelt sich beständig weiter – vereinzelten behördlichen Erfolgen zum Trotz. Das ist unter anderem auch folgenden Trends zuzuschreiben: Ransomware-as-a-Service (RaaS)-Angebote senken die Zugangsbarrieren. Neue Erpressungstaktiken versprechen noch mehr kriminelle Gewinne. Künstliche…

WordPress Appliance - Powered by TurnKey Linux