Geek-Guy.com

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. “The threat actor leverages fear-based lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link,” Morphisec Labs researcher Nadav Lorber said in a report shared with The

Blue Origin’s all-female crew, including Katy Perry, successfully launched

Jeff Bezos’ space company, Blue Origin, successfully launched its New Shepard rocket at around 9:30 a.m. ET on Monday, as it seeks to challenge Elon Musk’s SpaceX in the space tourism industry.  What stands out most about this mission is that it featured the first all-female space crew since 1963, when Soviet astronaut Valentina Tereshkova…

Chipolo’s newest AirTag competitor works with both Apple and Google’s finding networks

Chipolo, the maker of AirTag-like devices, on Monday introduced the latest version of its product. Now, instead of offering models that only work with either Apple or Google’s lost-item finding technology, the new Chipolo POP devices work with both companies’ finding networks out of the box. By combining these different functionalities into one device, Chipolo…

Kritik an OpenAI: Experten warnen vor verkürzten Sicherheitstests

OpenAI hat offenbar seine Sicherheitstests verkürzt. JarTee – shutterstock.com OpenAI ist bekannt für seine KI-Projekte wie der GPT-Reihe, Codec, DALL-E und Whisper. Experten befürchten nun, dass das KI-Forschungsunternehmen seine KI-Angebote ohne angemessenen Schutz bereitstellen könnte. Laut einem Bericht der Financial Times (FT) gibt der Hersteller von ChatGPT seinen Mitarbeitenden und externen Gruppen nur noch wenige…

Autonomous trucking startup Kodiak Robotics to go public via SPAC

Self-driving truck startup Kodiak Robotics plans to go public via a merger with special purpose acquisition company Ares Acquisition Corporation II. The transaction values Kodiak, which has raised around $243 million to date, at about $2.5 billion pre-money. New and existing Kodiak institutional investors, like Soros Fund Management, ARK Investments, and Ares, have funded or…

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen information is associated with valid online accounts. The technique has been codenamed precision-validating phishing by Cofense, which it said employs real-time email validation so that only a select set of high-value targets are served the fake login…

Conifer locks down $20M seed round for its ‘drop-in’ electric hub motor

A handful of engineers who worked at Lucid Motors and on Apple’s electric car project have launched a new startup that puts a fresh spin on electric hub motors. The new startup, called Conifer, has developed its motor to be free of rare earth elements by using more abundant ferrite magnets, which the company says…

How Newport School District Strengthens Google Cybersecurity and Stops Threats Fast

Saving Time and Reducing Risk: The Benefits of Google Workspace Threat Detection for K-12 Schools Nestled in a small community in northeastern Washington, Newport School District serves approximately 1,100 students with a dedicated team of about 120 faculty and staff. Managing the district’s technology infrastructure falls to the small, yet capable, two-person IT team. IT…

GRC for Building Customer Trust: A Strategic Imperative for Long-Term Success

In business, trust is a make-or-break factor. It’s what holds customer relationships together. And it’s the quiet force that determines whether someone clicks “buy” or walks away from your website.  So how do you gain it?  You need to earn it. Trust isn’t something you can fake or sprinkle onto your company’s brand just by…

AI hallucinations lead to a new cyber threat: Slopsquatting

Cybersecurity researchers are warning of a new type of supply chain attack, Slopsquatting, induced by a hallucinating generative AI model recommending non-existent dependencies. According to research by a team from the University of Texas at San Antonio, Virginia Tech, and the University of Oklahama, package hallucination is a common thing with Large Language Models (LLM)-generated…

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate sophisticated phishing lures, and exploit vulnerabilities before security teams can react. Meanwhile, defenders are overwhelmed by massive amounts of data and alerts, struggling to process information quickly enough to identify real threats. AI offers a way to

Is Ivanti the problem or a symptom of a systemic issue with network devices?

Network edge devices — hardware that powers firewalls, VPNs and network routers — have quickly moved up the list of attackers’ preferred intrusion points into enterprise networks. While dozens of companies make and sell these devices, customers of one company in particular — Ivanti — have confronted exploited vulnerabilities in their products more than any…

Reasoning in the Age of Artificial Intelligence

Lately, I often hear people asking: “Will Artificial Intelligence replace my job?” Perhaps you’ve had this thought too. More than just a matter of the job market or salary expectations, this question challenges our role in society and our ability to remain relevant over time. It’s worth addressing this doubt once and for all, especially…

How not to hire a North Korean IT spy

CISOs looking for new IT hires already struggle with talent market shortages and bridging cybersecurity skills gaps. But now they face a growing challenge from an unexpected source: sanctions-busting North Korean software developers posing as potential hires. North Korea is actively infiltrating Western companies using skilled IT workers who use fake identities to pose as remote workers with foreign companies,…

Bill Gates-backed Arnergy to expand solar access in Nigeria with $18M as demand surges

Demand for solar energy in power-starved Nigeria has soared in the last decade thanks to worsening grid reliability and rising fuel costs. That’s drawn investor interest to Arnergy, a cleantech startup meeting that need. The company just raised a $15 million Series B extension (on top of a $3 million B1 round last year), bringing…

Adaptive MFA: The Future of Dynamic Identity Security in 2025

Adaptive MFA is no longer optional—it’s a strategic imperative. By blending contextual intelligence with user-centric design, businesses can thwart cyber threats, comply with regulations, and foster trust in an increasingly digital world. The post Adaptive MFA: The Future of Dynamic Identity Security in 2025 appeared first on Security Boulevard.

What boards want and don’t want to hear from cybersecurity leaders

Successfully engaging with the board may not make or break a CISO’s career, but it’s becoming an increasingly important skill — particularly as risk-conscious boards seek strategic security insights. The challenge isn’t just about presenting technical information — it’s aligning security with the board’s priorities and business objectives. However, CISOs can struggle to decipher the…

GenAI-Security als Checkliste

Das Open Web Application Security Project (OWASP) gibt Unternehmen eine Checkliste für (mehr) GenAI-Sicherheit an die Hand. Foto: Gannvector | shutterstock.com Während Unternehmen wie OpenAI, Anthropic, Google oder Microsoft aber auch Open-Source-Alternativen bei ihren Generative-AI– und Large-Language-Model-Angeboten exponentielle User-Zuwächse verzeichnen, sind IT-Sicherheitsentscheider bemüht, mit der rasanten KI-Entwicklung in ihren Unternehmen Schritt zu halten. Die Non-Profit-Organisation…

Access to future AI models in OpenAI’s API may require a verified ID

OpenAI may soon require organizations to complete an ID verification process in order to access certain future AI models, according to a support page published to the company’s website last week. The verification process, called Verified Organization, is “a new way for developers to unlock access to the most advanced models and capabilities on the…

Gaining Ground with Advanced NHIs Analysis

Why is Advanced NHIs Analysis the Key to Climbing the Cybersecurity Mountain? You likely find yourself climbing a steep mountain of intricate challenges every day. Standing at the pinnacle, striking a balance between operational efficiency and security mindfulness often remains elusive. Dealing with non-human identities (NHIs) introduces another wrinkle. But what if you could leverage…

Free to Innovate with Secure Machine Identity Management

Why does Machine Identity Management matter for Secure Innovation? Understanding Non-Human Identities (NHIs) Do you know the vast number of operations carried out on the cloud today are managed by non-human entities? That’s right. Non-Human Identities or NHIs make up the majority of individuals making calls to your servers, databases, APIs, and other sensitive resources.…

Apple reportedly working on a Vision Pro that plugs into your Mac

Apple isn’t giving up on its mixed reality headset the Vision Pro, according to Bloomberg’s Mark Gurman. The company has been debating the best direction forward for the product after disappointing sales, Gurman says, but is now moving forward with two different models. One would address probably the two biggest complaints about the initial product…

Amber Technology expands partnership with DPA Microphones in New Zealand

COMPANY NEWS: Amber Technology has announced it is expanding its long-standing partnership with DPA Microphones, strengthening its presence in New Zealand’s professional audio market. This expansion builds on Amber Technology’s established distribution of DPA Microphones in Australia, reinforcing its commitment to delivering world-class audio solutions to professionals across broadcast, live sound, recording, theatre, and other…

Tech tariff exemptions are only temporary, according to Trump’s commerce secretary

The tech industry may not be safe from new tariffs, according to U.S. Commerce Secretary Howard Lutnick. The Trump administration announced Friday evening that consumer electronics such as laptops and smartphones would be exempt from the tariffs it unveiled earlier this month. (While Trump delayed many of those tariffs this week, he left a 10%…

New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

GUEST RESEARCH:  Other key findings show an increase in crypto miner detections, a spike in zero-day malware, a drop in endpoint malware, a rise in Linux-based threats, and more. WatchGuard Technologies, a global leader in unified cybersecurity,  released the findings of its latest Internet Security Report, a quarterly analysis detailing the top malware, network, and endpoint…

Jack Dorsey and Elon Musk would like to ‘delete all IP law’

Jack Dorsey, co-founder of Twitter (now X) and Square (now Block), sparked a weekend’s worth of debate around intellectual property, patents, and copyright, with a characteristically terse post declaring, “delete all IP law.” X’s current owner Elon Musk quickly replied, “I agree.” It’s not clear what exactly brought these comments on, but they come at…

BSidesLV24 – Breaking Ground – 14 Years Later, Proving Ground Is Proving Out. A Panel Discussion With PG Alumni And Staff

Authors/Presenters: Grant Dobbe, Daemon Tamer, Phil Young Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Breaking Ground – 14 Years Later, Proving Ground Is Proving…

Progress empowers marketers with ‘innovative AI capabilities for creating superior digital experiences’

New AI capabilities in latest Progress Sitefinity release accelerate content creation, streamline digital asset management and enhance customer engagement COMPANY NEWS: AI-powered digital experience and infrastructure software provider Progress has announced the latest AI innovations in Progress® Sitefinity® content management platform. These enhancements empower marketers to create, manage and optimise content more efficiently, delivering faster,…

Jim Zemlin on taking a ‘portfolio approach’ to Linux Foundation projects

The Linux Foundation has become something of a misnomer through the years. It has extended far beyond its roots as the steward of the Linux kernel, emerging as a sprawling umbrella outfit for a thousand open source projects spanning cloud infrastructure, security, digital wallets, enterprise search, fintech, maps, and more. Last month, the OpenInfra Foundation…

Could an Amazon driver could be the one who saves your life?

In a quiet transformation from merchandising giant to (also) healthcare giant, Amazon may be positioning its sprawling logistics network and growing medical footprint to potentially save lives, starting with your front door. According to Bloomberg, back in 2023, Amazon piloted a several months-long pilot program called Project Pulse, equipping delivery vans with defibrillators and training…

Exploring Innovative NHIs Lifecycle Management Solutions

Why is NHI Lifecycle Management Crucial? Every organization looking to assert control over its cybersecurity posture should ponder this question. Non-Human Identities (NHIs) and their secrets form the backbone of advanced cloud security control. However, the adoption of innovative NHI lifecycle management solutions is what sets successful organizations apart. When essential secure cloud environment components,…

Rest Assured with Top-tier Cloud-Native Security

Are You Leveraging the Full Potential of Cloud-Native Security? Organizations implementing cloud-based services must ensure robust data protection. Enter the realm of cloud-native security, a specialized field that brings top-tier protection for cloud environments. This discipline holds particular relevance for organizations working in sectors like financial services, healthcare, travel, and even DevOps and SOC teams.…

OpenAI co-founder Ilya Sutskever’s Safe Superintelligence reportedly valued at $32B

Safe Superintelligence (SSI), the AI startup led by OpenAI’s co-founder and former chief scientist Ilya Sutskever, has raised an additional $2 billion in funding at a $32 billion valuation, according to the Financial Times. The startup had already raised $1 billion, and there were reports that an additional $1 billion round was in the works.…

Cofertility’s radical model for women: Freeze your eggs for free by donating half of them

In recent years, focus on career and delayed marriage age is driving some women to consider preserving their fertility through egg freezing. But the steep cost of the procedure, estimated at $10,000 to $15,000 per attempt, means many women can’t afford it during their most fertile years: 20s and early 30s. Cofertility, a startup founded…

Trump exempts smartphones, laptops, and semiconductors from new tariffs

The Trump administration is carving out big tariff exemptions for the tech industry. While President Donald Trump said Wednesday that he would delay many of the market-shaking tariffs that he’d announced the previous week, he kept a universal baseline 10% tariff in place, while also increasing tariffs on Chinese goods to 125% (on top of…

BSidesLV24 – Breaking Ground – From Keyless To Careless: Abusing Misconfigured OIDC Authentication In Cloud Environments

Author/Presenter: Christophe Tafani-Dereeper Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Breaking Ground – From Keyless To Careless: Abusing Misconfigured OIDC Authentication In Cloud Environments…

Weekly Update 447

I’m home! Well, for a day, then it’s off to the other side of the country (which I just flew over last night on the way back from Dublin 🤦‍♂️) for an event at the Microsoft Accelerator in Perth on Monday. Such is the path we’ve taken, but it does provide some awesome opportunities to…

Forerunner’s long game: As startups stall before IPO, all options are on the table

Thirteen years ago, Forerunner Ventures began helping to usher in a new era of consumer startups, including Warby Parker, Bonobos, and Glossier. None has gone through a traditional IPO process. Warby Parker was taken public through a special purpose acquisition vehicle. Bonobos was acquired by Walmart. Glossier is still privately held, along with many other…

Meta’s vanilla Maverick AI model ranks below rivals on a popular chat benchmark

Earlier this week, Meta landed in hot water for using an experimental, unreleased version of its Llama 4 Maverick model to achieve a high score on a crowdsourced benchmark, LM Arena. The incident prompted the maintainers of LM Arena to apologize, change their policies, and score the unmodified, vanilla Maverick. Turns out, it’s not very…

WordPress Appliance - Powered by TurnKey Linux