Geek-Guy.com

Category: Artificial Intelligence

Auto Added by WPeMatico

A look at Intel Capital before the 34-year-old firm strikes out on its own

When Intel Capital announced its plans to spin out from semiconductor giant Intel in January, it came as a bit of a shock considering the firm has been operating as Intel’s venture investment arm since 1991. In many ways this decision marks the end of an era for what’s considered by some to be the…

Smashing Security podcast #410: Unleash the AI bot army against the scammers – now!

A YouTuber has unleashed an innovative AI bot army to disrupt and outwit the world of online scammers, and a New York Times investigation looks into the intricate web of global money laundering. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley…

Nvidia is reportedly in talks to acquire Lepton AI

Nvidia is looking to get into the server rental market. The semiconductor giant is reportedly nearing a deal to acquire Lepton AI, a company that rents out servers that are powered by Nvidia’s AI chips, according to The Information. The deal is reportedly worth several hundred million dollars, according to The Information, which cited unnamed…

The AI Fix #43: I, for one, welcome our new robot overlords!

In episode 43 of The AI Fix, our hosts discover a robot that isn’t terrifying, a newspaper shuns journalists in favour of AI, Graham watches a robot dog learn to stand, an AI computer programmer develops a familiar attitude, and New York tries to stop its humans arming their robots. Graham worries about AI vomit,…

Why Onyx thinks its open source solution will win enterprise search

Enterprises have troves of internal data and information that employees need to complete their tasks or answer questions for potential customers. But that doesn’t mean the right information is easy to find. Onyx wants to solve that problem through its internal enterprise search tool. There are other big names in the category, like Glean —…

Was CISOs von Moschusochsen lernen können

Von Moschusochsen können sich CISOs eine Scheibe abschneiden – wenn es nach unserem Autor geht. Wirestock Creators – shutterstock.com Drittanbieter-Risikomanagement ist für CISOs und Sicherheitsentscheider eine signifikante Herausforderung. Wird sie nicht (richtig) gestemmt, drohen weitreichende geschäftliche Konsequenzen – bis hin zum Stillstand der Produktion. Das wurde in den vergangenen Monaten von diversen Cyberattacken auf Drittanbieter unterstrichen.…

The AI Fix #41: Can AIs be psychopaths, and why we should be AI optimists

In episode 41 of the AI Fix, our hosts learn that society needs to be completely reordered by December, Grok accuses Trump of being a Russian asset, Graham discovers that parents were wrong about computer games all along, and Mark wonders if a kung-fu kicking robot from Unitree is the hero that we need. Graham…

Poolside CEO says most companies shouldn’t build foundation models

Poolside co-founder and CEO Jason Warner didn’t mince words: He thinks that most companies looking to build foundation AI models should instead focus on building applications. Poolside is an AI-powered software development platform. Warner told the audience at the HumanX AI conference in Las Vegas on Monday that he doesn’t think anyone who doesn’t think…

9 US AI startups have raised $100M or more in 2025

Last year was a monumental year for the AI industry in the U.S. and beyond. There were 49 startups that raised funding rounds worth $100 million or more in 2024, per our count at TechCrunch. Three companies raised more than one “mega-round” last year, and seven companies raised rounds at $1 billion or larger. How…

11 ruinöse Ransomware-Bedrohungen

Für Unternehmen ist Ransomware weiterhin eine existenzielle Bedrohung, für Kriminelle ein immer einträglicheres (Service)geschäft. Gonin | shutterstock.com Ransomware bleibt branchenübergreifend auf dem Vormarsch und entwickelt sich beständig weiter – vereinzelten behördlichen Erfolgen zum Trotz. Das ist unter anderem auch folgenden Trends zuzuschreiben: Ransomware-as-a-Service (RaaS)-Angebote senken die Zugangsbarrieren. Neue Erpressungstaktiken versprechen noch mehr kriminelle Gewinne. Künstliche…

Apple adds AI-powered app review summaries with iOS 18.4

As part of the iOS 18.4 software update, currently in public beta, Apple is introducing AI-powered summaries of App Store reviews. The new feature will leverage Apple Intelligence, the company’s built-in AI technology, to offer an overall summary based on the reviews others have left on the App Store. The review summaries will be generated…

Anna Patterson’s Ceramic.ai looks to help enterprises build AI models faster and more efficiently

Anna Patterson has had a storied career in Silicon Valley. She founded three startups, including search engine upstarts Xift and Cuil, as well as recall.archive.org, which became the Internet Archive. She was the vice president of engineering at Google, and later on started Gradient Ventures, an AI-focused seed fund. And she isn’t done building. Patterson…

Google Search’s new ‘AI Mode’ lets users ask complex, multi-part questions

Google is launching a new “AI Mode” experimental feature in Search that looks to take on popular services like Perplexity AI and OpenAI’s ChatGPT Search. The tech giant announced on Wednesday that the new mode is designed to allow users to ask complex, multi-part questions and follow-ups to dig deeper on a topic directly within…

Scrunch AI is helping companies stand out in AI search

As more people turn to AI chatbots like ChatGPT to look things up on the internet, the way companies approach their online presence has to change. Scrunch AI wants to help enterprises better prepare for a world in which more AI bots and agents visit their website than humans do. Scrunch AI says its platform…

OpenAI plans to integrate Sora’s video generator into ChatGPT

OpenAI intends to eventually integrate its AI video generation tool, Sora, directly into its popular consumer chatbot app, ChatGPT, company leaders said during a Friday office hours session on Discord. Today, Sora is only available through a dedicated web app OpenAI launched in December, which lets users access the AI video model of the same…

OpenAI plans to bring Sora’s video generator to ChatGPT

OpenAI intends to eventually integrate its AI video generation tool, Sora, directly into its popular consumer chatbot app, ChatGPT, company leaders said during a Friday office hours session on Discord. Today, Sora is only available through a dedicated web app OpenAI launched in December, which lets users access the AI video model of the same…

Workhelix taps years of research to help enterprises figure out where to apply AI

AI has the power to transform how people work, but getting tangible value out of AI isn’t as easy as throwing any AI application at any workflow. It can be hard for enterprises to figure out which AI applications help their business and which are just hype. Workhelix wants to solve that problem. Workhelix is…

Lonestar and Phison’s data center infrastructure is headed to the moon

Data storage and resilience company Lonestar and semiconductor and storage company Phison launched a data center infrastructure on a SpaceX rocket on Wednesday that’s headed to the moon. The companies are sending Phison’s Pascari storage — solid state drives (SSDs) built for data centers —packed with Lonestar’s clients’ data on a SpaceX Falcon 9 rocket…

Amazon’s new Alexa+ brings AI-powered ‘Explore’ and ‘Stories’ features for kids

As part of the reveal of Amazon’s new AI-powered Alexa+ assistant, the tech giant announced that it’s launching two new features designed for kids called “Explore with Alexa” and “Stories with Alexa.” The features, which leverage Alexa’s new AI capabilities, will be available to Amazon Kids+ subscribers. The company demonstrated the new features at a…

Data Theft Drove 94% of Global Cyberattacks in 2024 & Ransomware Defenses are “Increasingly Complex”

Ransomware groups now steal, encrypt, and threaten to leak company data on the dark web, forcing victims to pay or risk exposing sensitive information.

Cyberangriffe: Fertigungsbranche noch immer schlecht vorbereitet

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?quality=50&strip=all 5568w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Einer Studie zufolge sind nur wenige Produktionsbetriebe bei Schutz und Abwehr von Cyberrisiken ausreichend vorbereitet. Halfpoint – Shutterstock.com Laut einer aktuellen Studie von Omdia verzeichneten 80 Prozent der…

DocUnlock wants to solve a customs bottleneck

When goods enter the U.S., they have to be declared to U.S. customs so the importer can be charged the proper taxes. That applies to everything from a consumer ordering clothes from a brand based overseas to every single item on a massive container ship. When it comes to commercial importing, filling out the necessary…

Flexport releases onslaught of AI tools in a move inspired by ‘Founder Mode’

Freight forwarding and logistics company Flexport is rolling out a suite of new products and features, many of which use AI, in what the company says will be the first in a series of semi-annual announcements of this kind.  If that sounds similar to Airbnb’s approach to seasonal product announcements, that’s because it was the…

Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace

The United States is falling “increasingly behind” its adversaries in cyberspace, a former Cyber Command and National Security Agency boss said Saturday. Speaking at the DistrictCon cybersecurity conference in Washington, D.C., retired Gen. Paul Nakasone said that “our adversaries are continuing to be able to broaden the spectrum of what they’re able to do to…

Nvidia CEO Jensen Huang says market got it wrong about DeepSeek’s impact

Nvidia founder and CEO Jensen Huang said the market got it wrong when it comes to DeepSeek’s technological advancements and its potential to negatively impact the chipmaker’s business. Instead, Huang called DeepSeek’s R1 open source reasoning model “incredibly exciting” while speaking with Alex Bouzari, CEO of DataDirect Networks, in a pre-recorded interview that was released…

CISOs wollen Cloud-Security vorantreiben

Cloud-Security: CISOs setzen auf Application-Protection-Plattformen (CNAPP). Digitala World – Shutterstock.com 76 Prozent der deutschen CISOs planen in den kommenden 12 Monaten, ihre finanziellen Mittel verstärkt für Cloud-Security einzusetzen – insbesondere für Cloud-native Application-Protection-Plattformen (CNAPP). So das Ergebnis einer weltweiten Befragung unter 500 Security-Entscheidern im Auftrag des IT-Anbieters Westcon-Comstor. Demnach ist die Bereitschaft hierzulande, in den…

Der trügerische Komfort des Risikomanagements

Gefahrenmanagement statt Risikomanagement: Cybersicherheit erfordert Dringlichkeit und Entschlossenheit. Billion Photos – Shutterstock.com Herkömmliches Risikomanagement basiert auf Wahrscheinlichkeiten und statistischen Berechnungen – doch in einer zunehmend komplexen und aggressiven Bedrohungslandschaft sind solche Prognosen unzuverlässig. Daher ist ein Umdenken nötig: Anstatt dem Risikomanagement sollten Organisationen Gefahrenmanagement als neues Konzept einführen. Risikomanagement impliziert, dass man die Wahrscheinlichkeit eines…

Google’s ‘Career Dreamer’ uses AI to help you explore job possibilities

Google is launching a new experiment that uses AI to help people explore more career possibilities. The company announced on Wednesday that a new “Career Dreamer” tool can find patterns between your experiences, educational background, skills, and interests to connect you with careers that might be a good fit. With Career Dreamer, you can use…

Hyperlume wants to make chip-to-chip communication faster and more efficient

Data centers consumed 4.4% of U.S. electricity in 2023 and are estimated to use up to 12% by 2028. The majority of the energy data centers suck up is used to help transfer data from chip to chip. A company called Hyperlume is looking to make that process more energy-efficient while also speeding it up.…

Mehrheit der Deutschen fürchtet sich vor Cyberangriffen

Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen. Andrea Danti – Shutterstock.com Eine deutliche Mehrheit der Menschen in Deutschland hat Angst vor Cyberangriffen oder gar einem Cyberkrieg. Bei einer repräsentativen Umfrage des Digitalverbandes Bitkom sagten 61 Prozent, dass sie Cyberangriffe durch Staaten befürchten, mit denen Infrastruktur, öffentliche Einrichtungen oder Unternehmen gezielt gestört,…

Ransomware-Banden geben Opfern immer weniger Zeit

width=”2494″ height=”1402″ sizes=”(max-width: 2494px) 100vw, 2494px”> Ransomware-Gruppen haben den Zeitraum bis zur Lösegeldübergabe immer mehr verkürzt. Zephyr_p – shutterstock.com Laut einer Analyse des Managed-Detection-and-Response-Unternehmens Huntress von Ransomware-Vorfällen im vergangenen Jahr beträgt die durchschnittliche Zeit bis zur Lösegeldforderung (TTR) etwa 17 Stunden. Bei einigen Gruppen sind es sogar nur vier bis sechs Stunden. Dieses Tempo steht…

4 Wege aus der Security-Akronymhölle

Gefangen im Buchstabensud? mikeledray | shutterstock.com Bevor Elon Musk zum Trump-Sidekick mutierte, wurde er in erster Linie als visionärer Entrepreneur wahrgenommen. Damals, im Jahr 2010, ließ er den Mitarbeitern seines Raumfahrtunternehmens SpaceX ein Memo zukommen. Darin kritisierte er den übermäßigen, internen Gebrauch von Abkürzungen in gewohnt ausdrucksstarkem Stil: „Bei SpaceX gibt es eine schleichende Tendenz,…

Hacker attackieren Bundeswehr-Universität

Die Studierenden an der Universität der Bundeswehr dürften wenig begeistert darüber sein, dass Hacker ihre Daten abgegriffen haben. Universität der Bundeswehr Hacker haben die Universität der Bundeswehr in Neubiberg bei München angegriffen. Laut einem Bericht des Handelsblatts seien dabei auch sensible Daten abgeflossen. Die Attacke sei von verschiedenen Quellen aus Universitätskreisen bestätigt worden, hieß es.…

Razzia gegen Telefonbetrüger

Über Callcenter haben Kriminelle einen Schaden in zweistelliger Millionenhöhe angerichtet. chainarong06 – shutterstock.com Der Polizei ist ein Schlag gegen eine international agierende Bande von Telefonbetrügern gelungen. Nach Durchsuchungen in mehreren Bundesländern sei in Hagen in Nordrhein-Westfalen eine 50 Jahre alte Griechin festgenommen worden, die als einer der führenden Köpfe der Bande gilt. Das teilten das…

Arm is launching its own chip this year with Meta as a customer

Public semiconductor company Arm will start making its own chips this year after landing a high-profile enterprise customer. Arm, which is majorly owned by SoftBank, will start making its own chips now that Meta has signed on as a customer, according to the Financial Times. The chip is expected to be a CPU for servers…

Tofu is building an omni-channel marketing platform for enterprises

When EJ Cho started his first company in 2018, he was exposed to what it takes to market a product. He was surprised to find a market filled with different single-use tools. “It was a very frustrating experience,” Cho told TechCrunch. “I had to learn and juggle all these different tools. It felt like a…

CISOs lavieren zwischen Datenschutz und Business-Support

loading=”lazy” width=”400px”>Gar nicht so einfach, die richtige Balance zwischen Datenschutz und Business-Support zu finden. alphaspirit.it – shutterstock.com Die wenigsten Führungskräfte im Bereich Security & Risk Management (SRM) schaffen eine ausgewogene Balance zwischen Datenschutz und Business-Unterstützung. Das hat eine Umfrage von Gartner ergeben. Demzufolge priorisieren 35 Prozent der Befragten den Schutz von Datenbeständen, während gut jeder…

Smashing Security podcast #404: Podcast not found

The story of how hackers managed to compromise the US Government’s official SEC Twitter account to boost the price of Bitcoins, AI isn’t helping reduce the rife conspiracy theories inside classrooms, and is the funeral bell tolling for ransomware? All this and more is discussed in the latest edition of the “Smashing Security” podcast by…

Pinkfish helps enterprises build AI agents through natural language processing

As the chief product officer for AI customer service startup TalkDesk, Charayna “CK” Kannan said that enterprises often say they want to automate different workflows but that it’s really hard to implement AI. Enterprises are dealing with clunky, legacy software, that often doesn’t have APIs, creating a daunting task their IT departments weren’t prioritizing. “Every…

Workday launches a platform for enterprises to manage all of their AI agents in one place

HR giant Workday is launching a new way for enterprises to keep track of all of their AI agents in one place. It’s also launching a few more AI agents of its own, for good measure. Silicon Valley-based Workday announced on Tuesday the release of Workday Digital Workforce Management, which is meant to help customers…

AI investments surged 62% to $110 billion in 2024 while startup funding overall declined 12%, says Dealroom

Venture capitalists are gobbling up term sheets for startups peddling artificial intelligence, even as they remain picky when it comes to funding the wider spectrum of technology.  According to new figures from analytics firm Dealroom, AI startups raised $110 billion in funding last year, up 62% on the year before. At the same time, privately-backed…

The Art of Human-AI Synergy: A Framework for Smart Collaboration

A proven framework for merging human intuition with AI precision to enhance innovation, reduce bias, and scale operations. Explores real-world case studies, ethical considerations, and hybrid workflows that outperform pure automation models. Essential reading for forward-thinking business leaders. The post The Art of Human-AI Synergy: A Framework for Smart Collaboration appeared first on Security Boulevard.

Why cyber hygiene remains critical in the era of AI-driven threats

Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of IT decision-makers report information security as their most time-consuming task[1]. While AI offers a promising solution, security leaders must get the basics right first. Only by practicing…

CIO Cloud Summit: Best Practices von Anwendern für Anwender

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?quality=50&strip=all 1682w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Erfahren Sie auf dem CIO Cloud Summit, wie Sie die nächste Cloud-Welle am besten reiten. IDC Foundry Flexibilität, Agilität und Skalierbarkeit sind die entscheidenden Parameter für das Gelingen der Transformation…

Datenleck bei Vorwerk: Hacker stehlen Thermomix-Nutzerdaten

Hacker haben sich Zugriff auf Thermomix-Nutzerdaten verschafft. T. Schneider – Shutterstock.com Die Küchenmaschine Thermomix verfügt über einen Onlinezugang, über den Anwender Tausende Rezepte herunterladen können. Hackern ist es nun gelungen, persönliche Daten von Nutzern über das offizielle Rezeptforum von Vorwerk abzugreifen. „Wir haben festgestellt, dass es zu einem unautorisierten Zugriff auf einen nachgeordneten Server eines…

Tinder will try AI-powered matching as dating app continues to lose users

Tinder hopes to reverse its ongoing decline in active users by turning to AI. In the coming quarter, the Match-owned dating app will roll out new AI-powered features for discovery and matching. The addition aims to offer fatigued singles an alternative to the “swipe” that defined the dating app in its earlier days and influenced…

Experts Flag Security, Privacy Risks in DeepSeek AI App

New mobile apps from the Chinese artificial intelligence (AI) company DeepSeek have remained among the top three “free” downloads for Apple and Google devices since their debut on Jan. 25, 2025. But experts caution that many of DeepSeek’s design choices — such as using hard-coded encryption keys, and sending unencrypted user and device data to…

Pendulum’s AI-driven platform helps enterprises better predict supply and demand

Supply chains have had a tumultuous few years, beginning in 2020, when COVID-19 upended legacy global supply chains. More recently, the “TikTok-ification” of retail has companies like Shein and Temu creating new products constantly as consumer demands change at the same rapid pace. Pendulum aims to help companies better plan for supply and demand in…

Workday cuts nearly 2,000 employees

Enterprise HR platform Workday is the latest tech company to announce layoffs in recent weeks. Silicon Valley-based Workday laid off 1,750 employees on Wednesday, as originally reported by Bloomberg and confirmed independently by TechCrunch. That total represents approximately 8.5% of headcount. Unlike many other tech companies, including Meta and Microsoft, Workday has not held drastic…

Cyberattacken – nicht alle Manager wissen von ihrer Verantwortung

width=”6016″ height=”3384″ sizes=”(max-width: 6016px) 100vw, 6016px”>Den Kopf in den Sand zu stecken, ist beim Thema Cybersecurity keine gute Idee. Das Management muss sich seiner Verantwortung stellen. alphaspirit – shutterstock.com In vielen Unternehmen ist sich das Management nicht bewusst, dass es in der Verantwortung für Cybersicherheit steht. Das Thema IT-Security wird gerne in der IT-Abteilung und…

7 Tipps zur Verbesserung des ROI für Cybersicherheit

Lesen Sie, wie Sie mehr aus Ihren aktuellen Investitionen in Cybersicherheit herausholen können. wertinio – Shutterstock.com Wenn es um Investitionen in die Cybersicherheit geht, wird das Geld in Initiativen gesteckt, die den größtmöglichen Schutz zu den geringstmöglichen Kosten bieten. Doch eine solche Berechnung ist oft alles andere als einfach. CISOs stehen immer wieder vor der…

Hero’s all-in-one, AI productivity app takes on Google’s Calendar and others

People often use multiple apps for notes, schedule management, and to-dos. But why not combine them all in one app? That’s the ethos behind Hero, an all-in-one productivity app with an AI assistant (of course!). The iOS app was developed by former Meta employees Brad Kowalk and Seung W. Lee. Both met while working on…

Schutz von Onlinekonten: Starkes Passwort reicht nicht aus

Auch starke Passwörter bieten keinen ausreichenden Schutz vor Cyberattacken. ParinPix – Shutterstock Cyberkriminelle verschicken betrügerische Nachrichten per E-Mail oder Messenger. Sie geben sich zum Beispiel als Behörde aus, um vertrauliche Daten wie Passwörter oder Kreditkartendetails abzugreifen. Das nennt man im Fachjargon Phishing. Dieses Beispiel ist nur eine von unzähligen Varianten, wie Kriminelle im Netz versuchen,…

Hacker nutzen Google Gemini zur Verstärkung von Angriffen

Lesen Sie, wie Hacker den KI-Dienst Gemini von Google aktuell nutzen. Sadi-Santos – Shutterstock.com Von Regierungen unterstützte Bedrohungsakteure nutzen bereits den KI-Dienst Gemini von Google, um ihre Fähigkeiten zu erweitern. Zu diesem Schluss kommt ein Bericht der Threat Intelligence Group von Google. Wie Gemini von Bedrohungsakteuren genutzt wird Im Bericht werden folgenden Beispiele dafür genannt,…

Cybertrends 2025: KI-Cyberwaffen, Zero Days und gefördertes Chaos

Im Jahr 2025 werden staatlich gefördertes Chaos, KI-gesteuerte Waffen und die verschwimmenden Grenzen zwischen zivilen und militärischen Zielen den Cyberbereich bestimmen. Billion Photos – Shutterstock.com Staatlich geförderte Cyberangriffe Nationalstaaten und Gruppierungen mit politischen Interessen integrieren Cyberangriffe zunehmend in ihr Arsenal, wobei Cyberoperationen in geopolitischen Konflikten zu einer Art Erstschlagoption werden. Gezielte Attacken auf kritische Infrastrukturen…

The Transformative Role of AI in Cybersecurity

2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this evolution, I have noted three primary […] The post The Transformative Role of AI in Cybersecurity appeared first on TechSpective. The…

Behörden schalten große Cybercrime-Foren ab

Die weltweit größte Handelsplattformen für Cybercrime im Internet ist offline. Cheryl-Annette Parker – shutterstock.com Die Generalstaatsanwaltschaft Frankfurt am Main und das Bundeskriminalamt haben zwei Cybercrime-Foren mit Millionen Nutzern abgeschaltet. Nach Angaben der Behörden handelte es sich um die weltweit größten Handelsplattformen für Cybercrime im Internet. Mehr als zehn Millionen Nutzer sollen auf den Plattformen “nulled.to”…

Intel has already received $2.2B in federal grants for chip production

Semiconductor giant Intel Corporation has already received $2.2 billion in federal grants from the U.S. Department of Commerce through the U.S. CHIPS and Science Act, the company shared during its Thursday earnings call. Dave Zinsner, Intel’s co-interim CEO, executive vice president and CFO, said the Silicon Valley-based company received the first tranche of $1.1 billion…

Google’s ‘Ask for Me’ feature calls businesses on your behalf to inquire about services, pricing

Google is testing a new “Ask for Me” feature that uses AI to call local businesses on your behalf, for information about availability and pricing. The feature is available on desktop and mobile for users who have opted into the company’s Search Labs experiments. The idea is to help users access information without having to…

Hackerangriff auf deutschen Reiseanbieter

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?quality=50&strip=all 5184w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Cyberkriminelle haben einen E-Mail-Account eines Mitarbeiters dazu benutzt, um schädliche Links zu verschicken. tete_escape – Shutterstock.com Bei Schauinsland Reisen ist es am Dienstag (28. Januar) zu einer Cyberattacke…

5 teure Threat-Intelligence-Fehler

Fehlgeleitete Threat-Intelligence-Programme lassen (nicht nur) Ihr Security-Budget schmelzen. Vitalii Stock | shutterstock.com Ausgeprägte Fähigkeiten im Bereich Threat Intelligence (TI) können dazu beitragen, Ihre Cybersecurity-Initiative auf die nächste Stufe zu heben. Das kann nicht nur dabei helfen, Bedrohungen schneller zu erkennen – Sicherheitsentscheider können so außerdem ihre Risikoexposition besser verstehen und künftige Investitionen priorisieren. Kein Wunder…

Alibaba’s Qwen 2.5-Max: The AI Marathoner Outpacing DeepSeek and Catching OpenAI’s Shadow

Discover how Alibaba’s Qwen 2.5-Max AI model with Mixture-of-Experts architecture outperforms DeepSeek V3 in key benchmarks, challenges OpenAI, and revolutionizes healthcare, finance, and content creation. Explore technical breakthroughs and industry implications. The post Alibaba’s Qwen 2.5-Max: The AI Marathoner Outpacing DeepSeek and Catching OpenAI’s Shadow appeared first on Security Boulevard.

DeepSeek Chatbot Beats OpenAI on App Store Leaderboard

The Chinese firm said training the model cost just $5.6 million. Alibaba Cloud followed with a new generative AI model, while Microsoft alleges DeepSeek ‘distilled’ OpenAI’s work.

Report: Majority of U.S. teens have lost trust in Big Tech

American teens have lost their faith in Big Tech, according to a new report from Common Sense Media, a nonprofit offering reviews and ratings for media and technology, which more recently includes AI products. In the study released Wednesday, the organization surveyed over 1,000 teens on whether major technology companies like Google, Apple, Meta, TikTok,…

Ransomware: Schwere Versäumnisse in deutschen Unternehmen

Laut einer Umfrage benötigen deutsche Unternehmen mehr Zeit und Geld, um Ransomware-Attacken einzudämmen. HL12 – Shutterstock.com Eine weltweite Umfrage des Sicherheitsanbieters Illumio unter 2.547 IT- und Security-Entscheiderinnen und -Entscheidern zeigt, welche massiven Folgen Ransomware-Attacken mit sich bringen. So gaben 58 Prozent der betroffenen Teilnehmer zu, dass sie ihren Betrieb deshalb herunterfahren mussten. Von den rund…

CISOs are moving closer to the board — but budget hurdles remain

In recent years, CISOs have often felt that their board of directors did not take them seriously. This key issue for cybersecurity, however, is turning around, with 82% of CISOs now reporting directly to their CEOs, versus 47% in 2023, according to a survey by Splunk. Splunk’s report, which surveyed 500 CISOs, CSOs, and similar security…

DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China’s Cyberwarfare

David Jemmett, CEO & Founder of CISO Global Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage. With AI-driven automation at its disposal, China can rapidly scale its cyberattacks, embedding malware, manipulating financial markets, and eroding trust in global AI…

WordPress Appliance - Powered by TurnKey Linux