Geek-Guy.com

Category: Cybersecurity

Auto Added by WPeMatico

US nonprofit healthcare provider says hackers stole medical and personal data of 1M+ patients

Community Health Center (CHC), a Connecticut-based nonprofit healthcare provider, has confirmed that hackers accessed the sensitive data of more than a million patients. In a filing with Maine’s attorney general on Thursday, CHC said it detected suspicious activity on its network on 2 January and determined that a “skilled criminal hacker” had accessed its network…

2025 predictions: Security industry

The pace of change in the technology industry has never been faster, and 2025 will be no exception. As businesses adapt to new threats, regulatory pressures, and AI-driven innovations, security and software development teams will need to rethink their strategies to stay ahead. The post 2025 predictions: Security industry appeared first on Security Boulevard.

US Justice Department says cybercrime forum allegedly affected 17 million Americans

U.S. prosecutors accused an Argentinian national living in Spain of being an “active administrator” of Nulled, one of the two hacking forums seized and shut down by authorities. © 2024 TechCrunch. All rights reserved. For personal use only.

Wiz researchers find sensitive DeepSeek data exposed to internet

A security issue at Chinese artificial intelligence firm DeepSeek exposed over a million lines of sensitive internal data, including user chat histories, API secrets, and backend operational details, according to research published Wednesday by cloud security firm Wiz.  The exposure, discovered earlier this month, stemmed from a publicly accessible ClickHouse database linked to DeepSeek’s systems.…

DARPA wants to create ‘self-healing’ firmware that can respond and recover from cyberattacks 

Imagine, for a moment, that your network is hit with ransomware. One of your employees clicked on a malicious link and now your network is compromised, data is encrypted and most of the organization’s systems are locked or offline. Then imagine if instead of assembling an incident response team,  notifying the board and contacting law…

Staying Ahead with Enhanced IAM Protocols

Staying Ahead in a Fraught Landscape? Is it possible to stay ahead with cybersecurity threats? With the increased digitization of systems, our reliance on machines has skyrocketed, necessitating the need for an enhanced Identity Access Management (IAM) strategy. Addressing this need, Non-Human Identity (NHI) and Secrets Security Management emerges as a critical component of a…

Scalable Solutions for Global Secrets Management

Are Your Secrets Secure in a Cloud World? Where robust digital identities govern access to resources, the effective management of Non-Human Identities (NHIs) becomes paramount. But how significantly does the approach to secure these identities and their secrets impact global cloud security? As a result, is it possible that scalable solutions for global secrets management…

Empower Your Security with Advanced NHI Detection

Why is NHI Detection Crucial in Today’s Cybersecurity Landscape? Imagine being able to mitigate security risks, meet regulatory compliance, save on operational costs, and increase efficiency, all by refining one aspect of your cybersecurity strategy. Sounds promising, doesn’t it? This is precisely what effective Non-Human Identities (NHIs) detection and management can accomplish for your organization.…

FBI seizes major cybercrime forums in coordinated domain takedown

The Federal Bureau of Investigation, along with several other international law enforcement departments, has seized control of several high-profile online platforms linked to cybercrime in a sweeping operation aimed at disrupting digital marketplaces for stolen credentials and hacking tools. The domains of forums Cracked[.]io and Nulled[.]to now redirect to FBI-controlled servers, signaling efforts to dismantle…

Vulnerability in popular AI developer could ‘shut down essentially everything you own’ 

A popular platform for developing AI systems has patched an easily exploitable vulnerability that would have given an attacker remote code execution privileges. Researchers at application security firm Noma detail how the flaw, embedded in Javascript code for Lightning.AI’s development platform, could be manipulated to give an attacker virtually unfettered access to a user’s cloud…

Engineering giant Smiths Group says hackers accessed its systems during cyberattack

U.K.-based engineering giant Smiths Group has confirmed a cybersecurity incident involving “unauthorized access” to its systems. The London-listed company, which operates across multiple sectors including energy, security, aerospace and defense, said Tuesday that it is currently “managing” the incident. The company said it isolated affected systems and activated its business continuity plans, implying a disruptive…

DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China’s Cyberwarfare

David Jemmett, CEO & Founder of CISO Global Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage. With AI-driven automation at its disposal, China can rapidly scale its cyberattacks, embedding malware, manipulating financial markets, and eroding trust in global AI…

National security risks in routers, modems targeted in bipartisan Senate bill

The national security risks posed by routers, modems and similar devices produced by U.S. adversaries would be the subject of a new federal study under a bipartisan Senate bill introduced Monday. The Removing Our Unsecure Technologies to Ensure Reliability and Security (ROUTERS) Act from Sens. Marsha Blackburn, R-Tenn., and Ben Ray Luján, D-N.M., is aimed…

Apple’s latest patch closes zero-day affecting wide swath of products

Apple released software updates Monday, aimed at addressing multiple security vulnerabilities within its products, including a significant zero-day vulnerability.  Tracked as CVE-2025-24085, the flaw is a use-after-free vulnerability in the company’s Core Media component, a framework that manages audio and video playback and is central to many of Apple’s multimedia applications. The vulnerability poses a…

Hackers are targeting machine identities. Token Security just raised $20M to stop them

The number of machine identities is booming thanks to the growth of cloud and AI – and it’s posing real security problems by giving hackers way more entry points than ever before. For example, a 2023 hack of authentication app Okta was caused by exploiting a service account while in 2024, Microsoft disclosed a major…

Open-source security spat leads companies to join forces for new tool

A conflux of open-source developers and application security companies has been embroiled in a complex debate after a recent change in the licensing policy of a widely used static code analysis tool, resulting in a faction of organizations creating a new, open-source rival.  The issue started with a recent change in the licensing policy of…

Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed

In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number. Co-host…

Innovative Approaches to Secrets Scanning

Is Traditional Cybersecurity Enough in the Age of Automation? Imagine this. You’re in charge of your company’s cybersecurity, and you’ve invested in the best protection money can buy. But a data breach happens, and you’re left wondering where things went wrong. Could the intrusion have been prevented? Is there a better way to safeguard your…

Scaling Security with Automated Identity Management

How Crucial is Automated Identity Management in Scaling Security? There’s an ever-increasing need for advanced cybersecurity measures. Organizations, especially those operating in the cloud, can no longer afford to ignore automated identity management as a key part of these precautions. But what does that really entail? And why is it so essential to scaling security?…

Empowering Cloud Compliance with Seamless Security

Why are Non-Human Identities (NHIs) Crucial for Seamless Security? Can you imagine a smooth security system that leaves no stone unturned? Non-human identities (NHIs) and secrets management play a significant role in creating an empowered security strategy, particularly in the cloud environment. NHIs, defined as machine identities in cybersecurity, are the linchpins that control access…

Empower Your DevOps with Robust Secrets Security

Are Your DevOps Truly Secured? As DevOps continue to streamline the software development process, have you considered how secure your practices truly are? An essential part of the answer lies within the realm of Non-Human Identities (NHIs) and Secrets Management – two integral aspects that can significantly enhance your cybersecurity efforts. Unlocking the Potential of…

Building Trust with Effective IAM Solutions

Why is Trust-Building Paramount in Cybersecurity? Have you considered how much trust we place in our cyber systems daily? It’s a silent bond we form without realizing it. We trust that our online interactions are secure, that our data is protected, and that breaches are highly unlikely. But, how do businesses and organizations ensure the…

Ensuring Data Safety with Comprehensive NHIDR

How Crucial is Comprehensive NHI Management in Ensuring Data Safety? Are we doing all we can to ensure our data’s safety? One answer lies in the comprehensive management of Non-Human Identities (NHIs). As machine identities, these are critical in safeguarding our cloud environment from security threats. Unraveling the Complexities of NHI Management Managing NHIs entails…

Video: Davin Jackson: The Cheat Code To A Career In Cybersecurity

Davin Jackson, cybersecurity media personality for  eSecurity Planet , joins host Katie Bavoso for this week’s Channel Insider: Partner POV. Jackson explains what drew him to pursue a career in cybersecurity, but says he didn’t always feel like he belonged. He says he didn’t see cybersecurity experts that looked like him until he met his mentor.…

New backdoor discovered that specifically targets Juniper routers

Researchers at Black Lotus Labs have uncovered an operation where a back door is dropped onto enterprise-grade Juniper Networks routers and listens for specific network signals, known as “magic packets,” to execute malicious commands.  The campaign, which researchers at the cybersecurity wing of Lumen Technologies refer to as “J-Magic,” was active between mid-2023 and mid-2024.…

Empowering Teams with Secure API Management

Why is Secure API Management Essential for Team Empowerment? Is API management a critical aspect of your organization’s cybersecurity strategy? It should be. APIs, or Application Programming Interfaces, are the engines that power today’s digital ecosystem. They enable systems to communicate, allowing for streamlined operations and improved productivity. However, incorrectly managed APIs expose businesses to…

Prevent Data Breaches with Advanced IAM

Why is IAM Vital in Preventing Data Breaches? Identity and Access Management (IAM) stands at the forefront of effective cybersecurity strategies. Implementing advanced IAM holds the key to data breach prevention, providing a formidable line of defense against unauthorized access and sophisticated cyber threats. One essential aspect of IAM is the management of Non-Human Identities…

Is Your Automation Exposing Critical Data?

Is Automation Compromising Your Data Security? In modern business environments, how secure is your automation process? Alarmingly, many companies are unknowingly exposing critical data due to inadequate Non-Human Identity (NHI) and Secrets Management practices. This emerging field is crucial to maintaining data integrity and has become a high-priority concern for many CISOs, IT professionals, and…

CloudFlare detected (and blocked) the biggest DDoS attack on record

Web infrastructure and security company Cloudflare says it detected the biggest Distributed Denial-of-Service (DDoS) attack ever recorded, a 5.6 terabits per second (Tbps) attack directed at an internet service provider (ISP) in Eastern Asia. Despite the staggering volume of the attack, Cloudflare successfully managed and mitigated it without human intervention. The company said in research…

Conduent confirms outage was due to a cybersecurity incident

U.S. government contractor Conduent, which provides technology to support services such as child support and food assistance, has confirmed that a recent outage was caused by a cybersecurity incident.  Conduent confirmed the disruption, which left some U.S. residents without access to support payments, to TechCrunch on Tuesday but declined to say whether the outage was…

‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security

The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes.

Toronto school district says 40 years of student data stolen in PowerSchool breach

Canada’s largest school board says hackers may have accessed some 40 years’ worth of student data during the recent PowerSchool breach.  In a letter sent to parents this week, the Toronto District School Board (TDSB) said that the data breach affected all students enrolled in the district between September 1985 and December 2024.  The school…

Staying Ahead: Key Cloud-Native Security Practices

Can Effective Non-Human Identities and Secrets Management Bolster Your Cloud-Native Security Practices? The revolution in technology has seen a significant shift in business operations, with many organizations adopting cloud-native applications. These applications offer various benefits, including scalability, versatility, and cost-efficiency. However, they also open a Pandora’s box of security threats. In the sea of these…

Feel Reassured with Robust Machine Identity Protocols

Why Are Machine Identity Protocols Crucial for Robust Security Measures? Imagine opening your virtual “front door,” only to find unknown software entities exploring your data terrain. Chilling, isn’t it? Well, that’s where Machine Identity Protocols step in. They act as vigilant watchmen, identifying authorized non-human identities (NHIs) and keeping unauthorized ones at bay. So, let’s…

WordPress Appliance - Powered by TurnKey Linux