Geek-Guy.com

Category: Global Security News

YC alum Mendel, a ‘Ramp for LatAm enterprises,’ raises $35M Series B

Mexico City-based Mendel has raised $35 million in a Series B round of funding, it tells TechCrunch exclusively. Corporate spend management platform Mendel last raised in December 2021 — a $15 million Series A round and $20 million in debt — after participating in Y Combinator’s Winter 2021 cohort. With this latest capital infusion, the…

Ebay backs WunderGraph to build an open-source GraphQL federation

A fledgling open-source startup that’s setting out to tackle API sprawl in the GraphQL ecosystem has secured the backing of e-commerce giant eBay. WunderGraph, as the company is called, today said it has raised $7.5 million in a Series A round of funding to “scale its open source GraphQL federation.” Investors include eBay’s VC arm…

With the Switch 2 coming, Nintendo is working on Virtual Game Cards for cross-device portability

Nintendo announced on Thursday that it is working on Virtual Game Cards, a feature that makes digitally downloaded games more portable across different devices. With the highly awaited Nintendo Switch 2 on the horizon, these Virtual Game Cards will make it easier for users to port over their existing Switch games to their new devices.…

ChatGPT: Everything you need to know about the AI-powered chatbot

ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users. 2024 was a big year for OpenAI, from its partnership…

Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks

A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian, and Play. The connection stems from the use of a custom tool that’s designed to disable endpoint detection and response (EDR) software on compromised hosts, according to ESET. The EDR killing tool, dubbed EDRKillShifter, was first documented as…

4 days left to lock in $300+ savings for investor and founder tickets for TechCrunch All Stage

Time’s running out — 4 days left to save over $300 on Founder and Investor Passes for TechCrunch All Stage! Founders, accelerate your journey. Investors, fuel their success. Join us on July 15 at SoWa Power Station in Boston, MA, for TC All Stage, where 1,200 founders and VCs come together to scale from seed…

Reality Bites: You’re Only as Secure as Your Last API Deployment

In agile and DevOps-driven environments, APIs are frequently updated to meet evolving business demands, from adding new features to addressing performance issues. However, each deployment introduces potential security risks, as new code, configurations, and endpoints can expose vulnerabilities. In an environment of continuous integration and continuous deployment (CI/CD), the security of an organization’s APIs hinges…

New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It

Whether it’s CRMs, project management tools, payment processors, or lead management tools – your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow SaaS, data damage, and more. A new report, Understanding SaaS…

Trotz Hinweise: Oracle dementiert Cyberattacke

width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Obwohl Sicherheitsforscher Hinweise für einen Datendiebstahl bei Oracle entdeckt haben, streitet das Unternehmen den Vorfall ab. JHVEPhoto – shutterstock.com Sicherheitsforscher von CloudSEK haben kürzlich entdeckt, dass im Darknet sensible Daten von mehr als 140.000 Oracle-Kunden zum Verkauf stehen. Diese Informationen sollen aus einer Cyberattacke auf die Oracle Cloud stammen. Angriff…

NHS vendor Advanced to pay £3M fine following 2022 ransomware attack

NHS vendor Advanced will pay just over £3 million ($3.8 million) in fines for not implementing basic security measures before it suffered a ransomware attack in 2022, the U.K.’s data protection regulator has confirmed.  It’s half the fine that the Information Commissioner’s Office had initially sought in August 2024, when the data watchdog said it…

150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms

An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has ballooned to compromise approximately 150,000 sites to date. “The threat actor has slightly revamped their interface but is still relying on an iframe injection to display a full-screen overlay in the visitor’s browser,” c/side security analyst Himanshu

Syncro Announces New Built-In Network Discovery for MSPs

Syncro, a platform provider for mid-sized managed service providers (MSPs) and IT departments, recently introduced its new Network Discovery solution to streamline MSP and IT operations. Automated management and detection for network devices The new solution is a fully integrated tool that automatically detects and manages network-connected devices. It simplifies IT operations by eliminating the…

CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws impacting Sitecore CMS and Experience Platform (XP) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below – CVE-2019-9874 (CVSS score: 9.8) – A deserialization vulnerability in the Sitecore.Security.AntiCSRF

OpenAI will reportedly close its SoftBank-led $40 billion round soon

While you’re busy Ghibli-fying your images with ChatGPT’s new image-generation capabilities, OpenAI is out raising a ton more cash. The company is close to finalizing a new $40 billion funding round led by SoftBank, according to a report from Bloomberg. The report noted that other funds, including the hedge fund Magnetar Capital, Coatue Management, Founders…

NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems

A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprise-focused software that’s used to manage data protection across applications, databases, virtual machines, and file systems, offering the ability to backup, restore, and clone data resources. The vulnerability, tracked as

Die 10 häufigsten IT-Sicherheitsfehler

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?quality=50&strip=all 12500w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=300%2C200&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=768%2C512&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=1024%2C683&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=1536%2C1024&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=2048%2C1365&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=1240%2C826&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=150%2C100&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=1046%2C697&quality=50&strip=all 1046w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=252%2C168&quality=50&strip=all 252w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=126%2C84&quality=50&strip=all 126w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=720%2C480&quality=50&strip=all 720w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=540%2C360&quality=50&strip=all 540w, https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?resize=375%2C250&quality=50&strip=all 375w” width=”1024″ height=”683″ sizes=”(max-width: 1024px) 100vw, 1024px”>Von ungepatchten Sicherheitslücken bis hin zu unzureichenden Backups: Lesen Sie, wie sich die häufigsten IT-Sicherheitsfehler vermeiden lassen.   eamesBot – Shutterstock.com Verschlüsselte…

Identity security: A critical defense in 2025’s threat landscape

The traditional perimeter is no longer what protects our critical information and systems. In 2025, securing data is dependent on identity. With distributed multi-cloud, multi-IDP environments, the business world is up against a stark reality: the username and password have become the most dangerous attack vector in cybersecurity. Today, making identity as a Tier 1……

Bud Financial Uses DataStax AI and NVIDIA to Drive Real-Time Financial Insights for ANZ Bank

DataStax’s AI Platform Enables Bud Financial 10x Faster Financial Data Classification COMPANY NEWS: DataStax, a leading AI platform that helps enterprises and developers build accurate AI applications at scale, today announced that Bud Financial is leveraging the DataStax AI Platform, built with NVIDIA AI, including NVIDIA NeMo Retriever, NVIDIA NIM microservices, and NVIDIA AI Enterprise,…

Smashing Security podcast #410: Unleash the AI bot army against the scammers – now!

A YouTuber has unleashed an innovative AI bot army to disrupt and outwit the world of online scammers, and a New York Times investigation looks into the intricate web of global money laundering. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley…

OpenAI’s viral Studio Ghibli moment highlights AI copyright concerns

It’s only been a day since ChatGPT’s new AI image generator went live, and social media feeds are already flooded with AI-generated memes in the style of Studio Ghibli, the cult-favorite Japanese animation studio behind blockbuster films such as “My Neighbor Totoro” and “Spirited Away”. In the last 24 hours, we’ve seen AI-generated images representing…

Nvidia is reportedly in talks to acquire Lepton AI

Nvidia is looking to get into the server rental market. The semiconductor giant is reportedly nearing a deal to acquire Lepton AI, a company that rents out servers that are powered by Nvidia’s AI chips, according to The Information. The deal is reportedly worth several hundred million dollars, according to The Information, which cited unnamed…

How can I align our NHI management with GDPR and other standards?

Is Your NHI Management GDPR Compliant? It isn’t just humans who have identities, but machines as well. In-depth understanding and control over NHIs provide organizations with an upper hand in maintaining stringent cybersecurity measures. But have you ever paused to question how Non-Human Identities management aligns with GDPR and other comparable standards? NHI Management and…

Which frameworks assist in ensuring compliance for NHIs?

Why Compliance Frameworks are Crucial for NHIs? Could the answer to your organization’s cybersecurity woes lie in Non-Human Identities (NHIs)? The management of NHIs and their secrets has emerged as a key facet of cybersecurity strategy, with the potential to significantly decrease the risk of security breaches and data leaks. Non-Human Identities: The Silent Pillars…

Generative AI: threat or opportunity? It depends on your adaptive speed!

Now that AI reasoning capabilities are blasting and becoming accessible, folks tend to argue that generative AI will bring us a new era of exploitation. More zero days, more vulnerabilities, more sophisticated, and in higher frequency. The emergence of more new exploitation techniques will significantly increase the number of new vulnerabilities. We have seen in…

Island lands $250M in funding at a $4.8B valuation

Enterprise browser startup Island just raised a sizable funding round — one that bumps up its valuation significantly, and less than one year after its last fundraise. Dallas-based Island raised $250 million in a Series E round led by Coatue that valued the company at $4.85 billion, the startup announced today. This brings the company’s…

Intelligence chiefs insist Signal chat was a simple mistake

U.S. intelligence leaders found themselves under intensified scrutiny from Congress for a second straight day, following revelations that significant military plans were discussed over text messaging application Signal.  Both Director of National Intelligence Tulsi Gabbard and CIA Director John Ratcliffe apologized during a House Intelligence Committee hearing Wednesday, yet continued to claim that no sources,…

Commerce limits 19 Chinese, Taiwanese companies from buying U.S. tech

The Commerce Department plans to finalize economic sanctions this week on nearly 20 Chinese and Taiwanese organizations, citing the need to limit their access to U.S. cloud, artificial intelligence and quantum computing technologies. The sanctions, which will be detailed and published Friday in the Federal Register , would place additional license requirements on, and limit…

BSidesLV24 – IATC – Difficult Conversations

Author/Presenter: Andrea M. Matwyshyn Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – IATC – Difficult Conversations appeared first on Security Boulevard.

Workplace Tug-of-War: Organisations Mandate Office Days, But Employees Push for More Flexibility

New research confirms workplace policies are in flux, with two-thirds of organisations planning changes in 2025 77% of Australian HR professionals report their organisation mandates some office attendance, while only 16% of employees have full control over their hybrid schedules. 39% of Australian employees are required to be in the office five days a week.…

19 founders and VCs working with Elon Musk’s DOGE

Silicon Valley used to take a backseat to Washington, D.C. But now, the people disrupting technology have taken the wheel at the highest echelons of government. And that’s thanks, in large part, to the Department of Government Efficiency, better known as DOGE. Much reporting on DOGE has focused on its staffers’ ties to Musk, the billionaire bestie of…

OpenAI adopts rival Anthropic’s standard for connecting AI models to data

OpenAI is embracing rival Anthropic’s standard for connecting AI assistants to the systems where data resides. In a post on X on Wednesday, OpenAI CEO Sam Altman said that OpenAI will add support for Anthropic’s Model Context Protocol, or MCP, across its products, including the desktop app for ChatGPT. MCP is an open-source standard that…

New Relic report reveals Media and Entertainment Sector looks to Observability to drive adoption of AI

New Relic report shows 35% of respondents look to observability to deliver on the adoption of AI Most widely used observability capability is AI monitoring at 60%, the highest among all industries Intelligent Observability company New Relic has published its State of Observability for Media and Entertainment report, which offers insights into the adoption and…

SpaceX reportedly has a secret backdoor for Chinese investment

Elon Musk’s rocket company SpaceX has allowed Chinese investors to buy stakes as long as the funds are routed through the Cayman Islands or other offshore hubs, according to reporting from ProPublica.  SpaceX is a defense contractor for the Pentagon, one that handles sensitive work like building a classified spy satellite network. Investment from China…

Bradley Tusk says he makes more money with ‘equity-for-services’ than he did as a traditional VC

Bradley Tusk, co-founder and managing partner at Tusk Venture Partners, told TechCrunch in today’s episode of Equity that VC as we know it is dead. And it has been for the last four years.  “Maybe there’s some VC that I’ve never heard of that’s awash with liquidity the last couple of years, but we haven’t…

Fintech Mercury lands $300M in Sequoia-led Series C, doubles valuation to $3.5B

Digital banking startup Mercury has raised $300 million in primary and secondary funding at a $3.5 billion post-money valuation, the company confirmed to TechCrunch on Wednesday. The valuation is more than double the startup’s valuation when it last raised capital — a $120 million Series B round in 2021 that valued the company at $1.62…

Has GetReal cracked the code on AI deepfakes? $18M and an impressive client list says yes

The proliferation of scarily realistic deepfakes is one of the more pernicious byproducts of the rise of AI, and falling victim to scams based on these deepfakes is already costing companies millions of dollars — not to mention the implications these could have on national security. A startup that’s built a toolset aimed at governments…

String of defects in popular Kubernetes component puts 40% of cloud environments at risk

More than 40% of cloud environments are at risk of an account takeover due to a series of five recently discovered vulnerabilities — one regarded critical — in the Ingress Ngnix Controller for Kubernetes, according to security research published this week. Upon discovering the string of vulnerabilities in one of most widely used ingress controllers…

Why Fortalice Co-Founders Saw an Opportunity in Security

Fortalice Solutions is a cybersecurity firm specializing in training and various advisory services. The organization was founded by Theresa Payton, the former first female CIO of the U.S., Melissa O’Leary, former Chief Adviser to the director of the office of administration at the White House, and Bridget O’Connor, former special assistant to the president for…

Waze removes Google Assistant from iOS due to ongoing issues

Since the integration of Google Assistant for Waze on iOS in 2020, iPhone users have faced ongoing issues that the company has struggled to resolve for “over a year,” Waze wrote in a post, apologizing for the “prolonged inconvenience.”  On Wednesday, the navigation app officially discontinued the feature. Many users had previously reported on Reddit…

Exploited! Kentico Xperience Staging Service Authentication Bypass Vulnerabilities (CVE-2025-2746 & CVE-2025-2747)

Recently, two critical security flaws were discovered in Kentico Xperience 13, a popular digital experience platform (CMS). Tracked as CVE-2025-2746 and CVE-2025-2747, these vulnerabilities allow unauthenticated attackers to bypass the Staging Sync Server’s authentication, potentially gaining administrative control over the CMS. Both issues carry a CVSS score of 9.8 (Critical) (Warning: Multiple Critical & High……

How to prevent tool wear and damage in CNC Aluminum Processing

GUEST OPINION: In the world of precision manufacturing, maintaining the longevity and performance of tools is a top priority. Hybrid CNC machines operating with aluminum materials require special attention to reduce tool wear since these materials weaken cutting tools. Aluminum processing requires careful management due to its unique characteristics, such as its softness, ductility, and…

What’s next for ATProto, the protocol powering Bluesky and other apps

It’s getting easier to build new applications on ATProto, the protocol that powers Bluesky’s social network and a growing number of other apps. At ATmosphere, the ATProto community conference held over the weekend in Seattle, Bluesky CTO Paul Frazee offered attendees a glimpse of what’s ahead for the protocol’s development and how those will help…

BSidesLV24 – IATC – Hungry, Hungry Hackers

Authors/Presenters: Sick.Codes, Casey John Ellis Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – IATC – Hungry, Hungry Hackers appeared first on Security Boulevard.

Even anti-scammers get scammed: security expert Troy Hunt pwned by phishing email

Troy Hunt, the security researcher behind the popular “Have I Been Pwned?” data breach notification site has fallen victim to a phishing attack that exposed the email addresses of subscribers to updates of his personal blog. Hunt received an email purportedly from email marketing platform Mailchimp falsely claiming that his account had been restricted due…

New Trustwave research finds patient lives at risk in healthcare with cybersecurity vulnerabilities

COMPANY NEWS: Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the healthcare sector. The combination of highly sensitive patient data, legacy systems, increasing reliance on telehealth services, and more connected devices means healthcare is a prime target for threat actors.

WordPress Appliance - Powered by TurnKey Linux