Geek-Guy.com

Category: Global Security News

Instagram’s new ad format lets creators get paid for testimonials in comments

Instagram is introducing a new way for creators to work with brands to make money by recommending products. On Thursday, Meta introduced an addition to its Partnership Ads called Testimonials, which allows creators to get paid via written endorsements, shared as comments on the brand’s social media posts and advertisements. The new ad format is…

Spotify partners with ElevenLabs to expand its library of AI-narrated audiobooks

On Thursday, Spotify announced that it now accepts audiobooks narrated using ElevenLabs’ AI voice technology. Given that ElevenLabs is currently among the most recognized AI audio providers, this new partnership is expected to boost the quantity of AI-narrated audiobooks on the platform. To upload an audiobook narrated by AI, authors need to download the file…

Sophos Announces Availability on Pax8 Marketplace

Security vendor Sophos is the latest to offer its solutions to MSPs through the Pax8 cloud marketplace. Both companies tout this new partnership as a way to enable small and medium-sized businesses (SMBs) through the over 40,000 partners who transact through Pax8. Full breadth of Sophos security solutions now available to Pax8 partners Sophos claims…

Substack now lets creators monetize videos and post them directly from its app

As TikTok’s future in the U.S. remains uncertain, Substack tries to lure creators to its platform by doubling down on video. The company announced on Wednesday that it’s now allowing creators to monetize their videos on the platform, and letting them publish video posts directly from the Substack app. Previously, creators have been able to…

Twitch caps streamers’ storage at 100 hours of highlights and uploads

Twitch on Wednesday announced it will begin limiting streamers to 100 hours of highlights and uploads, and will delete content if a channel exceeds the limit. The company said it’s introducing the change because highlights haven’t been effective in driving discovery or engagement, and because storage is costly. The storage cap goes into effect on…

CISOs wollen Cloud-Security vorantreiben

Cloud-Security: CISOs setzen auf Application-Protection-Plattformen (CNAPP). Digitala World – Shutterstock.com 76 Prozent der deutschen CISOs planen in den kommenden 12 Monaten, ihre finanziellen Mittel verstärkt für Cloud-Security einzusetzen – insbesondere für Cloud-native Application-Protection-Plattformen (CNAPP). So das Ergebnis einer weltweiten Befragung unter 500 Security-Entscheidern im Auftrag des IT-Anbieters Westcon-Comstor. Demnach ist die Bereitschaft hierzulande, in den…

How CTEM Impacts Cyber Security Insurance Premiums?

Cyber insurance used to be an optional safety net. Now? It’s a must-have. With ransomware, data breaches, and cyberattacks on the rise, companies need protection against financial losses. But here’s… The post How CTEM Impacts Cyber Security Insurance Premiums? appeared first on Strobes Security. The post How CTEM Impacts Cyber Security Insurance Premiums? appeared first…

SmartSuite raises $38M to be the final word on enterprise collaboration

Three founders who built out one of the bigger startups in risk management are scaling a new company to take on another pain point in the world of work. SmartSuite‘s platform lets teams collaborate on projects, build automations around that work, and search and access work across larger libraries of data spanning a disparate number…

Mercor, an AI recruiting startup founded by 21-year-olds, raises $100M at $2B valuation

Mercor, the AI recruiting startup founded by three 21-year-old Thiel Fellows, has raised $100 million in a Series B round, the company confirmed to TechCrunch. Menlo Park-based Felicis led the round, valuing Mercor at $2 billion—eight times its previous valuation, the Wall Street Journal previously reported. Existing investors Benchmark, General Catalyst, and DST Global also…

Advisory M&A: AchieveUnite Acquires Rohner & Associates

M&A activity remains a key theme throughout the channel. AchieveUnite has acquired California-based Rohner & Associates, LLC (R&A). Theresa Caragol, the CEO of AchieveUnite and longtime thought leader on channel partner strategy, spoke with Channel Insider to share how the acquisition addresses market needs and reflects the changing channel landscape. AI-driven insights paired with decades…

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,

PitchIT Program Creates Community Through Competition

Now entering its seventh year, the PitchIT accelerator program– supported by IT Nation– is a worldwide competition committed to incubating growth among ConnectWise’s startup integration partners in the managed service provider (MSP) space. Channel Insider sat down with IT Nation’s Vice President of Communities, Sean Lardo, to discuss the competition, its benefits to the channel,…

Harness & Traceable Merge, Focus On AI-Driven Software Delivery

Harness, an end-to-end software delivery platform, and Traceable, an API security leader, recently announced they would merge to create an advanced AI-native DevSecOps platform. Companies join under the Harness brand, aim to address DevSecOps needs The combined company will move forward under the Harness name, uniting software delivery and security into a single, AI-native platform.…

Mac users duped with FrigidStealer posing as browser updates

Hackers are seen dropping a new macOS infoStealer, FrigidStealer, on unsuspecting systems in a web inject campaign that uses fake browser updates to lure victims. Researchers at Proofpoint reported observing two new threat actors, TA2726 and TA2727, running this campaign to steal sensitive browser data. “Proofpoint identified and named two new cybercriminal threat actors operating…

Valar Atomics comes out of stealth with $19M and a pilot reactor site

Companies developing small modular nuclear reactors (SMRs) have raised more than $1.5 billion in the past year, as tech companies hunger for power to train AI models and governments decide to commit to the industry. For example, X-energy raised $700 million this month, and Paris-based Newcleo raised $151 million last year, and one would be…

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flaw

PCI DSS 4.0 Mandates DMARC By 31st March 2025

The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result…

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence…

CyberStrong February Product Update

The team at CyberSaint is thrilled to announce the latest additions and updates to the CyberStrong solution. To start, we’re expanding Phase 1 of Asset Management with custom types and attributes. Additionally, we’ve added status updates, schedule, and pause for Continuous Control Automation (CCA) and included the ability to adjust the control weight by risk…

Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now

For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks

Tether backs stablecoin liquidity provider Mansa in $10M seed round

As payment companies increasingly explore stablecoins for cross-border payments and real-time settlement, some startups are tapping into the zeitgeist by providing liquidity via a revolving line of credit in stablecoins. One of them is Dubai-based but Africa-focused Mansa, whose offering allows payments companies to settle transactions and fund customer accounts instantly. The startup has raised…

Understanding OWASP’s Top 10 list of non-human identity critical risks

Verizon There are some very good reasons why non-human identities (NHI) have landed among the most-discussed cybersecurity topics in the last few years — it’s estimated that for every 1,000 human users in an enterprise network, there are 10,000 non-human connections or credentials. Some estimates peg that ratio even higher at 10 to 50 times…

What is SIEM? Improving security posture through event log data

Introduction to SIEM Security information and event management software (SIEM) products have been an enduring part of enterprise software ever since the category was created back in 2005 by a couple of Gartner analysts. It is an umbrella term that defines a way to manage the deluge of event log data to help monitor an…

Video: How Omega Systems Puts The Security In MSSP

In this episode of Channel Insider: Partner POV, host Katie Bavoso sits down with Mike Fuhrman, CEO of Omega Systems, to discuss the company’s transformation from a traditional Managed Service Provider (MSP) to a Managed Security Services Provider (MSSP). This shift was a priority for Fuhrman when he joined the company in 2021. Fuhrman explains…

Spore.Bio raises $23M to apply machine learning to microbiology testing

Recalls in the food and beverage industry due to contamination incidents can have catastrophic effects. Not only do companies have to pay fines and damages, but the impacts on the brand’s reputation can be long-lasting. That’s why Spore.Bio, a Paris-based deeptech startup, is trying to reinvent microbiology testing to avoid the next PR crisis in…

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below – CVE-2025-21355 (CVSS score: 8.6) – Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) – Microsoft Power Pages Elevation of Privilege Vulnerability…

Der trügerische Komfort des Risikomanagements

Gefahrenmanagement statt Risikomanagement: Cybersicherheit erfordert Dringlichkeit und Entschlossenheit. Billion Photos – Shutterstock.com Herkömmliches Risikomanagement basiert auf Wahrscheinlichkeiten und statistischen Berechnungen – doch in einer zunehmend komplexen und aggressiven Bedrohungslandschaft sind solche Prognosen unzuverlässig. Daher ist ein Umdenken nötig: Anstatt dem Risikomanagement sollten Organisationen Gefahrenmanagement als neues Konzept einführen. Risikomanagement impliziert, dass man die Wahrscheinlichkeit eines…

AI-coding startup Codeium in talks to raise at an almost $3B valuation, sources say

Codeium, an AI-powered coding startup, is raising a new round of funding at a $2.85 billion valuation, including fresh capital, according to two sources with knowledge of the deal.  The round is being led by a returning investor Kleiner Perkins, the people said. The new round comes just six months after Silicon Valley-based Codeium announced…

Smashing Security podcast #405: A crypto con exchange, and soaring ticket scams

From shadowy Bitcoin exchanges to Interpol’s most wanted, Alexander Vinnik was the alleged kingpin behind BTC-e, a $4bn crypto laundering empire. Learn more about him, and how he became a geopolitical pawn between the US, France, and Russia. Plus! Hear how concert-goers are being warned about a swathe of scams hitting stadiums and arenas around…

Study of TikTok, X ‘For You’ feeds in Germany finds far-right political bias ahead of federal elections

Recommendation algorithms operated by social media giants TikTok and X have shown evidence of substantial far-right political bias in Germany ahead of a federal election that takes place Sunday, according to new research carried out by Global Witness. The non-government organization (NGO) undertook an analysis of social media content displayed to new users via algorithmically…

After raising $1 billion, fintech Varo closes another $29 million, replaces founder CEO

Fintech Varo has been hoping to raise a $55 million Series G round but has, so far, closed on $29 million to date, according to a recent SEC filing. Varo declined to comment on this new round but the fintech has raised just over $1 billion in funding since its 2015 inception, according to PitchBook. …

Russia-aligned threat groups dupe Ukrainian targets via Signal

Russian state threat groups have compromised Signal accounts used by Ukrainian military and government personnel to eavesdrop on real-time communications, Google Threat Intelligence Group said in a report released Wednesday. “This is a persistent, ongoing campaign being carried out by multiple different Russia-aligned threat actors,” Dan Black, principal analyst at Google Threat Intelligence Group, said…

Mark Zuckerberg’s charity U-turns, ends DEI efforts 

Mark Zuckerberg’s charity has eliminated its DEI programs and efforts just weeks after assuring staff it would continue supporting DEI efforts, the Guardian reports.  The Chan-Zuckerberg Initiative (CZI), co-founded by Zuckerberg and his wife Priscilla Chan, will end internal DEI programs and no longer provide “social advocacy funding,” which provided grants for racial equity and…

Brand new women’s focused Swizzle Ventures skyrockets past its fundraising target

Swizzle Ventures has closed its Fund I at $6.6 million, bypassing its initial $3 million target, Jessica Kamada, the firm’s founder, told TechCrunch.  Back in December, TechCrunch previously reported that the firm, which quietly launched in 2023, was raising and has already bypassed $5 million, per its SEC filing. The thesis of Fund I will…

Energy CISO: Agencies can’t implement zero trust alone

Federal agencies need help from stakeholders outside of government to solve some of the harder technical barriers in setting up zero-trust architecture in their networks, the Department of Energy’s chief information security officer said Wednesday. Speaking at CyberScoop’s Zero Trust Summit in Washington D.C., Paul Selby urged technology manufacturers and experts to work with federal…

Salt Typhoon telecom breach remarkable for its ‘indiscriminate’ targeting, FBI official says

One of the most notable elements of the monumental hack of major telecommunications companies is just how “indiscriminate” it was in its pursuit of data, a top FBI official said Wednesday. The FBI has been investigating the breach, which it has blamed on Chinese government hackers commonly known as Salt Typhoon. “What we found particularly…

DEF CON 32 – Dysfunctional Unity: The Road To Nowhere

Authors/Presenters: Michael v3ga Aguilar Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Dysfunctional Unity: The Road To Nowhere appeared first on…

IVF insurance startup Future Family promises a baby or your money back

For decades, couples going through in vitro fertilization have had to spend tens of thousands of dollars on the procedures with no guarantee of success. It’s not only an emotionally draining process, but a financially exhausting one as well. Startup Future Family wants to help ease some of that burden for couples with a new…

Karman+ digs up $20M to build an asteroid-mining autonomous spacecraft

Investors on the lookout for startups working at the frontiers of technology are casting their nets ever further into unchartered territory, sometimes literally as well as figuratively. In one of the latest examples, a startup called Karman+ with ambitions to build autonomous spacecraft that can travel to asteroids and then mine them for materials has…

This Week in AI: Maybe we should ignore AI benchmarks for now

Welcome to TechCrunch’s regular AI newsletter! We’re going on hiatus for a bit, but you can find all our AI coverage, including my columns, our daily analysis, and breaking news stories, at TechCrunch. If you want those stories and much more in your inbox every day, sign up for our daily newsletters here. This week, billionaire…

Google’s ‘Career Dreamer’ uses AI to help you explore job possibilities

Google is launching a new experiment that uses AI to help people explore more career possibilities. The company announced on Wednesday that a new “Career Dreamer” tool can find patterns between your experiences, educational background, skills, and interests to connect you with careers that might be a good fit. With Career Dreamer, you can use…

Russian cyberespionage groups target Signal users with fake group invites

Russian advanced persistent threat (APT) groups are increasingly launching phishing attacks aimed at tricking users of the Signal messaging app into giving attacker-controlled devices access to their accounts and the encrypted communications within. The attacks typically masquerade as Signal group chat invites that, in reality, abuse the device linking functionality. “Signal’s popularity among common targets…

Sanas taps AI to change call center workers’ accents in real time

The demand for voice and speech recognition technologies is massive — and growing. An analysis by market research firm Markets and Markets found that the sector could be worth over $28.1 billion by 2027. There’s no shortage of vendors providing voice and speech recognition solutions, but some newer upstarts have managed to carve out niches.…

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. “The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app’s legitimate ‘linked devices’ feature that enables Signal to be used on…

#StopRansomware: Ghost (Cring) Ransomware

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see…

WordPress Appliance - Powered by TurnKey Linux