Geek-Guy.com

Category: Global Security News

AT&T’s $5.5B Fiber Grab: Lumen’s Big Pivot

AT&T is exploring a potential game-changing acquisition of Lumen Technologies’ consumer fiber business. A report from Bloomberg News says the deal could be worth a hefty $5.5 billion, though negotiations are still in progress.  Reports follow signals from Lumen that changes were coming Lumen’s financial chief, Chris Stansbury, dropped hints about potentially selling off their…

Hacker wollten Arbeitslosengeld ergaunern

Bundesagentur für Arbeit Bei der Bundesagentur für Arbeit ist es derzeit vorübergehend nicht möglich, online Anträge auf Geldleistungen wie Arbeitslosengeld zu stellen. Hintergrund ist ein Hackerangriff auf die Konten mehrerer Klienten der Bundesagentur über deren persönliche Endgeräte. Die Behörde habe daraufhin die Funktion zum Eintragen oder Ändern von IBAN-Kontonummern sowie Adressdaten in dem Online-Formular vorübergehend…

How Channel Leadership is Changing With the Industry

It’s nearly impossible to look anywhere in the channel without hearing about change. From evolving technologies to shifting service models and the ongoing transformation of how businesses approach their tech stack, there is plenty in 2025 that partners might not have seen a decade ago. Channel Insider spoke with various executives at vendors and platform…

How CISOs can balance business continuity with other responsibilities

Cyber incidents, especially ransomware, are changing the way businesses assess risk and resiliency. As a result, what was once largely a CIO function is becoming that of a CISO, with them taking on more business risk responsibilities, including business continuity and third-party risk management, according to the IANS State of the CISO 2025 report. From…

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy

In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how…

Authentifizierungslösungen: 10 Passwordless-Optionen für Unternehmen

Um Passwörter hinter sich zu lassen, gibt es bessere Lösungen. Wir zeigen Ihnen zehn. Foto: Raffi Ilham Pratama – shutterstock.com Passwörter sind seit Jahrzehnten der Authentifizierungsstandard für Computersysteme, obwohl sie sich immer wieder aufs Neue als anfällig für diverse Cyberangriffsformen erwiesen haben und kompromittierte Benutzerkonten auf regelmäßiger Basis zum Einfallstor für kriminelle Hacker werden. Ein…

How Each Pillar of the 1st Amendment is Under Attack

“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.” -U.S. Constitution, First Amendment. Image: Shutterstock, zimmytws. In an address…

UK Cybersecurity Weekly News Roundup – 31 March 2025

UK Cybersecurity Weekly News Roundup – 31 March 2025 Welcome to this week’s edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. UK Warned of Inadequate Readiness Against State-Backed Cyberattacks Cybersecurity experts have sounded the alarm over the UK’s growing vulnerability to state-sponsored cyber threats. A…

Perplexity CEO denies having financial issues, says no IPO before 2028

Perplexity CEO Aravind Srinivas recently took to Reddit to address users’ product complaints and reassure them that the company is not under serious financial pressure. Srinivas seemed to be responding, in part, to a user theory that the company is “doing horribly financially” and “making lots of changes to cut costs.” As an example, the…

China Miéville says we shouldn’t blame science fiction for its bad readers

It’s been 25 years since China Miéville stepped into the literary spotlight with his novel “Perdido Street Station.” Combining elements of science fiction, fantasy, and horror, the novel introduced readers to the fantastically complex city of New Crobuzon, filled with insect-headed khepri, cactus-shaped cactacae, and terrifying slake moths that feed on their victims’ dreams. It…

The Integration of Virtual Reality (VR) Into Healthcare: An Informative Guide

Technology and healthcare are close relations, both cousins emerging out of the Renaissance and seeing rapid innovation since. Technology in the healthcare sector has continued to evolve at an unprecedented rate. From being able to undertake online healthcare courses like the Rockhurst University online FNP program to the advent of telemedicine, and now, the use…

BSidesLV24 – IATC – Introduction To I Am The Cavalry – Day Two – Preparing for 2027

Authors/Presenters: David Batz, Josh Corman Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – IATC – Introduction To I Am The Cavalry – Day Two –…

Just 2 days to secure your founder or investor pass with $300+ off for TechCrunch All Stage

Time is running out! Less than 48 hours left to lock in your $300+ discount for TechCrunch All Stage founder and investor passes. More than just you? Save even more with bundle tickets. Rates increase on March 31 at 11:59 p.m. PT. TC All Stage is where founders accelerate their growth and investors discover their…

SevenRooms unveils new AI features to power ‘SuperHuman Hospitality’, ‘helping restaurants’ personalise, streamline & save time

AI Responses, AI Feedback and AI Note Polish are giving restaurants an edge – automating time-consuming tasks so staff can focus on what matters most: their guests COMPANY NEWS: CRM, marketing, and operations platform for hospitality SevenRooms has announced the launch of three new AI-powered features – AI Responses, AI Feedback Summary, and AI Note…

Inside Daisy Cloud: 30K Stolen Credentials Exposed 

Veriti research recently analyzed stolen data that was published in a telegram group named “Daisy Cloud” (potentially associated with the RedLine Stealer), exposing the inner workings of a cybercrime marketplace. This group offers thousands of stolen credentials in an ongoing basis across a wide range of services, from crypto exchanges to government portals, at disturbingly…

From checkbox to confidence: Why passing the audit isn’t the endgame

“We passed the audit. No idea how, but we passed.” If that sentence sounds familiar – or worse, relatable – it’s time for a serious look in the mirror. Every year, companies across industries breathe a collective sigh of relief when the auditors give the thumbs-up. The SOC 2, ISO 27001, PCI DSS – pick…

Genetic Breach Fallout: 23andMe’s Collapse Raises Security Alarms 

In 2023, a massive data breach at 23andMe shook the foundation of the consumer genomics industry. Fast forward to today, the company has filed for bankruptcy. From Veriti’s perspective, this incident highlights the devastating consequences of failing to secure deeply sensitive personal data, especially when that data reaches beyond individuals and into family legacies.  Veriti…

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances. “RESURGE contains capabilities of the SPAWNCHIMERA malware variant, including surviving reboots; however, RESURGE contains distinctive commands that

What are the cost implications of maintaining NHI compliance?

Does Non-Human Identities Compliance Come with a Hefty Price Tag? Foremost among these challenges is securing a cloud environment from potential threats. One of the most significant components of this effort is the effective management of Non-Human Identities (NHIs) and their associated secrets. With the financial sector already witnessing the impact of KYC-AML compliance, NHIs…

What best practices ensure long-term compliance for NHIs?

What Are the Essential Considerations for Long-Term Compliance of Non-Human Identities? The importance of Non-Human Identities (NHIs) in cybersecurity cannot be overstated. But how do organizations ensure the long-term compliance of these NHIs? In a nutshell, it requires a conscientious approach that integrates both strategy and technology. The Strategic Importance of NHIs Non-Human Identities are…

How can technology simplify the process of NHI compliance?

How is Technology Revolutionizing Non-Human Identities (NHI) Compliance? How can the integration of advanced technology streamline the process of NHI compliance? A robust cybersecurity strategy is indispensable, especially regarding the management of non-human identities (NHIs) and secrets for comprehensive cloud security. The critical importance of NHI and its intricacies lies in its ability to bridge…

Sam Altman firing drama detailed in new book excerpt

An excerpt from the upcoming book “The Optimist: Sam Altman, OpenAI, and the Race to Invent the Future” offers new details about why OpenAI’s board briefly fired CEO Sam Altman back in 2023. Written by Wall Street Journal reporter Keach Hagey, the book claims the nonprofit’s board members became increasingly concerned after learning about issues…

A look at Intel Capital before the 34-year-old firm strikes out on its own

When Intel Capital announced its plans to spin out from semiconductor giant Intel in January, it came as a bit of a shock considering the firm has been operating as Intel’s venture investment arm since 1991. In many ways this decision marks the end of an era for what’s considered by some to be the…

BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks, To Protect Your Stuff. What Do You Do?

Author/Presenter: Josh Corman, Aanne Isam Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3…

Only 3 days left to save $300+ on investor and founder tickets for TechCrunch All Stage

The final countdown is here! This is your last weekend to lock in Early Bird pricing for TechCrunch All Stage founder and investor tickets. Save up to $320 before the clock strikes 11:59 p.m. PT on March 31. Founders, charge ahead. Investors, power the mission! On July 15 at SoWa Power Station in Boston, 1,200…

Here are Africa’s biggest startups based on valuation

Last year, funding into African startups edged past $2 billion, returning to pre-pandemic levels and presenting a mixed bag as expected. Signs suggest 2025 will follow the cautious trends of the past two years. A sharp decline in mega-deals, mirroring global venture capital tightening since the boom of 2020-2021, pushed local and international investors to…

‘Tesla Takedown’ protesters are planning a global day of action on March 29, and things might get ugly

“Tesla Takedown” organizers have promised their biggest day of global action today, encouraging thousands to protest outside Tesla showrooms, dealerships, and even charging stations to peacefully object to Elon Musk’s role in slashing government spending.  As Tesla protests have spread, so has the backlash. Activists holding up signs are being conflated with masked vandals throwing…

Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation

Overview of Babuk Locker 2.0 Babuk Locker 2.0 is a ransomware strain that employs double extortion, where attackers encrypt victim files and exfiltrate sensitive data for ransom. It targets organizations by exploiting RDP vulnerabilities, unpatched systems, weak credentials, and phishing attacks. MITRE ATT&CK Mapping of Babuk Locker 2.0 & Seceon’s Early Detection & Remediation MITRE…

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene not as a simple clone, but as a fully-fledged threat from the outset, equipped with modern techniques such as remote control, black screen overlays, and advanced data harvesting via accessibility…

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it…

Javice found guilty of defrauding JPMorgan in $175M startup purchase

Charlie Javice, the founder of student loan application startup Frank that was purchased by JPMorgan for $175 million, was found guilty on Friday of defrauding the bank by greatly inflating the customer count. After a five-week trial, the jury found Javice guilty, agreeing with prosecutors’ claims that she fabricated the vast majority of Frank’s customer…

News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus

Palo Alto, Calif., Mar 28, 2025, CyberNewswire — From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates that corporations spend nearly $1 billion dollars on ransom each year, but … (more…) The post News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus…

Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience

In this edition of Axio’s Executive Insight Series, Scott Kannry, CEO of Axio, sits down with Pierre Noel, former CISO of Microsoft Asia and Huawei, to discuss the evolution of Read More The post Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience appeared first on Axio. The post Executive Perspectives: Pierre Noel on…

Ubuntu namespace vulnerability should be addressed quickly: Expert

Linux admins who have enabled the unprivileged user namespace restriction in their recent Ubuntu environments should take action to close three new vulnerabilities that allow a threat actor to bypass the supposed protection. This warning comes after researchers at Qualys found three different ways this hardening feature can, under certain circumstances, be bypassed.  “It needs…

‘Tesla Takedown’ protesters are planning a global day of action on March 29, and things might get ugly

‘Tesla Takedown’ organizers have promised their biggest day of global action this weekend, encouraging thousands to protest outside Tesla showrooms, dealerships, and even charging stations to peacefully object to Elon Musk’s role in slashing government spending.  As Tesla protests have spread, so has the backlash. Activists holding up signs are being conflated with masked vandals…

Fintech VC powerhouse Frank Rotman stepping down from QED Investors to found his own startups

Prolific fintech investor and QED Investors co-founder Frank Rotman said Friday that he will transition to a partner emeritus role by year’s end to focus on founding his own startups. But those startups won’t necessarily be financial technology companies. In a post on X, Rotman – who helped start QED in 2007 – declared that…

Cybersecurity & Infrastructure Security Agency (CISA) Pledge

When the Cybersecurity and Infrastructure Security Agency (CISA) introduced the Secure by Design pledge in May of last year, it immediately resonated with our engineering philosophy;   it was a natural fit, not a shift. Thanks to our highly skilled DevSecOps team, embracing the pledge wasn’t a decision we had to make—it’s simply how we operate….…

WordPress Appliance - Powered by TurnKey Linux