Geek-Guy.com

Category: Global Security News

Cyberangriff auf Bundesdruckerei-Tochter

2476561975 TippaPatt – Shutterstock.com Die D-Trust GmbH fungiert als Trustcenter der Bundesdruckerei. Nach eigenen Angaben stellte das Unternehmen am 13. Januar fest, dass das Antragsportal für Signatur- und Siegelkarten von Cyberkriminellen angegriffen wurde. Bei dem Angriff seien möglicherweise personenbezogene Daten von Antragstellern entwendet worden, heißt es in einer offiziellen Mitteilung. Berichten zufolge teilte D-Trust in…

Rimini Street ‘honoured by clients and industry’ with Buyer’s Choice, Service and Leadership Awards

Company continues to lead the third-party software support and innovation solutions market, focusing on delivering strategic, operational and financial success for its clients COMPANY NEWS: Rimini Street, a global provider of end-to-end enterprise software support and innovation solutions, the leading third-party support provider for Oracle, SAP and VMware software, today announced it has been honoured…

Sources: AI vision startup Metropolis is buying Oosto (formerly known as AnyVision) for just $125M

The general hype around all things AI is not lifting all boats: certain startups continue to struggle and are looking for exits. In one of the latest developments, TechCrunch has heard from a reliable source that Metropolis, an AI-powered parking platform, is buying Oosto, the controversial computer vision company that used to be known as…

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]

As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that…

HPE’s sensitive data exposed in alleged IntelBroker hack

IntelBroker has struck again. This time, the notorious BreachForums bigwig, which has a long list of high-profile victims, including Europol, Cisco, and GE, has claimed to have breached IT giant Hewlett Packard Enterprise (HPE). The suspected Serbian-origin hacker is offering to sell on BreachForums, sensitive data allegedly stolen from HPE including product source codes and…

Vectra AI launches scholarship programme to foster the next Generation of talent in AI and cybersecurity

The Vectra AI Scholars Programme will empower students to develop creative solutions that harness the power of AI to identify patterns of attacker behaviour across the expanding hybrid attack surface COMPANY NEWS: Vectra AI, the leader in AI-driven XDR (extended detection and response), today announced the launch of the Vectra AI Scholars Programme, a scholarship…

Blinkit signals costly battle ahead in Indian quick commerce market

Zomato’s quick commerce unit Blinkit is accelerating its expansion and expects continued losses as competition intensifies in India’s instant delivery market. Blinkit now aims to reach 2,000 dark stores – small warehouses in residential areas that exclusively service online orders – by December 2025, a year ahead of its previous guidance, after exceeding 1,000 stores…

How African VC firm Oui Capital returned its first fund with Moniepoint’s unicorn exit

At a recent investor meeting, early-stage African investor Oui Capital informed limited partners that it had returned its $4 million debut fund following the sale of some shares in the business banking platform Moniepoint. The African fintech unicorn has so far proven to be a standout investment for five-year-old Oui Capital. When it launched its…

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data, user privacy, and other resources while streamlining compliance, preventing fraud, and establishing accountability. In fact, broken authentication is one of the leading causes of API-related breaches.  Ultimately, by applying robust authentication mechanisms, organizations can dramatically…

Midsize firms universally behind in slog toward DORA compliance

Beginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with the Digital Operational Resilience Act (DORA). The EU directive aims to increase cybersecurity in the financial industry. However, studies show that many companies are still struggling with implementation. According to a November 2024 survey from metafinanz, the average level…

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below – @async-mutex/mutex, a typosquat of async-mute (npm) dexscreener, which masquerades as a library for accessing…

Diese Security-Technologien haben ausgedient

Zeit für eine Frischzellenkur? JL_OFF | shutterstock.com Sicherheitsentscheidern steht eine ständig wachsende Auswahl von digitalen Tools zur Verfügung, die sie dabei unterstützen, Cyberattacken abzuwehren. Und wie aktuelle Zahlen von Gartner belegen, nutzen sie diese auch ausgiebig: Demnach prognostizieren die Marktforscher für das Jahr 2025 einen Anstieg der Ausgaben für Cybersicherheit um 15 Prozent von 87,5…

How to stream Donald Trump’s Inauguration Day 2025

Donald Trump will take the presidential oath of office on Monday in front of the Capitol building in Washington, D.C., once again. The event takes place at noon ET and is expected to attract considerable attention from both supporters and opponents. How to stream Trump’s inauguration You can watch the inauguration live with cable or…

AI benchmarking organization criticized for waiting to disclose funding from OpenAI

An organization developing math benchmarks for AI didn’t disclose that it had received funding from OpenAI until relatively recently, drawing allegations of impropriety from some in the AI community. Epoch AI, a nonprofit primarily funded by Open Philanthropy, a research and grantmaking foundation, revealed on December 20 that OpenAI had supported the creation of FrontierMath.…

The Pentagon says AI is speeding up its ‘kill chain’

Leading AI developers, such as OpenAI and Anthropic, are threading a delicate needle to sell software to the United States military: make the Pentagon more efficient, without letting their AI kill people. Today, their tools are not being used as weapons, but AI is giving the Department of Defense a “significant advantage” in identifying, tracking,…

TikTok is restoring service in the US

Barely more than 12 hours after TikTok went dark in the United States, the video-sharing app is coming back online. “In agreement with our service providers, TikTok is in the process of restoring service,” the company said in a statement. “We thank President Trump for providing the necessary clarity and assurance to our service providers…

TikTok is restoring service in the US

Barely more than 12 hours after TikTok went dark in the United States, the video-sharing app is coming back online. “In agreement with our service providers, TikTok is in the process of restoring service,” the company said in a statement. “We thank President Trump for providing the necessary clarity and assurance to our service providers…

Trump says he will delay TikTok ban, suggests a joint venture with US ownership

TikTok went dark for users in the US on Saturday night, but it may not be gone for long. President-elect Donald Trump posted on Truth Social this morning that he will issuing an executive order Monday that will “extend the period of time before the law’s prohibitions take effect, so that we can make a…

Employees of failed startups are at special risk of stolen personal data through old Google logins

As if losing your job when the startup you work for collapses isn’t bad enough, now a security researcher has found that employees at failed startups are at particular risk of having their data stolen. This ranges from their private Slack messages to Social Security numbers and, potentially, bank accounts. The researcher who discovered the…

DEF CON 32 – Exposing The Occultations In Large Off-Grid Solar Systems

Authors/Presenters: Dan Berte & Alexandru Lazar Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Exposing The Occultations In Large Off-Grid Solar…

Legends of Music: Celebrating the Greatest Artists Across Generations Compilation

Adam Ant, AD Rock, Alan Parsons, Aldo Nova, Alex Lifeson, Andrew Gold, Angus Young, Barbra Streisand, Barry Gibb, Barry White, Benjamin Orr, Barry Goudreau, Beyoncé Knowles-Carter, Bill Wyman, Billy Gibbons, Billy Preston, Billy Squire, Björn Ulvaeus, Bob Casale, Bob Dylan, Bobby Kimball, Boy George, Brad Delp, Brian May, Bruce Dickenson, Carmine Appice, Carol Kaye, Charlie…

Apple lists all apps it removed alongside TikTok in the U.S.

Amid the TikTok shutdown, in a rare move, Apple published a statement and a support document listing all affected apps that are inaccessible in the U.S. The iPhone maker typically doesn’t publish information for when it blocks apps. Notably, other ByteDance apps, including CapCut, Lemon8 — which surged in the last few months — and…

Confident Cybersecurity: Essentials for Every Business

Are Businesses Truly Prepared for Today’s Cybersecurity Challenges? With the transition to a digital majority, company networks are continuously at risk, and potential breaches are growing more severe each day. So, how well-prepared is the average business when it comes to cybersecurity essentials? Business Cybersecurity: More Than Just Firewalls and Antivirus One critical aspect of…

Confident Cybersecurity: Essentials for Every Business

Are Businesses Truly Prepared for Today’s Cybersecurity Challenges? With the transition to a digital majority, company networks are continuously at risk, and potential breaches are growing more severe each day. So, how well-prepared is the average business when it comes to cybersecurity essentials? Business Cybersecurity: More Than Just Firewalls and Antivirus One critical aspect of…

Proactively Managing Cloud Identities to Prevent Breaches

What Role Does Proactive Handling of Cloud Identities Play in Avoiding Breaches? As cybersecurity experts, we are vested in the responsibility of providing guidance and oversight to other professionals in the cybersecurity sphere. A topic that has been gaining traction in recent years is Non-Human Identities (NHIs) and Secrets Security Management. NHIs are machine identities…

Proactively Managing Cloud Identities to Prevent Breaches

What Role Does Proactive Handling of Cloud Identities Play in Avoiding Breaches? As cybersecurity experts, we are vested in the responsibility of providing guidance and oversight to other professionals in the cybersecurity sphere. A topic that has been gaining traction in recent years is Non-Human Identities (NHIs) and Secrets Security Management. NHIs are machine identities…

How Secure Is Your PAM Strategy?

Is Your PAM Strategy as Secure as You Think? It’s a common question asked in board meetings and by cybersecurity teams: Is our Privileged Access Management (PAM) truly safe? A secure PAM strategy is vital to any business’s cybersecurity infrastructure, but the complexity often leads to blind spots. Non-Human Identities (NHIs) and their associated Secrets…

Perplexity AI submits bid to merge with TikTok

With a TikTok ban looming in the United States, Perplexity AI is the latest bidder hoping to give the video app a new corporate home. CNBC first reported on Perplexity’s interest. A source with knowledge of the offer confirmed to TechCrunch that Perplexity (whose CEO Aravind Srinivas is pictured above) has submitted a bid to…

FTC says partnerships like Microsoft-OpenAI raise antitrust concerns

The Federal Trade Commission said in a staff report issued Friday that there are potential competitive issues in partnerships between big tech companies and generative AI developers — specifically, Microsoft’s backing of OpenAI and Amazon and Alphabet/Google’s partnerships with Anthropic. “The FTC’s report sheds light on how partnerships by big tech firms can create lock-in,…

Once high-flying proptech startups Divvy Homes and EasyKnock are the latest to struggle

Many proptech startups, born and funded during the low-interest-rate heydays, are in the throes of struggle. With investments into U.S.-based real estate startups falling from $11.1 billion in 2021 to $3.7 billion last year, according to PitchBook data, some are selling themselves off, while others are closing shop. The two most recent examples are the…

DEF CON 32 – Breaking Boundaries: Popping Shells In The Airgap With $10 & Arduino Magic

Author/Presenter: Daniel Beard Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Breaking Boundaries: Popping Shells In The Airgap With $10 &…

TikTok says it will go dark Sunday unless Biden offers ‘definitive statement’

It remains unclear whether TikTok will still be available in US app stores Sunday, with the company claiming that President Joe Biden’s outgoing administration needs to offer “definitive” assurances that it won’t enforce the ban. On Friday, the Supreme Court upheld a law that would effectively ban TikTok in the United States if the app’s…

Trump’s Digital Footprint: Unveiling Malicious Campaigns Amid Political Milestones

As the political landscape heats up, so does the activity in the cyber threat domain. High-profile events such as inaugurations often become a prime opportunity for cybercriminals to launch malicious campaigns. With Trump’s upcoming inauguration on January 20th, our research sheds light on the digital threats tied to such politically charged events, focusing on previous…

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. “People’s Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, including…

EV startup Canoo files for bankruptcy and ceases operations

Seven-year-old electric vehicle startup Canoo has filed for bankruptcy and will “cease operations immediately.” The company is liquidating its assets in a Chapter 7 proceeding in the Delaware Bankruptcy Court. The company said in a press release published late Friday that it was “in discussions with foreign sources of capital” that proved unsuccessful, and also…

How Imperva Protects the Arts Industry from Ticketing Abuse by Carding Bots

The ticketing industry is under constant threat from malicious bots, with bad actors targeting these platforms for financial gain. Bots accounted for 31.1% of all traffic to entertainment platforms in 2024, with attacks ranging from scalping and credential stuffing to carding operations. When one public museum experienced a surge in fraudulent transactions, they turned to…

US hits back against China’s Salt Typhoon group

The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider campaign against Chinese-based hacking. On Friday the Department of the Treasury’s Office of Foreign Assets Control (OFAC) said it is sanctioning Sichuan Juxinhe Network Technology,…

Amazon suspends US drone deliveries following crash at testing facility

Amazon has paused testing of its delivery drones following a crash involving two of its models, according to Bloomberg. It’s the latest setback for Amazon’s beleaguered Prime Air program, which aims to deliver around 500 million packages a year to customers by the end of the decade. Bloomberg reports two Amazon drones crashed in rainy…

A Brief Guide for Dealing with ‘Humanless SOC’ Idiots

image by Meta.AI lampooning humanless SOC My former “colleagues” have written several serious pieces of research about why a SOC without humans will never happen (“Predict 2025: There Will Never Be an Autonomous SOC”, “The “Autonomous SOC” Is A Pipe Dream”, “Stop Trying To Take Humans Out Of Security Operations”). But I wanted to write…

TSA extends cyber requirements for pipeline owners

The Transportation Security Administration is locking in a pair of pipeline directives for additional years ahead of the looming White House transition. In a posting to the Federal Register on Friday, the Department of Homeland Security component said it ratified the Security Directive Pipeline-2021-01 series and the Security Directive Pipeline-2021-02 series and would extend the…

Netradyne snags $90M at $1.35B valuation to expand smart dashcams for commercial fleets

Distracted driving is one of the leading causes of car accidents and a major reason why auto insurance premiums are expected to increase in 2025. For commercial fleets, that’s a nightmare. But for California-based startup Netradyne, it’s a tailwind.  Netradyne provides fleet owners, including big names like Amazon, with AI-enabled dashcams that collect vehicle data…

GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of national security

President Biden’s detailed executive order relating to cybersecurity is great to see. Biden’s order reflects the importance of cybersecurity at the highest levels – it is an issue of national security and should be treated as such. One of the … (more…) The post GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of…

WordPress Appliance - Powered by TurnKey Linux