Geek-Guy.com

Category: Global Security News

Edge device vulnerabilities fueled attack sprees in 2024

Edge devices harboring zero-day and n-day vulnerabilities were linked to the most consequential attack campaigns last year, Darktrace said in an annual threat report released Wednesday. Darktrace’s threat researchers found the most frequent vulnerability exploits in customers’ instances of Ivanti Connect Secure and Ivanti Policy Secure appliances, along with firewall products from Fortinet and Palo…

Guidde taps AI to help create software training videos

Creating corporate training videos for software is a time-consuming ordeal, especially if you’re an organization with a lot of software licenses. Training videos can help get employees up to speed, but they’re a big lift. They often take entire teams to produce. Tel Aviv-based entrepreneur Yoav Einav thought there might be an alternative, cheaper way…

Sustainable Cutting Solutions: How Techni Waterjet is Leading the Industry with Eco-Friendly Waterjet Technology

Waterjet cutting has revolutionized modern manufacturing, offering precision and versatility in cutting various materials. Unlike traditional cutting methods, which often generate excessive heat and waste, waterjet cutting provides a cleaner, more efficient alternative. As industries move toward sustainable practices, the demand for eco-friendly cutting solutions has surged.

Hackers gain root access to Palo Alto firewalls through chained bugs

A high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS software, patched last week, is now being actively exploited by threat actors to gain root-level access to affected firewall systems. Tracked as CVE-2025-0108, the vulnerability allows an unauthenticated attacker with network access to the PAN-OS management web interface to bypass authentication requirements. The flaw received…

Boomi Unveils Comprehensive API Management to Combat API Sprawl and Power Agentic AI

Boomi, the intelligent integration and automation leader, unveiled its comprehensive API Management (APIM) solution, delivering cloud-scale APIM alongside market-leading integration and automation, data management, and AI capabilities as part of the Boomi Enterprise Platform. Comprised of Boomi’s existing API Management offering along with assets recently acquired from both Cloud Software Group and APIIDA, Boomi API…

Java security: If you ain’t cheatin,’ you ain’t tryin’

Most industries have rules of engagement. In sports, there are referees. In business, there are regulations. In government, there are Robert’s Rules of Order. Cybersecurity is different. There are regulations, but they don’t limit how much we can defend ourselves. They focus on compliance, breach reporting, and risk management, not on dictating the strategies we…

X doubles its Premium+ plan prices after xAI releases Grok 3

Hours after Elon Musk’s AI company xAI released the latest version of its AI model, Grok 3, X has significantly hiked the price for its top Premium+ subscription plan, which gives users access to the latest model, to almost $50 per month. On the support page that lists X’s premium plans, the monthly subscription price…

The Ultimate MSP Guide to Structuring and Selling vCISO Services

The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to offer virtual Chief Information Security Officer (vCISO) services—delivering high-level cybersecurity leadership without the cost of a full-time hire. However, transitioning to vCISO services is not without its challenges

Kuda and CEO face allegations of sex discrimination and unfair dismissal from former executive, per filing

An employment tribunal case has placed Kuda Technologies, one of Africa’s fastest-growing digital banks, under scrutiny over allegations of workplace discrimination, harassment, and wrongful dismissal. Rosemary Hewat, Kuda’s former Group Chief People Officer (CPO), filed a complaint accusing the company and its CEO, Babatunde Ogundeyi, of sex discrimination, victimization, and unfair dismissal. According to the…

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

Users who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts. The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month. Targets of…

Mehrheit der Deutschen fürchtet sich vor Cyberangriffen

Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen. Andrea Danti – Shutterstock.com Eine deutliche Mehrheit der Menschen in Deutschland hat Angst vor Cyberangriffen oder gar einem Cyberkrieg. Bei einer repräsentativen Umfrage des Digitalverbandes Bitkom sagten 61 Prozent, dass sie Cyberangriffe durch Staaten befürchten, mit denen Infrastruktur, öffentliche Einrichtungen oder Unternehmen gezielt gestört,…

Think being CISO of a cybersecurity vendor is easy? Think again

When people in this industry hear that a CISO is working at a cybersecurity vendor, it can trigger a number of assumptions — many of them misguided. There’s a stereotype that the role isn’t “real” CISO work, that it’s more akin to being a field CISO, someone primarily outward-facing and focused on supporting sales or…

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below – CVE-2025-0108 (CVSS score: 7.8) – An authentication bypass vulnerability in the Palo Alto…

Customer Identity & Access Management: Die besten CIAM-Tools

Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) bildet eine Unterkategorie von Identity & Access Management (IAM). CIAM wird dazu eingesetzt, die Authentifizierungs- und Autorisierungsprozesse von Applikationen zu managen, die öffentlich zugänglich sind, beziehungsweise von Kunden bedient werden.…

Hidden Dangers of Security Threats in the Tide of DeepSeek

Recently, DeepSeek attracted global attention and triggered worldwide discussion with its advanced AI models. Meanwhile, it has become the target of hackers and suffered frequent attacks. However, with the continuous improvement of AI large model capabilities, frequent security incidents and increasing risks expose users to greater threats. This post will use the NSFOCUS Large Model…

OpenSSH fixes two flaws that enable a man-in-the-middle attack and denial of service

OpenSSH, the most widely used tool for remotely managing Linux and BSD systems, received patches for two vulnerabilities. One of the flaws could allow attackers to perform a man-in-the-middle attack against OpenSSH clients with a certain configuration and impersonate a server to intercept sensitive communications. While the second vulnerability can lead to CPU resource exhaustion.…

Launch of Progress Data Cloud Creates Platform to Accelerate AI Strategies and Digital Transformation

New offering empowers enterprises to simplify data operations and enhance AI capabilities in the cloud COMPANY NEWS: Progress (Nasdaq: PRGS), the trusted provider of AI-powered digital experiences and infrastructure software provider has announced the launch of Progress® Data Cloud℠, a managed Data Platform as a Service designed to simplify enterprise data and artificial intelligence (AI)…

Google Play Books purchases on iOS now skirt the App Store’s commission

Google has gained permission to sell its e-books and audiobooks directly to customers through its iOS app, Google Play Books. While iOS apps today can offer access to content previously purchased elsewhere, like e-books bought via a website, developers have to request a specific exception to link their iOS app’s users to the company’s own…

Apple purges apps without contact info from EU app store, as DSA deadline hits

A change requiring app developers to disclose their address, phone number, and email information to consumers has gone live on the App Store within the European Union. Apple on Tuesday announced it has removed any EU apps that haven’t yet complied with the Digital Services Act (DSA), a regulation that had added a requirement in…

Safe Superintelligence, Ilya Sutskever’s AI startup, is reportedly close to raising roughly $1B

Safe Superintelligence, an AI startup founded by former OpenAI chief scientist Ilya Sutskever, could be close to raising more than $1 billion at a $30 billion valuation — a higher valuation than reported just weeks ago. Bloomberg reports that VC firm Greenoaks Capital Partners is leading the deal and pledging to invest half a billion…

How Phished Data Turns into Apple & Google Wallets

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new…

Thinking Machine Labs is ex-OpenAI CTO Mira Murati’s new startup

Former OpenAI CTO Mira Murati has announced her new startup. Unsurprisingly, it’s focused on AI. Called Thinking Machine Labs, the startup, which came out of stealth today, intends to build tooling to “make AI work for [people’s] unique needs and goals,” and to create AI systems that are “more widely understood, customizable, and generally capable”…

Thinking Machines Lab is ex-OpenAI CTO Mira Murati’s new startup

Former OpenAI CTO Mira Murati has announced her new startup. Unsurprisingly, it’s focused on AI. Called Thinking Machines Lab, the startup, which came out of stealth today, intends to build tooling to “make AI work for [people’s] unique needs and goals,” and to create AI systems that are “more widely understood, customizable, and generally capable”…

Fintech fundraising is giving me 2021 flashbacks

Welcome to TechCrunch Fintech!  This week we’re looking at some big valuation jumps, how Stripe is eyeing another shareholder sale, a colorful conversation with an early-stage VC, and more! To get a roundup of TechCrunch’s biggest and most important fintech stories delivered to your inbox every Tuesday at 8:00 a.m. PT, subscribe here. The big…

Fiverr wants gig workers to offload some of their work to AI

Gig marketplace Fiverr wants to let freelancers train AI on their bodies of work and use it to automate future jobs. At an event on Tuesday, Fiverr announced the launch of several new efforts aimed at attracting gig workers to its platform and equipping them with generative AI tools. Perhaps the most ambitious is a…

Facebook now only stores live videos for 30 days, will delete old broadcasts

Facebook announced on Tuesday that live videos will now only be stored on the social network for 30 days, after which they will be deleted. Previously, these videos were stored indefinitely. The change goes into effect on Wednesday. All live videos that are currently older than 30 days will be removed from the platform as…

Video: How To Extend Your MSP Team In One Week With Hirexe

Chris Keith, founder and CEO of Hirexe, joins host Katie Bavoso in this engaging episode of Partner POV to discuss the challenges managed service provider leaders face when trying to fill roles at their businesses – and that struggle is increasing. By 2026, IDC predicts that 90% of businesses worldwide will face an IT skills…

Amazon kills ‘Inspire,’ its TikTok-style feed for discovering products

Amazon is shutting down “Inspire,” its TikTok-like, short-form video and photo feed that was previously available in its mobile app. The feed allowed users to discover products and shop from content created by influencers, brands, and other customers. A company spokesperson confirmed the move to TechCrunch, saying “We regularly evaluate various features to better align…

OpenAI may give board special voting rights to ward off takeover attempts

To fend off future hostile takeover attempts, OpenAI is considering giving its non-profit board special voting rights, according to a new report in the Financial Times. The rights would allow the board to overrule major investors in the company, preserving some of its powers after OpenAI completes its transition to a for-profit. OpenAI was founded…

X challenges German court order granting data access to election researchers

Earlier this month, a Berlin court ordered Elon Musk-owned X to provide immediate access to public platform data to two civil society organizations seeking to study systemic risk around the country’s upcoming election. In a post on X, the social media company said Tuesday it is challenging the order, claiming the summary proceeding “egregiously undermines…

DEF CON 32 – Manufacturing Lessons Learned, Lessons Taught

Authors/Presenters: Tim Chase Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Manufacturing Lessons Learned, Lessons Taught appeared first on Security Boulevard.

AvePoint Launches Next-Gen Platform to Drive MSP Revenue

Data security, governance, and resilience leader AvePoint recently announced the launch of its AvePoint Elements platform to modernize MSPs’ client, cloud, and tenant management. Recurring revenue in security essentials through Elements now available The next generation of AvePoint Elements will equip partners with new security-centric recurring revenue streams through a seamless, all-in-one platform. MSPs can…

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now

Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below – CVE-2025-26465 – The OpenSSH client

Learn & Avoid Social Engineering Scams in 2025

In the past decade, social engineering attacks have become more sophisticated and prevalent than ever. From AI voice impersonation to deepfake video calls, cybercriminals are leveraging the latest technology to make their scams increasingly convincing. Despite growing awareness of these threats, social engineering remains one of the most successful attack methods because it exploits something…

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor’s malicious payload into an external process, waitfor.exe,

The AI Fix #38: AI proves time travel is impossible (but still can’t draw fingers)

In episode 38 of “The AI Fix”, our hosts discover a robot they actually like, Sam Altman teases GPT-5 and trolls Elon Musk, a robot dog grows arms, an AI compliments Graham, Mark worries about “gradual disempowerment”, an octopus pretends to be a glove, and a listener reveals an entirely new reason to worry about…

Fetii’s group rideshare app for young people attracts funding from Mark Cuban, YC

When he was a senior studying at Texas A&M University, Matthew Iommi realized that there were no good options for transporting groups of people. Fellow college students heading out for the night together didn’t have access to on-demand rides with the same convenience, accessibility, and affordability of typical ride-hail platforms, like Uber and Lyft.  “Once…

Ransomware-Banden geben Opfern immer weniger Zeit

width=”2494″ height=”1402″ sizes=”(max-width: 2494px) 100vw, 2494px”> Ransomware-Gruppen haben den Zeitraum bis zur Lösegeldübergabe immer mehr verkürzt. Zephyr_p – shutterstock.com Laut einer Analyse des Managed-Detection-and-Response-Unternehmens Huntress von Ransomware-Vorfällen im vergangenen Jahr beträgt die durchschnittliche Zeit bis zur Lösegeldforderung (TTR) etwa 17 Stunden. Bei einigen Gruppen sind es sogar nur vier bis sechs Stunden. Dieses Tempo steht…

Hightouch raises $80M on a $1.2B valuation for marketing tools powered by AI

Last decade, companies like Segment rewrote the book on how organizations used APIs to merge data from disparate apps to improve marketing strategies. Today, a startup called Hightouch — co-founded by a former engineering manager at Segment — is announcing $80 million in funding for the next chapter: a platform that lets sales, marketing, and…

GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies

Ransomware threats continue evolving, with the most successful groups refining their tactics to maximize impact over the last year. Understanding […] The post GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies appeared first on Security Boulevard.

Lingo.dev is an app localization engine for developers

Monolinguists wanting to communicate with the global masses have never had it so easy. Trusty old Google Translate can convert the content of images, audio, and entire websites across hundreds of languages, while newer tools such as ChatGPT also serve as handy pocket translators. On the back end, DeepL and ElevenLabs have have reached lofty…

Consortium’s Metrics That Matter Deal: A New Era for VARs

Cybersecurity provider Consortium has bought Metrics That Matter, a startup that helps companies measure their cyber risks. The aim is for Consortium to give its customers a clearer and more up-to-date understanding of their cybersecurity vulnerabilities. Even though companies are spending a fortune on cybersecurity – over $200 billion last year, according to the company’s…

WordPress Appliance - Powered by TurnKey Linux