Geek-Guy.com

Category: Global Security News

Redwood Materials preps for expansion spree with new R&D center in San Francisco

Redwood Materials has been on an expansion tear in recent years — growth that has extended the lithium-ion battery recycling and materials startup’s footprint well beyond its Carson City, Nevada headquarters as it locked up deals with Toyota, Panasonic, and, GM, started construction on a South Carolina factory, and made an acquisition in Europe. And…

Celona Extending Service to AT&T Customers

Network provider Celona recently announced an expansion of its neutral host solution to millions of AT&T customers. Partnership brings cellular coverage to more customers Celona’s Neutral Host enables organizations to enhance customer experience for cellular subscribers by extending public cellular coverage into environments where cell reception is poor. “Celona Neutral Host represents a significant advancement…

New Relic eAPM provides complete visibility into Kubernetes Workloads, ‘accelerating incident resolution and reducing downtime’ for platform engineers

New method for monitoring Kubernetes simplifies performance tracking with no-code instrumentation, streamlining IT team workflows New Relic is the only platform to enable easy transitions between eAPM and full APM agents without disrupting the UI, dashboards, or alerts  New Relic Intelligent Observability company, has announced eAPM, a new capability for “increasing the productivity of IT…

DMARC Adoption among APAC’s Higher Education Sector

On the heels of our DMARC adoption research in Europe’s higher education sector, we’re taking a look to see how schools in the Asia Pacific region are faring with their email security. The post DMARC Adoption among APAC’s Higher Education Sector appeared first on Security Boulevard.

Khosla’s Keith Rabois leads $11.5M Series A for startup Roam, calls it ‘the future of the housing market’

During the COVID-19 pandemic, mortgage interest rates dropped to historic lows — as low as 2.5%. Fast-forward a few years and rates soared — to highs nearing 8% in 2023, with the national average 30-year fixed mortgage APR as of April 1 still at 6.84%.  The whiplash has left many people seeking to buy homes…

Anthropic launches an AI chatbot plan for colleges and universities

Anthropic announced on Wednesday that it’s launching a new Claude for Education tier, an answer to OpenAI’s ChatGPT Edu plan. The new tier is aimed at higher education, and gives students, faculty, and other staff access to Anthropic’s AI chatbot, Claude, with a few additional capabilities. One piece of Claude for Education is “Learning Mode,”…

Threat-informed defense for operational technology: Moving from information to action

As the threat landscape continues to evolve, critical infrastructure sectors face a growing wave of sophisticated cyber threats. Traditional security strategies that focus solely on indicators of compromise (IoCs) are proving insufficient against the scale and speed of modern cyberattacks. To address today’s challenges, organizations must adopt a threat-informed defense approach—one that shifts the focus…

Parasail says its fleet of on-demand GPUs is larger than Oracle’s entire cloud

Cloud infrastructure is dominated by several large industry players: AWS, Microsoft’s Azure, and Google Cloud. While to some it may look like AI is headed in a similar direction, the founders of Parasail think AI infrastructure will look very different — and are betting their company’s fate on it. Parasail works with dozens of providers to…

Patreon signs podcast partnerships with Sony and Wondery

Patreon, a subscription platform for online creators, is ge has signed podcasting partnerships with Sony Music Entertainment and Amazon’s Wondery, the company announced on Wednesday. Patreon says the partnerships are designed to make the site a home to fan engagement and exclusive perks for shows from major podcast networks, as the company looks to expand…

Roblox enables parents to block experiences and friends

Roblox, the popular gaming platform geared toward preteens, has made substantial updates to its safety policy in the last year following accusations of insufficient safety measures for children, which could expose them to risks like grooming, explicit content, and violent material.  The company announced Wednesday three new parental control features, including the option for them…

Independent tests show why orgs should use third-party cloud security services

Businesses don’t always get what they pay for in cybersecurity. Some of the most expensive cloud network firewall vendors are among the worst performers against exploits and evasions, according to the most comprehensive, independent testing CyberRatings.org has conducted to date. Cisco, by far the most expensive cloud network firewall offering across the top 10 vendors…

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run that could have allowed a malicious actor to access container images and even inject malicious code. “The vulnerability could have allowed such an identity to abuse its Google Cloud Run revision edit permissions in order to pull…

Hacker stiehlt Kundendaten von Samsung Deutschland

Samsung Deutschland ist von einem Datenleck betroffen. Samsung Deutschland Bei Samsung Deutschland hat es offenbar ein massives Datenleck gegeben. Etwa 270.000 Kundendatensätze von Samsung Electronics Deutschland werden derzeit in einem Darknet-Forum angeboten. Ein krimineller Hacker mit dem Pseudonym „GHNA“ will diese Daten kürzlich aus dem Support-System von Samsung kopiert haben. Dem Darknet-Post zufolge enthalten die…

Microsoft’s AI tool catches critical GRUB2, U-boot bootloader flaws

Microsoft’s Threat Intelligence team has leveraged its AI-driven Security Copilot tool to identify 20 critical vulnerabilities in widely used open-source bootloaders — GRUB2, U-Boot, and Barebox. These bootloaders are crucial for initializing operating systems, particularly in Linux-based environments and embedded systems. The newly discovered flaws affect systems utilizing Unified Extensible Firmware Interface (UEFI) Secure Boot,…

AI crawlers cause Wikimedia Commons bandwidth demands to surge 50%

The Wikimedia Foundation, the umbrella organization of Wikipedia and a dozen or so other crowdsourced knowledge projects, said on Wednesday that bandwidth consumption for multimedia downloads from Wikimedia Commons has surged by 50% since January 2024. The reason, the outfit wrote in a blog post Tuesday, isn’t due to growing demand from knowledge-thirsty humans, but…

Tesla records worst deliveries in two years amid Elon Musk backlash

Tesla recorded 336,681 deliveries, its worst quarterly performance in more than two years as the brand suffers a backlash to CEO Elon Musk’s political maneuverings. The dip in sales comes as Musk continues leading DOGE, the “advisory body” that has laid off thousands of federal employees and attempted to eliminate entire agencies and programs. His…

Google fixes GCP flaw that could expose sensitive container images

A critical privilege escalation vulnerability, ImageRunner, affecting Google Cloud was promptly fixed before it could allow attackers to access sensitive information from GCP deployments. The issue, as discovered by the cybersecurity company Tenable, could have enabled an attacker to bypass permissions and obtain unauthorized access to container images. “This is possible because Cloud Run pulls…

M&A Roundup: March Merger Madness

Throughout March, organizations in the channel have expanded their service offerings by merging with or acquiring another company, continuing the trend of reshaping innovations in AI, cybersecurity, networking, and more. This month brings several acquisitions from major players in the channel and the broader IT ecosystem. Google’s road to acquiring Wiz IT, cloud, and search…

Unhealthy Cybersecurity Postures

Updates from Enzoic’s Threat Research Team In the last Enzoic research update, we briefly discussed the travails of the healthcare industry and their challenges in establishing a successful cybersecurity posture in the face of a salivating cadre of identity thieves and ransomware operators. In the intervening few weeks, more analyses have been published, including the…

How proactive medical device management protects patients and strengthens healthcare systems

GUEST OPINION: Medical devices, ranging from simple monitors to advanced life-support systems, are now part of an interconnected healthcare network. These connected medical devices share data and help clinicians to make faster, more informed decisions. While healthcare organisations in Australia and New Zealand (ANZ) are adopting connected medical devices at varying speeds, both countries face…

SolarWinds Debuts Next-Gen Solutions, IT Operation Resiliency

Observability and IT management vendor SolarWinds recently announced new next-generation solutions to assist enterprises with IT operational resilience. These new enhanced solutions integrate expanded capabilities across observability, incident response, service management, and AI-powered automation to help IT teams navigate hybrid environments, accelerate issue resolution, and ensure business continuity in a complex hybrid IT landscape. “Learning…

CVEs lose relevance: Get proactive — and think beyond vulnerabilities

Application security (AppSec) would not have existed for the past 25 years without the Common Vulnerabilities and Exposures (CVEs), the numbering system used for identifying discovered vulnerabilities in software. After the creation and adoption of the system in 1999, major companies such as Microsoft quickly began contributing CVE discoveries, using the Common Vulnerability Scoring System…

Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers

Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance with industry regulations. The National Institute of Standards and Technology (NIST) offers a comprehensive set of frameworks that provide a clear path to achieving robust cybersecurity practices. For service providers, adhering to NIST

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH servers with weak credentials. “Outlaw is a Linux malware that relies on SSH brute-force attacks, cryptocurrency mining, and worm-like propagation to infect and maintain control over systems,” Elastic Security Labs said in a new analysis

How SSL Misconfigurations Impact Your Attack Surface

When assessing an organization’s external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their widespread use, configuration complexity, and visibility to attackers as well as users make them more likely to be exploited.  This highlights how important your SSL configurations are in maintaining your web application security and

Malicious actors increasingly put privileged identity access to work across attack chains

Abuse of legitimate privileged access is on the rise, accounting for the majority of security breaches last year, with stolen user identities being leveraged by malicious actors across various parts of the attack chain. More effective and more challenging to detect, the breaches, including ransomware extortions, were achieved by stealing various types of identifiers, including…

Oracle Health warnt vor Datenleck

width=”2432″ height=”1368″ sizes=”(max-width: 2432px) 100vw, 2432px”>Hacker haben sich Zugriff auf Daten von Oracle Health verschafft. Pincasso – shutterstock.com Während Oracle den Datenverstoß, der in der vergangenen Woche ans Licht kam, öffentlich abstreitet, informierte die Tochtergesellschaft Oracle Health kürzlich betroffene Kunden über ein Datenleck. Betroffen waren Daten von alten Datenmigrations-Server von Cerner, wie aus einem Bericht…

LogicMonitor Celebrates Early FedRAMP Milestone

LogicMonitor has become the latest vendor to announce a new categorization in the FedRAMP authorization system. The company is now labeled “In Process,” which reflects that it is actively working towards full authorization. FedRAMP progress signals growth in government business The FedRAMP authorization program is run by the Department of Homeland Security’s Cybersecurity and Infrastructure…

Sophos Releases 2025 Active Adversary Report, ID’s Top Risks

Sophos recently released the findings of its annual report detailing various learnings and insights from its internal research. The report details attacker behavior and techniques from over 400 MDR and IR cases in 2024. Research shows organizations are detecting attacks faster, but threats remain complex The report found that the primary way attackers gained initial…

Exploited: Critical Unauthenticated Access Vulnerability in CrushFTP (CVE-2025-2825)

In the ever-evolving landscape of web application vulnerabilities, a new critical flaw has emerged. CVE-2025-2825 is a high-severity vulnerability that allows attackers to bypass authentication on CrushFTP servers. This popular enterprise file transfer solution is often used in corporate environments to manage sensitive data, making this vulnerability particularly concerning. Attackers are actively exploiting this flaw……

Top Data Breaches of March 2025

Cyber threats continue to challenge organizations in 2025, and March saw its share of major breaches. From cloud providers to universities, sensitive data was exposed, raising concerns about security gaps… The post Top Data Breaches of March 2025 appeared first on Strobes Security. The post Top Data Breaches of March 2025 appeared first on Security…

10 best practices for vulnerability management according to CISOs

It was 2003, and I was giving my first cybersecurity presentation at an industry conference in Chicago. I talked about the onslaught of worms and viruses at the time (MSBlast, SQLSlammer, etc.), and stressed the importance of strong vulnerability and patch management to the audience. When it came time for the Q&A, an audience member…

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems. “Hijack Loader released a new module that implements call stack spoofing to hide the origin of function calls (e.g., API and system calls),” Zscaler ThreatLabz researcher Muhammed Irfan…

Das gehört in Ihr Security-Toolset

Lesen Sie, welche Werkzeuge essenziell sind, um Unternehmen gegen Cybergefahren abzusichern. Gorodenkoff | shutterstock.com Sicherheitsentscheider sind mit einer sich kontinuierlich verändernden Bedrohungslandschaft, einem zunehmend strengeren, regulatorischen Umfeld und immer komplexeren IT-Infrastrukturen konfrontiert. Auch deshalb wird die Qualität ihrer Sicherheits-Toolsets immer wichtiger. Das Problem ist nur, dass die Bandbreite der heute verfügbaren Cybersecurity-Lösungen überwältigend ist. Für…

HYPR and IDEMIA Partner to Extend Smart ID Badge Security

Unlock Seamless Security: Combining Physical and Digital Access with HYPR and IDEMIA Your organization spans a physical and a virtual environment, but how well aligned are your strategies for securing both? With the rise of hybrid work models, the challenge of securing sensitive information against increasingly sophisticated online and in-person threats has become more critical…

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity

Witnesses at a House hearing on medical device cybersecurity Tuesday called out the need for more proactive tracking of products used across the country, saying the status quo leaves many health system owners and operators in the dark about vulnerabilities, exploitation and patching updates. Testifying before the House Energy and Commerce Subcommittee on Oversight and…

Google adds end-to-end email encryption to Gmail

Google has introduced a new end-to-end encryption (E2EE) feature in Gmail, enabling organizations to send encrypted emails that even Google cannot read to other Gmail users. Later this year, the feature will be expanded to allow the sending of encrypted emails to any email users, including those from other providers. E2EE differs from encrypting email…

Is Your Secrets Management Foolproof?

Are You Maximizing Your Secrets Management Strategy? Where technological advancements are rapidly reshaping business, cybersecurity is emerging as a crucial cornerstone of a successful organization. Are you leveraging robust secrets management to safeguard your organization, or are you leaving gaps that leave your sensitive data vulnerable? A Deep Dive Into Non-Human Identities (NHIs) and Secrets…

Scaling Your Identity Management Securely

Can Your Cybersecurity Keep Pace with Growth? When organizations scale, it’s not just revenues and team sizes that grow. The complexity and potential vulnerabilities of a company’s digital also multiply. Hence, a critical question arises: Can your cybersecurity strategy scale with your organization, particularly around identity management? Scalable identity management is a pivotal aspect of…

Can You Confidently Handle NHI Threats?

Can You Confidently Handle NHI Threats? Why do breaches persist despite the increased attention and budget allocated to cybersecurity? I have noticed a recurring issue – organizations are underestimating the importance of Non-Human Identities (NHIs) in their security frameworks. How can you confidently manage NHI threats and ensure that your security strategy is comprehensive and…

Driving Innovation with Robust NHIDR Strategies

Are You Incorporating Robust NHIDR Strategies into Your Cybersecurity Approach? This evolutionary process, has spurred an exponential increase in cybersecurity risks. When businesses across multidisciplinary sectors increasingly migrate to the cloud, managing Non-Human Identities (NHIs) and their associated secrets has emerged as a critical approach. Understanding Non-Human Identities and Their Role in Cybersecurity NHIs, or…

Researchers suggest OpenAI trained AI models on paywalled O’Reilly books

OpenAI has been accused by many parties of training its AI on copyrighted content sans permission. Now a new paper by an AI watchdog organization makes the serious accusation that the company increasingly relied on non-public books it didn’t license to train more sophisticated AI models. AI models are essentially complex prediction engines. Trained on…

CaaStle board confirms financial distress, furloughing employees

CaaStle, a startup that launched in 2011 as a plus-sized clothing subscription service and later became an inventory monetization platform for clothing retailers, is facing financial difficulties, the company confirmed to TechCrunch following a report by Axios. Citing a letter from the board, Axios reported that the company is almost out of money, CEO Christine…

Apple issues fixes for vulnerabilities in both old and new OS versions

Apple released security updates Monday to address software defects in the latest version of the company’s Safari browser and other applications across iOS, iPadOS and macOS.  The security issues addressed across the latest versions of Apple’s most popular platforms include 62 vulnerabilities affecting iOS 18.4 and iPadOS 18.4, 131 vulnerabilities affecting macOS Sequoia 15.4 and…

Atera US GM: Agentic AI Fueling Task Automation, MSP Success

IT management platform vendor Atera has spent the past three years collaborating with AI providers, including OpenAI, to develop practical solutions for MSPs and internal IT teams seeking to automate mundane and repetitive tasks. US General Manager Yoav Susz discusses how Atera’s partners and end users have influenced the company’s success in the market with…

WordPress Appliance - Powered by TurnKey Linux