Geek-Guy.com

Category: Global Security News

Lessons learned about cyber resilience from a visit to Ukraine

During a visit to the recent Kyiv International Cyber Resilience Forum 2025 in Ukraine, I encountered a recurring theme across a plethora of speakers: always be flexible and keep your options open and active. The context for these discussions was drawn from both the kinetic and cyber wars being fought in Ukraine against the invading…

Is HR running your employee security training? Here’s why that’s not always the best idea

In today’s fast-changing threat landscape, relying solely on human resources to deliver employee security training can leave an enterprise vulnerable. While HR excels at organizing and overseeing internal compliance, IT and security teams bring the specialized knowledge needed to address various threats, such as phishing, data breaches, and social engineering. By working together, these departments…

9 unverzichtbare Open Source Security Tools

Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.com Cybersicherheitsexperten verlassen sich in diversen Bereichen auf Open-Source-Lösungen – nicht zuletzt weil diese im Regelfall von einer lebendigen und nutzwertigen Community gestützt werden. Aber auch weil es inzwischen Hunderte qualitativ hochwertiger, quelloffener Optionen gibt, um Breaches und Datenlecks auf allen Ebenen…

Patch Tuesday, April 2025 Edition

Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that is already being exploited in the wild. Eleven of those flaws earned Microsoft’s most-dire “critical” rating, meaning malware or malcontents could exploit them with little to no interaction from Windows users. The zero-day…

OCC email system breach described as ‘stunning, serious’

A cyber intrusion at the US Office of the Comptroller of the Currency (OCC) is “massively serious” and comes at a time when “the good work done to improve cybersecurity in the US is under extraordinary pressure,” a security analyst said Tuesday. David Shipley, head of Canadian security awareness training provider Beauceron Security, was responding…

April Patch Tuesday news: Windows zero day being exploited, ‘big vulnerability’ in 2 SAP apps

A threat actor is exploiting a zero-day elevation of privileges vulnerability in the Windows Common Log File System to deploy ransomware, one of a number of critical holes Microsoft plugged today as part of its April Patch Tuesday releases. “The targets include organizations in the information technology (IT) and real estate sectors of the United…

The AI Fix #45: The Turing test falls to GPT-4.5

In episode 45 of The AI Fix, our hosts discover that ChatGPT is running the world, Mark learns that mattress companies have scientists, Gen Z has nightmares about AI, OpenAI gets a bag, Graham eats too many cheese sandwiches, and too much training makes AIs over-sensitive. Mark reveals why he’s got beef with cows, GPT-4.5…

Nerdio Co-founders on Growth, Channel Strategy, and NMM V6

From the stage at NerdioCon in Palm Springs, Nerdio co-founder and CEO Vadim  Vladimirskiy took MSP and enterprise customers through various tooling announcements, all aimed at driving complete Microsoft ecosystem adoption. We spoke with fellow co-founder and CRO Joseph Landes after the keynote address to learn more about Nerdio’s approach to the channel, why the…

Microsoft patches zero-day actively exploited in string of ransomware attacks

Microsoft addressed 126 vulnerabilities affecting its systems and core products, including a zero-day in the Windows Common Log File System (CLFS) that’s been actively exploited in a series of ransomware attacks, the company said in its latest security update Tuesday. A group Microsoft tracks as Storm-2460 has exploited CVE-2025-29824 to initiate ransomware attacks “against a…

Forcepoint Acquires Getvisibility, Adds to AI & Data Security

Data security provider Forcepoint recently announced its acquisition of Getvisibility, an AI-powered Data Security Posture Management (DSPM) and Data Detection and Response (DDR) platform. Deal expands full-lifecycle security play This acquisition will expand Forcepoint’s delivery of full-lifecycle security across hybrid environments, cloud platforms, and GenAI ecosystems from discovery and classification to real-time risk mitigation. “Data…

How Protected Are Your Cloud-Based Secrets?

Are Your Cloud-Based Secrets Truly Safe? Have you ever questioned the security of your cloud secrets? Whether it’s encrypted passwords, tokens, or keys, these secret identifiers hold immense value. Safeguarding them is absolutely crucial, and that brings us to the strategic importance of Non-Human Identity (NHI) management. A Closer Look at Non-Human Identities And Their…

Are Your NHIs Truly Secure in the Cloud?

Is Your Organization Recognizing the Importance of NHI Security? The intricacies of cybersecurity have only just begun to unveil their complexity. Have you ever paused to ponder the security of your non-human identities (NHIs) within your cloud? NHIs, an often overlooked component of cybersecurity, influence a major role in protecting sensitive data and reducing broad-spectrum…

The Renaissance of NTLM Relay Attacks: Everything You Need to Know

NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and arguably worse than ever before. Relay attacks are the easiest way to compromise domain-joined hosts nowadays, paving a path for…

Tech experts recommend full steam ahead on US export controls for AI

Technology experts pressed Congress to maintain export controls on semiconductor chips and other technologies, telling lawmakers Tuesday that the restrictions are among the most effective strategies to slow China and other rival countries in the AI race, thereby helping U.S. companies hold a competitive edge. Placing export controls on these technologies is not new: both…

Privacy fights over expiring surveillance law loom after House hearing

Lawmakers on the House Judiciary Committee say privacy protections under a bill Congress passed to re-up a major surveillance law aren’t strong enough, and are gearing up for additional changes for when the legislation is set to expire next year. Legislative battles over Section 702 of the Foreign Intelligence Surveillance Act (FISA) — under which…

Deep Cogito emerges from stealth with hybrid AI ‘reasoning’ models

A new company, Deep Cogito, has emerged from stealth with a family of openly available AI models that can be switched between “reasoning” and non-reasoning modes. Reasoning models like OpenAI’s o1 have shown great promise in domains like math and physics, thanks to their ability to effectively fact-check themselves by working through complex problems step…

Inside the EV startup secretly backed by Jeff Bezos

Jeff Bezos is funding a secretive EV startup based in Michigan called Slate Auto that could start production as soon as next year, according to multiple sources and documents that link the billionaire’s family office to the startup. Slate, which took root in another Bezos-connected company called Re:Build Manufacturing, has been operating quietly since its…

BSidesLV24 – Breaking Ground – JIT Happens: How Instacart Uses AI to Keep Doors Open and Risks Closed

Authors/Presenters: Dominic Zanardi, Matthew Sullivan Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Breaking Ground – JIT Happens: How Instacart Uses AI to Keep Doors…

At last, MrBeast weighs in on the global economic crisis du jour

Your 401k is suffering. The billionaires are fighting. The gamers are imperiled. Not even the penguins on McDonald Island, where no humans reside, have been spared. But at long last, 26-year-old YouTuber and chocolatier MrBeast has weighed in on President Donald Trump’s controversial plan to impose sweeping tariffs on imports. Jokes aside, the prolific YouTuber…

Microsoft’s April 2025 Patch Tuesday Addresses 121 CVEs (CVE-2025-29824)

11Critical 110Important 0Moderate 0Low Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild. Microsoft patched 121 CVEs in its April 2025 Patch Tuesday release, with 11 rated critical and 110 rated as important. This month’s update includes patches for: ASP.NET Core Active Directory Domain Services Azure Local Azure Local Cluster Azure…

The Future of Security Lies in Prevention, Not Reaction

In Australia’s rapidly evolving landscape, artificial intelligence (AI) remains a double-edged sword: while it transforms businesses by automating tasks and fuelling innovation, concerns over data management and security continue to grow. According to a global report by McKinsey, AI cybersecurity risks are among the top concerns for employees and leaders. With data increasingly flowing across…

Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw

Fortinet has released security updates to address a critical security flaw impacting FortiSwitch that could permit an attacker to make unauthorized password changes. The vulnerability, tracked as CVE-2024-48887, carries a CVSS score of 9.3 out of a maximum of 10.0. “An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker…

AI-Powered Phishing Kits: The New Frontier in Social Engineering

As artificial intelligence continues to transform how we do business, cybercriminals are finding equally innovative ways to weaponize it. Over the past few weeks, security researchers from Intel 471 and Proofpoint have uncovered a disturbing trend: AI-powered phishing kits are now being sold openly on Telegram, many of them boasting integrations with ChatGPT-style language models…

Does Colossal Biosciences’ dire wolf creation justify its $10B+ valuation?

On Monday, the “de-extinction” startup Colossal Biosciences announced its most ambitious results to date: the dire wolf. These are creatures that have been extinct for more than 12,000 years made famous by the HBO show Game of Thrones. These white, fluffy animals live on a 2,000-acre preserve in a location so secretive that journalists, including…

Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal

Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager (SSM) Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges,

A nonprofit is using AI agents to raise money for charity

Tech giants like Microsoft might be touting AI “agents” as profit-boosting tools for corporations, but a nonprofit is trying to prove that agents can be a force for good, too. Sage Future, a 501(c)(3) backed by Open Philanthropy, launched an experiment earlier this month tasking four AI models in a virtual environment with raising money…

Tapestry’s app can now de-dupe your social feeds

Tapestry, a new app designed to organize the open social web, is adding a valuable feature to help people who are keeping up with multiple social networks: It will now remove duplicate posts from your feed. That means if you follow the same person across social networking services like Bluesky and Mastodon, you won’t have…

When Good Tools Go Bad: Dual-Use in Cybersecurity

In the ever-evolving world of cybersecurity, certain tools and techniques possess a fascinating duality. They’re designed to protect our digital lives, yet they can also be wielded by malicious actors to carry out cyberattacks. These are known as “dual-use” techniques and understanding them is crucial for anyone involved in cybersecurity. What Exactly Are Dual-Use Techniques?…

Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings

Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. “One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins copied from a

Amazon’s Zoox begins robotaxi testing in Los Angeles 

Zoox, Amazon’s autonomous vehicle unit, is deploying a small fleet of retrofitted test vehicles on the streets of Los Angeles starting Tuesday – a modest, yet meaningful step as the company inches toward offering public rides in Las Vegas and San Francisco later this year.  The data-collection effort marks Zoox’s entrance into its sixth city…

Take the stage at TechCrunch Disrupt 2025: Apply to speak now

If you’re reading this, consider it your signal: the opportunity to influence the future of tech is here. TechCrunch Disrupt 2025 is now accepting speaker applications. Join us on stage this October 27–29 at Moscone West in San Francisco and share your ideas with 10,000+ tech leaders, VCs, and innovators shaping what’s next. Apply to…

Founders, TechCrunch Startup Battlefield 200 is calling! Apply to enter!

Founders, the battlefield is calling! Startup Battlefield 200 applications are now live — and the race has begun. If you’ve got a groundbreaking idea and the guts to pitch it to the world, TechCrunch Disrupt 2025 is your arena. You’ll face elite VC judges. You’ll compete against 199 of the world’s most promising startups. And…

Los Angeles-based Rain raised a $75M Series B in another good sign for fintech

Rain, a startup offering employer-integrated earned wage access (EWA) app coupled with financial-wellness features like overdraft alerts and spending trends, has raised $75 million in an all-equity Series B round. The round was led by Prosus at a post-money valuation of $340 million. Rain plans to use the new funds to help it add credit…

Cloud costs and tariffs: exploring on-premises alternatives for greater stability

Public cloud storage has become a strategic priority for Australian businesses, driven by its scalability and cost-efficiency. According to Gartner, Australian enterprises are projected to spend AUD 26.5 billion on public cloud services in 2025, reflecting a 20.5% year-over-year increase. However, as reliance on global cloud infrastructure grows, many organisations have yet to consider the…

Volunteer your time for a free ticket to TechCrunch Sessions: AI

Join us for an unforgettable opportunity at TechCrunch Sessions: AI, happening at UC Berkeley’s Zellerbach Hall on June 5! We’re on the lookout for enthusiastic volunteers to be part of this exciting event. If you’ve ever wondered what goes into the making of tech gatherings, now’s your chance to find out firsthand. Apply here by…

Dell Reveals Set of Innovations for AI-Ready Data Centers

Recently, Dell Technologies announced the introduction of innovations to assist customers in accelerating their data center modernization and embracing the AI revolution. As IT teams move towards disaggregated infrastructure that abstracts compute, storage, and networking into shared resource pools to deliver improved scalability, efficiency, and adaptability, these new innovations are meant to help customers rethink…

Waymo may use interior camera data to train generative AI models, but riders will be able to opt out

Waymo is preparing to use data from its robotaxis, including video from interior cameras tied to rider identities, to train generative AI models, according to an unreleased version of its privacy policy found by researcher Jane Manchun Wong, raising fresh questions about how much of a rider’s behavior inside autonomous vehicles could be repurposed for…

Meet the new Audience Choice winners to lead breakouts at TechCrunch Sessions: AI

You voted. They rose to the top! Meet the two Audience Choice winners who’ll take the breakout stage at TechCrunch Sessions: AI on June 5 in Zellerbach Hall at UC Berkeley to share their insights with 1,200 AI leaders and enthusiasts.  We sifted through hundreds of Call for Content submissions and narrowed them down to…

How to empower contact centre agents to drive performance

GUEST OPINION: Agent engagement and performance are key drivers of success in modern contact centres. Customer expectations have risen alongside the demand for frictionless, efficient service across multiple digital channels. This shift has placed agents at the forefront of customer experience (CX), making their role more critical than ever. The future of Australian contact centres…

Google Cloud Recognises Rubrik as a Partner of the Year

COMPANY NEWS:  As a testament to the company’s ongoing commitment to cybersecurity, Rubrik (NYSE: RBRK) today announced its recognition as a 2025 Google Cloud Infrastructure Modernisation Partner of the Year for Backup and Disaster Recovery. The company has been recognised for its achievements in delivering cyber resilience and recovery capabilities for joint customers in the…

BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

COMPANY NEWS: Company recognised for aggressive technical innovation and advanced features that focus on a platform solution, offering broad functionality and use case support Report highlights BeyondTrust’s strengths in securing cloud environments by enforcing least privilege access, identifying identity-based risks, and mitigating misconfigurations

Mira Murati’s AI startup gains prominent ex-OpenAI advisors

Ex-OpenAI CTO Mira Murati’s new AI venture, Thinking Machines Lab, has gained two new prominent advisors: Bob McGrew, previously OpenAI’s chief research officer, and Alec Radford, a former OpenAI researcher behind many of the company’s more transformative innovations. Thinking Machines Lab’s website was quietly updated with McGrew and Radford’s names sometime in March. A spokesperson…

Amazon unveils a new AI voice model, Nova Sonic

On Tuesday, Amazon debuted a new generative AI model, Nova Sonic, capable of natively processing voice and generating natural-sounding speech. Amazon claims that Sonic’s performance is competitive with frontier voice models from OpenAI and Google on benchmarks measuring speed, speech recognition, and conversational quality. Nova Sonic is Amazon’s answer to newer AI voice models such…

Snapchat rolls out Sponsored AI Lenses for brands

Snapchat is introducing Sponsored AI Lenses, a new ad format that lets brands engage with consumers in an immersive way. While Snapchat has offered brands the opportunity to pay for sponsored lenses on the platform for years, now they can leverage AI-generated experiences powered by Snap’s proprietary generative AI technology. With these interactive lenses, brands…

Ransomware-Attacke auf Europcar

Europcar hat einen Cyberangriff mit Datendiebstahl erlitten. josera – shutterstock.com Im Darknet sind kürzlich Hinweise auf einen Cyberangriff bei Europcar aufgetaucht, bei dem Kundendaten und andere vertrauliche Informationen entwendet wurden. Wie aus einem Bericht von Bleeping Computer hervorgeht, ist der Angreifer in die Gitlab-Repositories des Fahrzeugvermieters eingedrungen und hat Daten von 200.000 Kunden und den…

Blackbird gobbles up $50M for its blockchain-based payment-loyalty app for restaurants

A founder who has carved out a name for himself building products to help restaurants connect better with would-be diners has raised $50 million for his latest startup: a new take on the idea of customer loyalty.  Blackbird Labs has built a payments-meets-loyalty-meets-blockchain platform for restaurants to grow repeat business while reducing some of the…

The race to secure the AI/ML supply chain is on — get out front

The explosive growth in the use of generative artificial intelligence (gen AI) has overwhelmed enterprise IT teams. To keep up with the demand for new AI-based features in software — and to deliver software faster in general — development teams have embraced machine learning-based AI coding tools. The post The race to secure the AI/ML…

Sizl raises $3.5M to expand its cook-to-order food delivery service

Dark kitchens– also referred to as ghost kitchens, cloud kitchens, or virtual kitchens– often receive criticism for their food quality. Sizl, a cook-to-order delivery service based in Chicago, seeks to change this perception by delivering meals made with fresh ingredients in around 30 minutes flat. The company announced its recent $3.5 million seed round on…

Chinese ToddyCat abuses ESET antivirus bug for malicious activities

China-backed APT group ToddyCat has been found exploiting a medium-severity vulnerability in ESET antivirus software to sneak malicious code onto vulnerable systems. Tracked as CVE-2024-11859, the flaw is a dynamic link library (DLL) search order hijacking vulnerability discovered and reported by Kaspersky last year, with a fix issued by ESET in January. “On systems with…

Arguing Against CALEA

At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while the legally-mandated CALEA capability requirements have changed little over the last three decades, the infrastructure that…

Agentic AI in the SOC – Dawn of Autonomous Alert Triage

Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many

UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with information-stealing malware. The activity is aimed at military formations, law enforcement agencies, and local self-government bodies, particularly those located near Ukraine’s eastern border, the agency said. The attacks involve distributing phishing emails

Meta introduces restricted Teen Accounts to Facebook and Messenger

Meta is introducing Teen Accounts to Facebook and Messenger. The feature, which automatically enrolls young users into an app experience with built-in protections, will be available on these platforms in the U.S., U.K., Australia, and Canada before expanding to additional regions in the future. Teen Accounts first rolled out to Instagram last September after Instagram…

Meta introduces restricted Teen Accounts to Facebook and Messenger

Meta is introducing Teen Accounts to Facebook and Messenger. The feature, which automatically enrolls young users into an app experience with built-in protections, will be available on these platforms in the U.S., U.K., Australia, and Canada before expanding to additional regions in the future. Teen Accounts first rolled out to Instagram last September after Instagram…

WordPress Appliance - Powered by TurnKey Linux