Geek-Guy.com

Category: Global Security News

Fortinet firewalls hit with new zero-day attack, older data leak

GUEST OPINION:   Rapid7 is investigating two separate events affecting Fortinet firewall customers: Zero-day exploitation of CVE-2024-55591, an authentication bypass vulnerability in FortiOS and FortiProxy disclosed earlier this week. Successful exploitation could allow remote attackers to gain super-admin privileges via crafted requests to the Node.js websocket module. A January 15, 2025, dark web post from a threat…

ISPT’s future focused office buildings ‘lead the way’ with 5G indoor mobile connectivity

By Peggy Renders, Chief Customer Officer for Telstra Enterprise: ISPT and Telstra have announced that they are transforming office connectivity with 5G DAS tech, ensuring reliable, high-speed coverage in lifts, carparks, and more – with the first deployment in Sydney’s new Tech Central precinct, Sydney, with other sites on the radar.

Dub.co is an open-source URL shortener and link attribution engine packed into one

In the last few weeks, PayPal-owned Honey, which claims to find you the best coupon codes for a deal, has been at the center of controversy. Allegedly, the tool sneakily earned affiliate money by changing attributes of product links creators posted on their videos. At the center of it, the problem was how affiliate links…

Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?quality=50&strip=all 6178w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Die EU-Kommission will künftig kleine Krankenhausbetreiber finanziell unterstützen, um die Cybersicherheit zu stärken. raker – Shutterstock.com Um die Cybersicherheit im Gesundheitssektor zu stärken, hat die EU-Kommission kürzlich einen…

FTC orders GoDaddy to fix its infosec practices

Web-hosting giant GoDaddy has been called out by the US Federal Trade Commission (FTC) for its lax security practices, since at least January 2018, with an order to immediately implement a tighter infosec program. An FTC complaint signed by five commissioners accused the leading domain registrar of lacking standard security practices to ensure hosting data…

Blue Origin successfully launches New Glenn rocket into space

Jeff Bezos’ spaceflight company Blue Origin launched its new mega-rocket, called New Glenn, into orbit for the first time. The rocket lifted off at 2:03AM ET on January 16 from Cape Canaveral, Florida, and crossed the official boundary into space a few minutes later. Shortly after, a second-stage burn placed the rocket’s upper section into…

New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.7), resides in a UEFI application signed by Microsoft’s “Microsoft Corporation UEFI CA 2011” third-party UEFI certificate, according to a new

Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions

Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that’s designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration. “A simple misconfiguration in on-premise applications can override the Group Policy, effectively negating the Group Policy designed to stop NTLMv1 authentications,” Silverfort researcher Dor Segal said in a

Mistral signs deal with AFP to offer up-to-date answers in Le Chat

Just a day after Google inked a deal with The Associated Press, Mistral is also announcing a content deal with the Agence France-Presse (AFP) to improve the accuracy of answers in Le Chat, Mistral’s chatbot product. This is the first deal of this kind for the Paris-based artificial intelligence company. And it indicates that Mistral…

Prepaid payments platform Recharge raises €45M to go on M&A spree

With inflation still stubbornly high in comparison to previous years, and the siren voices of subscription services like Netflix and Spotify continuing to lure, consumers have understandably turned to alternative forms of payment to manage their household bills. As a result, online prepaid payment platforms have benefited.  That’s the bet being laid today by Recharge,…

10 Essential GRC Policy Management Best Practices

Policy management is the sturdy scaffolding that supports governance, risk, and compliance (GRC) objectives while shaping corporate culture and ensuring adherence to regulatory obligations. Yet, many organizations grapple with a fragmented approach—policies scattered across departments, processes misaligned, and technology underutilized. The result? A disjointed strategy that hampers visibility, agility, and, ultimately, effectiveness. Why Policy Management…

Hyperline secures $10 million for its automated billing platform

French startup Hyperline wants to build the next-generation Chargebee. Over the past two years, the startup has built a new billing platform that can be used for recurring subscriptions, one-off purchases, usage-based billing and more. Hyperline raised an initial €4 million funding round from Index Ventures back in 2023 ($4.1 million at today’s exchange rate).…

Amazon to acquire Indian fintech Axio in credit push

Amazon has agreed to acquire Indian buy now pay later startup Axio, deepening its push into financial services in one of its fastest-growing markets as it seeks to expand credit access to millions of underserved customers. The US technology group, which has held an equity stake in Axio for six years, signed the acquisition agreement…

Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws

Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded…

Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager

Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosure. All the four critical security flaws, rated 9.8 out of 10.0 on the CVSS scale, are rooted in EPM, and concern absolute path traversal flaws…

Cybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed

When people think about starting a new job, words like “exciting,” “motivating,” and “rewarding” often come to mind. The search for a new role represents an opportunity to embrace fresh challenges, grow professionally, and explore untapped potential. However, for many in cybersecurity, the reality is far from this ideal. The job market has become an…

SIEM buyer’s guide: Top 15 security information and event management tools — and how to choose

Security information and event management (SIEM) is a blue-collar tool for network security professionals. There’s nothing remotely glamorous about auditing, reviewing, and managing event logs, but it’s one of the more important aspects of building a secure enterprise network. In an industry increasingly driven by automation and AI, deep contextual data is a foundational component in…

In AI copyright case, Zuckerberg turns to YouTube for his defense

Meta CEO Mark Zuckerberg appears to have used YouTube and its battle to take down pirated content to defend his own company’s use of a data set containing copyrighted e-books to train AI models, newly released snippets of his deposition reveals.  The deposition, which was part of a complaint submitted to the court by plaintiffs’…

Chinese AI company MiniMax releases new models it claims are competitive with the industry’s best

Chinese firms continue to release AI models that rival the capabilities of systems developed by OpenAI and other U.S.-based AI companies. This week, MiniMax, an Alibaba- and Tencent-backed startup that has raised around $850 million in venture capital and is valued at more than $2.5 billion, debuted three new models: MiniMax-Text-01, MiniMax-VL-01, and T2A-01-HD. MiniMax-Text-01…

CISA director says threat hunters spotted Salt Typhoon on federal networks before telco compromises 

A top federal cybersecurity official said Wednesday that threat hunters from the Cybersecurity and Infrastructure Security Agency first discovered activity from Salt Typhoon on federal networks, allowing public and private sector defenders to more quickly “connect the dots” and respond to Chinese attacks on the U.S. telecommunications industry.   Speaking at an event hosted by the…

News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security

Silver Spring, MD, Jan. 15, 2025, CyberNewswire — Aembit, the non-human identity and access management (IAM) company, unveiled the full agenda for NHIcon 2025, a virtual event dedicated to advancing non-human identity security, streaming live on Jan. 28 and … (more…) The post News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security…

News alert: Sweet Security’s LLM-powered detection engine reduces cloud noise to 0.04%

Tel Aviv, Israel, Jan. 15, 2025, CyberNewswire — Sweet Security, a leader in cloud runtime detection and response, today announced the launch of its groundbreaking patent-pending Large Language Model (LLM)-powered cloud detection engine. This innovation enhances Sweet’s unified … (more…) The post News alert: Sweet Security’s LLM-powered detection engine reduces cloud noise to 0.04% first…

Smashing Security podcast #400: Hacker games, AI travel surveillance, and 25 years of IoT

The video game Path of Exile 2 suffers a security breach, we explore the issues of using predictive algorithms in travel surveillance systems, and the very worst IoT devices are put on show in Las Vegas. Oh, and has Elon Musk accidentally revealed he cheats at video games? All this and much more is discussed…

News alert: Wultra secures €3M funding to help financial firms mitigate coming quantum threats

Prague, Czech Republic, Jan. 15, 2025, CyberNewswire — Quantum computing is set to revolutionize technology, but it also presents a significant security risk for financial institutions. Czech cybersecurity startup Wultra has raised €3 million from Tensor Ventures, Elevator Ventures, and … (more…) The post News alert: Wultra secures €3M funding to help financial firms mitigate…

CISA warns second BeyondTrust vulnerability also exploited in the wild

The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities a second vulnerability by BeyondTrust, which was patched in December. The flaw is different than the one that was used to compromise US Treasury workstations last month. At the end of December, the US Department of the Treasury…

Video: A Gamified Approach To Upskilling Cybersecurity Teams With Hack The Box

In this episode of Partner POV, host Katie Bavoso is joined by Seth Tossie, Vice President of Global Channel Sales, and David Grant, Head of Enterprise Sales, from Hack The Box. Tossie and Grant discuss Hack The Box’s gamified approach to training and upskilling cybersecurity professionals and teams, as well as the new Hack The…

Hindenburg Research, a short seller that targeted tech and EV companies, is closing up shop

When Hindenburg Research posts a blog on its website, it often means a company’s final days are near. Today, that company is Hindenburg Research. Nate Anderson announced Wednesday he has shut down short-selling firm Hindenburg Research, after a seven-year run issuing damning reports about high-profile companies, including many of the technology world’s giants and buzzy…

As TikTok faces a US shutdown, here are some alternative apps to check out

TikTok has warned of a looming shutdown in just six days, as the Supreme Court is currently weighing the law that would ban the app. So we thought it’s time to take a look at other platforms that may be able to fill the TikTok-shaped hole in our lives.  The law gives TikTok parent company…

More teens report using ChatGPT for schoolwork, despite the tech’s faults

Younger Gen Zers are embracing OpenAI’s AI-powered chatbot, ChatGPT, for schoolwork, according to a new survey by the Pew Research Center. But it’s not clear that they’re fully aware of the tech’s pitfalls. In a follow-up to its 2023 poll on ChatGPT usage among young people, Pew asked ~1,400 U.S.-based teens ages 13 to 17…

Samsung will unveil the Galaxy S25 on January 22 — here’s what we expect

The biggest reveal from last week’s Samsung CES press conference may well have been another press conference. The hardware giant closed out the main event by teasing the company’s upcoming show. The next Samsung Unpacked event is set for January 22 at 10 a.m. PT. As with all recent Unpackeds, next week’s big show will…

Duolingo sees 216% spike in U.S. users learning Chinese amid TikTok ban and move to RedNote

TikTok U.S. users have been learning Chinese on Duolingo in increasing numbers amid their adoption of a Chinese social app called RedNote ahead of the TikTok ban. The U.S. law, scheduled to go into effect on January 19, unless halted by the Supreme Court, will see TikTok removed from U.S. app stores and will stop…

These tech companies are donating to LA wildfire relief efforts

Numerous tech companies have pledged millions in donations to help LA recover from wildfires that caused widespread devastation and forced thousands to evacuate the region. Those offering aid include YouTube/Google, Meta, Snap, Amazon, Netflix, and Sony.  Here’s an overview of what each company is doing to aid relief efforts in the region: YouTube and Google:…

CIA nominee tells Senate he, too, wants to go on cyber offense

CIA director nominee John Ratcliffe said during testimony on Capitol Hill that if confirmed, he hopes to develop offensive cyber tools and supports the creation of a cyber-specific deterrence strategy. Ratcliffe, who served as director of national intelligence and in the House of Representatives for Texas, drew a comparison to the concerns over physical, territorial…

OpenAI is bankrolling Axios’ expansion into four new markets

OpenAI is getting into the local news game. Newsletter-based media organization Axios announced a partnership with OpenAI on Wednesday. As part of this three-year deal, the AI giant will fund Axios’ expansion of its local newsletters into four new cities: Pittsburgh; Kansas City, Missouri; Boulder, Colorado; and Huntsville, Alabama. While OpenAI has inked content-sharing and…

Tesla to split $100M award for electric truck charging corridor in Illinois

Tesla, along with three other industry partners, quietly backed an Illinois Environmental Protection Agency application that won $100 million in funding to build electric truck charging stations across the state, TechCrunch has learned. The award was the biggest given out by the Biden Administration’s Federal Highway Administration last week in the second round of what’s…

Biden administration adds 14 additional Chinese firms to trade blacklist

Days after pushing for sweeping AI chip export restriction, the Biden administration has added an additional 14 Chinese companies to its restricted trade list. This brings the full list up to 25 names, according to reporting from The Associate Press. Sophgo is, perhaps, the highest profile addition. An entity of Bitmain, the firm sparked international…

How to stream Donald Trump’s Inauguration Day 2025

Donald Trump will take the presidential oath of office on Friday in front of the Capitol building in Washington, D.C., once again. The event takes place at noon ET and is expected to attract considerable attention from both supporters and opponents. How to stream Trump’s inauguration You can watch the inauguration live with cable or…

AI researcher François Chollet founds a new AI lab focused on AGI

François Chollet, an influential AI researcher, is launching a new startup that aims to build frontier AI systems with novel designs. The startup, Ndea, will consist of an AI research and science lab. It’s looking to “develop and operationalize” AGI. AGI, which stands for “artificial general intelligence,” typically refers to AI that can perform any…

Trump’s DOT pick wants EV owners to pay to use roads

Sean Duffy, President-elect Donald Trump’s nominee to head the U.S. Department of Transportation, thinks owners of electric vehicles should pay to use roads.  “How to do that, I think, is a little more challenging,” Duffy said at his confirmation hearing Wednesday before the Senate Commerce Committee.  The former Republican lawmaker is correct that it would…

This Week in AI: Will Biden’s AI actions survive the Trump era?

Hiya, folks, welcome to TechCrunch’s regular AI newsletter. If you want this in your inbox every Wednesday, sign up here. This week was something of a swan song for the Biden administration. On Monday, the White House announced sweeping new restrictions on exporting AI chips — restrictions that tech giants, including Nvidia, loudly criticized. (Nvidia’s business…

CISA’s AI cyber collaboration playbook aims to spur information-sharing

The Cybersecurity and Infrastructure Security Agency is making one last push before the change in administration for increased information sharing between the public and private sectors, releasing an artificial intelligence-focused playbook Tuesday that aims to foster “a unified approach” to handling AI-related cyber threats. The agency’s AI Cybersecurity Collaboration Playbook was developed with the FBI,…

Concentrix and IRONSCALES Partner to Combat AI Deepfake Threat

Email security vendor IRONSCALES and Fortune 500 technology services provider Concentrix have partnered to combat the rising threat of AI-generated deepfakes. Channel Insider spoke with executives at both companies to learn more about why businesses need to prepare for deepfake threats and how their partnership bolsters their customers’ protection. Deepfakes becoming more sophisticated as sheer…

Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Note: The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283, see Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways. Summary The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of…

Bluesky is getting its own photo-sharing app, Flashes

More good news for those looking to exit Meta’s social app ecosystem in favor of a more open alternative: An independent developer is building a photo-sharing app for Bluesky called Flashes. The soon-to-launch app is powered by the same technology that underpins Bluesky, the AT Protocol, and has been built using code from the developer’s…

Google inks deal with The Associated Press to bring more real-time info to Gemini

In a bid to make its Gemini chatbot app more of one-stop shop, Google says it’s working with The Associated Press to build “a feed of real-time information” in Gemini. Jaffer Zaidi, Google’s VP of global news partnerships, said that the goal is to “further enhance the usefulness of results” in the Gemini experience. “As…

Redacting sensitive free-text data: build vs buy

Building an in-house redaction system requires overcoming significant technical challenges and investing considerable resources to develop and maintain the process. This article explores some of the challenges you may face if your organization decides to go down the build-it-yourself path. The post Redacting sensitive free-text data: build vs buy appeared first on Security Boulevard.

WordPress Appliance - Powered by TurnKey Linux