Geek-Guy.com

Category: Global Security News

Concentrix and IRONSCALES Partner to Combat AI Deepfake Threat

Email security vendor IRONSCALES and Fortune 500 technology services provider Concentrix have partnered to combat the rising threat of AI-generated deepfakes. Channel Insider spoke with executives at both companies to learn more about why businesses need to prepare for deepfake threats and how their partnership bolsters their customers’ protection. Deepfakes becoming more sophisticated as sheer…

Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Note: The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283, see Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways. Summary The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of…

Bluesky is getting its own photo-sharing app, Flashes

More good news for those looking to exit Meta’s social app ecosystem in favor of a more open alternative: An independent developer is building a photo-sharing app for Bluesky called Flashes. The soon-to-launch app is powered by the same technology that underpins Bluesky, the AT Protocol, and has been built using code from the developer’s…

Google inks deal with The Associated Press to bring more real-time info to Gemini

In a bid to make its Gemini chatbot app more of one-stop shop, Google says it’s working with The Associated Press to build “a feed of real-time information” in Gemini. Jaffer Zaidi, Google’s VP of global news partnerships, said that the goal is to “further enhance the usefulness of results” in the Gemini experience. “As…

Redacting sensitive free-text data: build vs buy

Building an in-house redaction system requires overcoming significant technical challenges and investing considerable resources to develop and maintain the process. This article explores some of the challenges you may face if your organization decides to go down the build-it-yourself path. The post Redacting sensitive free-text data: build vs buy appeared first on Security Boulevard.

Why traditional loyalty programs are failing to meet modern customer expectations

GUEST OPINION: Retailers are under increasing pressure to retain customers as purchasing behaviour continues to evolve. While competitive pricing remains important, loyalty is more likely to be built on emotional connections that are strengthened by loyalty programs that offer more than just points and discounts, delivering truly personalised, value-driven experiences.

Google raises the price of Workspace plans, includes its AI features for free

Google announced on Wednesday that all AI features in Gmail, Docs, Sheets, and Meet are now available to Workspace customers at no extra charge, though the plan will see a $2 per month increase per user.  This change simplifies access to Workplace AI tools, including email summaries, automated note-taking, chatting with the Gemini bot, and…

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes

Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. “The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages,” Jérôme Segura, senior…

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. “The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews,” Ryan Sherstobitoff, senior vice president…

Concur Travel becomes the first booking tool to offer ISO 14083-assured emissions data

COMPANY NEWS: The new Concur Travel has achieved a significant milestone by becoming the first online booking tool to integrate emissions calculations assured to the new ISO 14083 standard. This development made possible through its partnership with Thrust Carbon, marks a big step forward in providing accurate and consistent emissions data for customers at the…

As Gen Z job applicants balloon, companies are turning to AI agent recruiters

According to some of the latest statistics, employers are swamped by job applications. In the UK alone, employers running graduate training schemes received an average of 140 applications for each job in 2024, 59 per cent more than in 2023, according to the Institute of Student Employers. And despite some trepidations amongst a few recruiters,…

Fast-growing South African venture FARO raises $6M to source, refurbish and sell surplus clothing

Global fashion brands grapple with excess inventory. ASOS, for instance, had over £1.2 billion of unsold products in 2022.  Mostly, these brands avoid reselling in core markets like the UK and the U.S. to prevent market cannibalization. Meanwhile, emerging markets like Africa heavily rely on secondhand clothing imports, but 30% to 40% of these items…

OpenAI tests letting users sign up for ChatGPT with only a phone number

OpenAI has begun testing a feature that lets new ChatGPT users sign up with only a phone number — no email required. As spotted by software engineer Tibor Blaho, the feature, which is available in beta in the U.S. and India, lets users create an account for ChatGPT, OpenAI’s AI-powered chatbot platform, by providing their…

Die Top 10 Geschäftsrisiken in Deutschland 2025

Cyberangriffe zählen nach wie vor zu den größten Geschäftsrisiken. Andrey_Popov – shutterstock.com Kriminelle Hacker, Naturkatastrophen, politische Risiken und der Klimawandel bereiten Unternehmen weltweit wachsende Sorgen. Im jährlichen Risikobarometer der Allianz stehen wie im Vorjahr die Cyberattacken an erster Stelle der Geschäftsrisiken, gefolgt von Betriebsunterbrechungen, Naturkatastrophen sowie Änderungen gesetzlicher und behördlicher Vorschriften. Der zum Münchner Dax-Konzern gehörende Unternehmensversicherer Allianz…

Perfide Ransomware-Attacke gegen AWS-Nutzer

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?quality=50&strip=all 4750w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Hacker haben kompromittierte AWS-Zugangsdaten genutzt, um S3-Buckets zu verschlüsseln. gguy – Shutterstock.com Forscher des Sicherheitsanbieters Halcyon haben kürzlich entdeckt, dass Cyberkriminelle den Speicherdienst S3 von Amazon Web Services…

Rockfish is helping enterprises leverage synthetic data

For years, Vyas Sekar would call up Muckai Girish, an old friend from undergrad, to talk through potential startup ideas and get Girish’s opinion. The two usually talked through an idea and ended the conversation at that. When Sekar called Girish with an idea involving synthetic data in early 2022, the conversation didn’t just end…

LinkedIn adds free AI tools for job hunters and recruiters

If you’ve ever applied or thought of applying for a job via LinkedIn, you’ll know that the experience can be immediately disheartening: Openings that look interesting typically can see hundreds or thousands of applications in a matter of hours — data that LinkedIn, a social network for the world of work, proudly exposes in its…

Microsoft’s newest Copilot plan for business is pay-as-you-go

Microsoft is launching a pay-as-you-go plan for corporate customers that bundles together several, but not all, of the company’s existing AI-powered productivity features for Microsoft 365. The new plan, Copilot Chat — not to be confused with Microsoft’s Copilot Business Chat or GitHub Copilot Chat — is underpinned by OpenAI’s GPT-4o AI model and lets…

North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains

Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared…

Cisco’s homegrown AI to help enterprises navigate AI adoption

As the world rushes to integrate AI into all aspects of enterprise applications, there’s a pressing need to secure data-absorbing AI systems from malicious interferences. To achieve that, Cisco has announced Cisco AI Defense, a solution designed to address the risks introduced by the development, deployment, and usage of AI. According to Tom Gillis, SVP…

Hinge’s new AI feature determines if your prompt response is too basic 

Hinge today launched a new AI-powered feature called “Prompt Feedback,” which aims to improve your dating profile by analyzing how you answer prompts and assessing if it needs to be more specific or authentic.  Powered by OpenAI’s GPT-4o mini, Prompt Feedback evaluates each response and offers personalized advice tailored to help you share interesting details…

CISA unveils ‘Secure by Demand’ guidelines to bolster OT security

The US Cybersecurity and Infrastructure Security Agency (CISA), along with its international cybersecurity allies, has unveiled the “Secure by Demand” guidelines to safeguard operational technology (OT) environments. The framework provides a blueprint for OT owners and operators to prioritize cybersecurity when procuring digital products. This initiative addresses growing concerns about vulnerabilities in critical infrastructure, including…

The High-Stakes Disconnect For ICS/OT Security

Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn’t just ineffective—it’s high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems (ICS) and Operational Technology (OT) security distinctly stand out from traditional IT security.…

Diese Unternehmen hat’s schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind. Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor Cyberangriffen schützen? Oder dass Ihr Unternehmen zu klein und damit uninteressant für Hacker ist? Egal, ob Sie dem Mittelstand angehören, an der Börse gelistet sind oder zu den kritischen Infrastrukturen gehören: Jedes…

Large Language Models and Regulations: Navigating the Ethical and Legal Landscape

Leverage the full potential of Large Language Models (LLMs) for your business while staying compliant. The post Large Language Models and Regulations: Navigating the Ethical and Legal Landscape appeared first on Scytale. The post Large Language Models and Regulations: Navigating the Ethical and Legal Landscape appeared first on Security Boulevard.

Creator of Gas and tbh makes an app for disappearing photos via iMessage

Nikita Bier, creator of popular apps like the anonymous polling app tbh (acquired by Facebook) and the anonymous compliments app Gas (acquired by Discord), has created a new app called Explode, which focuses on disappearing messages on iMessage. Explode works as a mini app for Apple’s Messages app. It helps you send disappearing messages to…

The CFO may be the CISO’s most important business ally

CISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities. In many ways, this is the nature of setting security policies for an organization. But the goal for CISOs should be to reset this dynamic and forge a strong, collaborative alliance with their critical leadership counterparts. Take the CFO, for example. For many…

Synthesia snaps up $180M at a $2.1B valuation for its B2B AI video platform

As the world continues to work through how to handle the explosion of deepfake content online, it seems that not all AI-created videos are stirring controversy. Synthesia, a London startup building products around highly realistic AI avatar technology, says it’s a big hit with enterprises, with some 60,000 of them — 1 million users —…

FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation

The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a “multi-month law enforcement operation.” PlugX, also known as Korplug, is a remote access trojan (RAT) widely used by threat actors associated with…

Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid

Strong capabilities in cyber threat intelligence (CTI) can help take a cybersecurity program to the next level on many different fronts. When organizations choose quality sources of threat intelligence that are relevant to their technology environments and their business context, these external sources can not only power swifter threat detection but also help leaders better…

Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks

Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution. Horizon3.ai researcher Naveen Sunkavally, in a technical report detailing the findings, said the “vulnerabilities are trivial to reverse and exploit.” The list of identified flaws is as follows –

Nelly raises $51 million to digitalize medical practices across Europe

Nelly wants to become the biggest fintech startup in the healthcare industry. The Berlin-based startup is already working with more than 1,200 medical practices in a handful of European countries. But there are thousands more that could benefit from an upgrade for their administrative workflows. That’s why Nelly recently raised €50 million in funding (around…

Google’s Willow Chip: Another Push to Start Your Post-Quantum Cryptography (PQC) Preparation Now

As 2024 drew to a close, Google caught global attention with the announcement of its latest quantum computing chip, Willow. Many believe that with Willow, Google has set a new benchmark for 2025, unveiling the extraordinary potential of quantum computing and what the quantum future could look like in the days ahead. If you think…

International effort erases PlugX malware from thousands of Windows computers

The US has again taken court-approved action to remove malware from privately-held internet-connected computers across the country, part of an effort by a number of countries to combat infections of a version of the PlugX malware from a Chinese-based group that has infected thousands of Windows machines around the world. PlugX is a remote access…

SEC sues Elon Musk for allegedly failing to disclose Twitter acquisition on time

The Securities and Exchange Commission filed a lawsuit against Elon Musk on Tuesday over an alleged securities violation relating to his acquisition of Twitter, now called X. The SEC claims Musk failed to disclose his 5% ownership stake of Twitter in a timely manner, violating federal securities law, according to a complaint filed in federal…

Nvidia backs MetAI, a Taiwanese startup that creates AI-powered digital twins

Nvidia has been doubling down on the opportunity to build robotics and other industrial AI applications, with the launch of its Omniverse platform, and most recently Mega, an Omniverse Blueprint framework to create digital twins to operate these applications. It’s also investing in digital twin startups to get the effort off the ground. Taiwan’s MetAI…

Fortinet confirms zero-day flaw used in attacks against its firewalls

Fortinet has confirmed the existence of a critical authentication bypass vulnerability in specific versions of FortiOS firewalls and FortiProxy secure web gateways. The flaw has been exploited in the wild since early December in what appears to be an indiscriminate and widespread campaign, according to cybersecurity firm Arctic Wolf. The fix for this zero-day is…

Microsoft: Happy 2025. Here’s 161 Security Updates

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three “zero-day” weaknesses that are already under active attack. Redmond’s inaugural Patch Tuesday of 2025 bundles more fixes than the company has shipped in one go since 2017. Rapid7‘s Adam Barnett says January marks the fourth consecutive month…

Biden admin’s final rule banning Chinese connected cars also bars robotaxi testing on U.S. roads

The U.S. Department of Commerce announced a final rule Tuesday that would ban the sale or import of connected vehicles from China and Russia due to national security concerns. The rule would also bar Chinese car companies, such as WeRide and Pony AI, from testing self-driving cars on U.S. roads.  “China is trying to dominate…

ChatGPT: Everything you need to know about the AI-powered chatbot

ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users. 2024 was a big year for OpenAI, from its partnership…

The Future of Cybersecurity: Global Outlook 2025 and Beyond

The cybersecurity landscape is entering an unprecedented era of complexity, with AI-driven threats, geopolitical tensions, and supply chain vulnerabilities reshaping how organizations approach digital security. This analysis explores key trends and strategic imperatives for 2025 and beyond. The post The Future of Cybersecurity: Global Outlook 2025 and Beyond appeared first on Security Boulevard.

Microsoft fixes 159 vulnerabilities in first Patch Tuesday of 2025

In its latest security update, Microsoft has addressed a total of 159 vulnerabilities, covering a broad spectrum of the tech giant’s products, including .NET, Visual Studio, Microsoft Excel, Windows components, and Azure services.  The update covers several critical and high-severity flaws across various systems, impacting Windows Telephony Services, Active Directory Domain Services, Microsoft Excel and…

Nintendo Switch 2 could be announced this week: The rumors (and facts) so far

With CES 2025 finally in the rearview, it’s time to move on to the next round of big hardware announcements. Rumors have emerged over the last few weeks, pointing to an imminent announcement for the next-generation of Nintendo’s wildly successful hybrid Switch console. In particular, word from industry stalwart Eurogamer (among others) pegs a January…

Intel spins off its corporate venture arm, Intel Capital, into a standalone fund

Intel says that it plans to spin off its corporate venture arm, Intel Capital, into a standalone fund, with Intel as an “anchor investor.” In a press release on Tuesday, Intel said that the move will “[enable] greater autonomy” and “the flexibility to attract external capital.” Intel expects Intel Capital to begin operating independently in…

Meta execs obsessed over beating OpenAI’s GPT-4 internally, court filings reveal

Executives and researchers leading Meta’s AI efforts obsessed over beating OpenAI’s GPT-4 model while developing Llama 3, according to internal messages unsealed by a court on Tuesday in one of the company’s ongoing AI copyright cases, Kadrey v. Meta. “Honestly… Our goal needs to be GPT-4,” said Meta’s VP of Generative AI, Ahmad Al-Dahle, in…

Unsafe Deserialization Attacks Surge | December Attack Data | Contrast Security

Attacks on individual applications were down month to month in December 2024, but one of the most dangerous types of attacks was up significantly. That’s according to data Contrast Security publishes monthly about the detection and response of real-world application and application programming interface (API) attacks with Application Detection and Response (ADR). What you’re about…

DJI Flip is a $439, fully foldable camera drone

Four short months after introducing the truly palm-size Neo, DJI is back with another pint-sized consumer drone. The Flip continues the drone giant’s interest in foldable form factors, with a quartet of propeller guards that essentially stack up, for maximum portability. The new Flip continues to blur the lines in DJI’s existing consumer portfolio, combing…

WordPress Appliance - Powered by TurnKey Linux