Geek-Guy.com

Category: Global Security News

Addressing the gaps in modern cloud protection: Using CNAPP to unify cloud security

As cloud-native architectures continue to evolve, so have the complexities of securing them. Traditional security approaches, often built around static infrastructure and perimeter defenses, struggle to keep pace with the speed and scale of modern cloud deployments. Enter cloud-native application protection platforms (CNAPPs), a term coined by Gartner® to describe an integrated security approach that…

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky that exploits a now-patched vulnerability impacting Microsoft Remote Desktop Services to gain initial access. The activity has been named Larva-24005 by the AhnLab Security Intelligence Center (ASEC). “In some systems, initial access was gained through

Multiple top CISA officials behind ‘Secure by Design’ resign 

Two top officials at the Cybersecurity and Infrastructure Security Agency who worked with the private sector to manufacture secure products and technology are leaving the agency. Bob Lord, senior technical adviser and Lauren Zabierek, senior advisor at CISA, were both chief architects behind CISA’s Secure by Design initiative, which garnered voluntary commitments from major vendors…

An AI doctoral candidate in California says they had their student visa revoked

An AI doctoral student in California had their SEVIS record — the digital proof of their valid student visa — terminated, putting their immigration status at risk. Speaking to TechCrunch, the student, who requested anonymity for fear of reprisal, said they were notified via their college’s international student center that they’d been identified in a criminal records…

Microsoft SFI update: Five of 28 security objectives nearly complete

Microsoft says five of the 28 objectives it set for overhauling the way it designs, builds, tests, and operates products and services to improve security are nearing completion, although there are still years to go under what it calls the Secure Future Initiative (SFI). In addition, Microsoft says there has been “significant progress” on 11…

SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts. The active campaign is targeting customers of banking institutions and card issuers in Italy with an aim to compromise payment card data, fraud prevention firm Cleafy said in an analysis. There is evidence…

20 new tech unicorns were minted in 2025 so far

Despite a still tight venture capital market, new unicorns are still being created every month. Using data from Crunchbase and PitchBook, TechCrunch tracked down the newly VC-backed startup minted unicorns so far this year (as of the end of January). These include healthcare companies like Hippocratic AI and satellite space companies like Loft Orbital.  This…

Put your brand at the center of the AI conversation — host a Side Event during TechCrunch Sessions: AI

This June, the most influential minds in artificial intelligence will converge at TC Sessions: AI — and your brand has a unique opportunity to be part of the action. From June 1–7, TechCrunch is curating a weeklong series of Side Events that orbit the main stage event on June 5 at UC Berkeley’s Zellerbach Hall.…

Final weeks to secure your spot in the AI spotlight at TechCrunch Sessions: AI

The countdown is real! Exhibit tables for TechCrunch Sessions: AI are almost gone, and the May 9 deadline is closing in fast. If you’ve been meaning to showcase your AI innovation, this is your last window to make it happen. No more “maybe next year.” No more waiting for the perfect moment. This is it!…

ChatGPT: Everything you need to know about the AI-powered chatbot

ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users. 2024 was a big year for OpenAI, from its partnership…

ASUS patches critical router flaw that allows remote attacks

ASUS is urging customers with AiCloud enabled on their ASUS routers to immediately upgrade firmware against a critical vulnerability that allows unauthorized activities by remote actors. Tracked as CVE-2025-2492, the vulnerability is an authentication bypass issue receiving a critical severity rating of CVSS 9.2 out of 10. “An improper authentication control vulnerability exists in certain…

AI in incident response: from smoke alarms to predictive intelligence

For years, cybersecurity incident response was a bit like listening for smoke alarms in a mansion–if you heard a beep, you knew something was on fire. Signature-based detection did the job, but only after the damage started smouldering. Enter AI, which doesn’t just wait for smoke–it sniffs out strange cooking, checks the blueprints, and figures…

Kyndryl Announces New AI Private Cloud Services & SAP Support

Kyndryl, a leading provider of mission-critical enterprise technology services, recently announced the launch of new AI private cloud services and consulting expertise to deliver a seamless, end-to-end experience for enterprise-grade AI solutions, from design and development to full operation.  The announcements don’t stop there, with Kyndryl also announcing the launch of a Data Transformation Suite…

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Cybersecurity researchers have disclosed a surge in “mass scanning, credential brute-forcing, and exploitation attempts” originating from IP addresses associated with a Russian bulletproof hosting service provider named Proton66. The activity, detected since January 8, 2025, targeted organizations worldwide, according to a two-part analysis published by Trustwave SpiderLabs last week.  “Net

Two ways AI hype is worsening the cybersecurity skills crisis

AI was supposed to make security teams more efficient, but instead, it’s making their jobs harder. Security professionals are being pulled in two directions: they’re being expected to govern their organisation’s AI use while also figuring out how to integrate the technology into their own workflows, often without proper training. The result? Overstretched teams, mounting…

Telstra marked 80 years of powering the Good Friday Appeal by ‘helping drive $469m in donations’

COMPANY NEWS: Telstra has supported the Good Friday Appeal (GFA) for the 80th year by providing the pop-up call centre, helping drive over $1m in donations raised through the annual telethon – and this contributed to an impressive $23,822,792 raised this year, with all funds going to The Royal Children’s Hospital in Melbourne.

Palantir exec defends company’s immigration surveillance work

One of the founders of startup accelerator Y Combinator offered unsparing criticism this weekend of the controversial data analytics company Palantir, leading a company executive to offer an extensive defense of Palantir’s work. The back-and-forth came after federal filings showed that U.S. Immigration and Customs Enforcement (ICE) — tasked with carrying out the Trump administration’s…

OpenAI’s o3 AI model scores lower on a benchmark than the company initially implied

A discrepancy between first- and third-party benchmark results for OpenAI’s o3 AI model is raising questions about the company’s transparency and model testing practices. When OpenAI unveiled o3 in December, the company claimed the model could answer just over a fourth of questions on FrontierMath, a challenging set of math problems. That score blew the…

Protected NHIs: Key to Cyber Resilience

Why is Management of Protected NHIs Essential? Protected Non-Human Identities (NHIs) have become a crucial factor for organizations looking to strengthen their cybersecurity framework. Given the surge in hacking attempts and data breaches, it is pertinent to ask, “How crucial are protected NHIs in ensuring cyber resilience?” Let’s delve deeper into this topic. NHIs, as…

Ensuring a Safe Environment with Least Privilege

Why Is Least Privilege Fundamental to Creating Safe Environments? Data is the new gold. If data volumes surge, so do cyber threats, making data protection a top priority. The principle of least privilege (POLP) crucially comes to play here. But what is least privilege, and how does it contribute to creating safer environments? Least privilege…

BSidesLV24 – Common Ground – Free Your Mind: Battling Our Biases

Author/Presenter: dade Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – Free Your Mind: Battling Our Biases appeared first on Security Boulevard.

Uncovered emails showed how Meta struggled to keep Facebook culturally relevant

With the first week of Meta’s antitrust trial behind us, documents shared by the U.S Federal Trade Commission (FTC) offered more insight into Meta’s internal struggles to keep Facebook relevant. In emails from 2022, Meta executives mulled different visions for Facebook’s future to boost its success, acknowledging that its cultural relevance was decreasing.  Fast-forward to…

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that’s targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. “While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed…

Secrets Management that Delivers Real Value

Why is Value-Driven Secrets Management Essential in Today’s Cybersecurity Landscape? Where the importance of data has skyrocketed, making its protection paramount. This has brought the concept of Non-Human Identities (NHIs) and Secrets Management into the limelight. But how has the value-driven approach reshaped secrets management, and why is it vital? Unravelling the Concept of NHIs…

Congress has questions about 23andMe bankruptcy

3The leaders of the House Committee on Energy and Commerce said they are investigating how 23andMe’s bankruptcy might affect customers’ data. Representatives Brett Guthrie, Gus Bilirakis, and Gary Palmer (all Republicans) sent a letter Thursday to the genetic testing company’s interim CEO Joe Selsavage asking a number of questions about how 23andMe will handle customer…

Famed AI researcher launches controversial startup to replace all human workers everywhere

Every now and then, a Silicon Valley startup launches with such an “absurdly” described mission that it’s difficult to discern if the startup is for real or just satire. Such is the case with Mechanize, a startup whose founder – and the non-profit AI research organization he founded called Epoch – is being skewered on…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities. The packages in question are listed below – node-telegram-utils (132 downloads) node-telegram-bots-api (82 downloads) node-telegram-util (73 downloads) According to supply chain

BSidesLV24 – Common Ground – Quantum Computing: When Will It Break Public Key Cryptography?

Author/Presenter: James Ringold Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – Quantum Computing: When Will It Break Public Key Cryptography? appeared first…

Read what Mark Zuckerberg and Facebook execs said about Instagram before buying it

The first week of the Meta antitrust trial brought new revelations about how the company formerly known as Facebook approached the competitive threat posed by Instagram in the early 2010s. The U.S. government is accusing Meta of violating competition laws by acquiring companies like Instagram and WhatsApp that threatened the Facebook monopoly. If lawyers for…

ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware

ASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that could permit remote attackers to perform unauthorized execution of functions on susceptible devices. The vulnerability, tracked as CVE-2025-2492, has a CVSS score of 9.2 out of a maximum of 10.0. “An improper authentication control vulnerability exists in certain ASUS router firmware series,”

A new kids’ show will come with a crypto wallet when it debuts this fall

A new animated kids’ series expected to premiere this year won’t be headed for a TV network. Or a streaming service. Instead, the founders of production studio We Ghosted Media plan to launch on a decentralized web platform that uses blockchain technology. And yes, a crypto wallet will be involved.  We Ghosted Media — founded by…

Techstars increases startup funding to $220,000, mirroring YC structure

Techstars, a nearly 20-year-old startup accelerator, announced new terms for startups that enter its three-month program. The organization will now invest $220,000, which is $100,000 more than it offered previously, in companies starting with its fall 2025 batch. The capital will be divided into two components. The group is offering companies $20,000 in exchange for…

Stay Reassured with Advanced NHIDR

Can Advanced NHIDR Keep Your Cloud Environment Secure? Enriched with advanced technologies, potential threats also grow in complexity. One such concern circulates around the concept of Non-Human Identities (NHIs) and Secrets Security Management. But, what if there was a way to feel reassured about your security in NHIs? In comes the role of advanced NHIDR—…

Maximizing Data Protection in Healthcare

Understanding the Vitality of Non-Human Identities in Healthcare Data Protection What if you could significantly diminish security risks in your healthcare organization while enhancing operational efficiency? Non-human identities (NHIs) and Secrets Security Management offer the answer to that pressing question. When the dynamics of securing sensitive data continue to evolve, the role of NHIs in…

Securing Secrets: A Path to a Relaxed Audit

Why Is Secrets Security Essential in Today’s Digital Landscape? Is secrets security, also known as Non-Human Identities (NHIs) management, really that important? If you’re searching for a relaxed audit, the answer is a resounding ‘yes’. NHI management is an indispensable facet of modern cybersecurity strategies across various industries, from financial services and healthcare to DevOps…

Staying Ahead with Proactive Secrets Rotation

Why Should Organizations Prioritize Proactive Secrets Rotation? Where digital connectivity is ever-increasing, how can organizations stay one step ahead? One answer lies in proactive secrets rotation – a strategy that is pivotal to maintaining robust cybersecurity health. Not only does this strategy allow companies to prevent unauthorized access to their networks, but it also facilitates…

ChatGPT: Everything you need to know about the AI-powered chatbot

ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users. 2024 was a big year for OpenAI, from its partnership…

TechCrunch Mobility: Lyft buys its way into Europe, Kodiak SPACs, and how China’s new ADAS rules might affect Tesla

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Enough with my typical small talk. Let’s jump into the news right away this week. And there’s plenty of it, including Lyft’s entry into Europe, AV startup…

White House replaces covid.gov website with ‘lab leak’ theory

The government-run website covid.gov used to host information about COVID-19 vaccines, testing, and treatment. Now, under President Trump’s purview, the page redirects to a White House website espousing the unproven theory that COVID-19 originated in a Chinese laboratory. The theory, which has been opposed by many virologists, was espoused in a report by House Republicans…

ChatGPT is referring to users by their names unprompted, and some find it ‘creepy’

Some ChatGPT users have noticed a strange phenomenon recently: occasionally, the chatbot refers to them by name as it reasons through problems. That wasn’t the default behavior previously, and several users claim ChatGPT is mentioning their names despite never having been told what to call them. Reviews are mixed. One user, software developer and AI…

BSidesLV24 – Common Ground – One Port to Serve Them All – Google GCP Cloud Shell Abuse

Author/Presenter: Hubert Lin Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – One Port to Serve Them All – Google GCP Cloud Shell…

ChatGPT will now use its ‘memory’ to personalize web searches

OpenAI is upgrading ChatGPT’s “memory” again. In a changelog and support pages on OpenAI’s website Thursday, the company quietly announced “Memory with Search,” a feature that lets ChatGPT draw on memories — details from past conversations, such as your favorite foods — to inform queries when the bot searches the web. ChatGPT release notes were…

CVE-2025-32433: Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability

Proof-of-concept code has been released after researchers disclosed a maximum severity remote code execution vulnerability in Erlang/OTP SSH. Successful exploitation could allow for complete takeover of affected devices. Background On April 16, Fabian Bäumer, Marcus Brinkmann, Marcel Maehren, and Jörg Schwenk of the Ruhr University Bochum in Germany disclosed a critical vulnerability in Erlang/OTP SSH…

Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

Cybersecurity researchers are warning of a “widespread and ongoing” SMS phishing campaign that’s been targeting toll road users in the United States for financial theft since mid-October 2024. “The toll road smishing attacks are being carried out by multiple financially motivated threat actors using the smishing kit developed by ‘Wang Duo Yu,’” Cisco Talos researchers…

From Bogotá to the Battlefield: LatAm startups are winning big in TechCrunch Startup Battlefield

For startups around the world, the TechCrunch Startup Battlefield program offers unmatched exposure, credibility, and connections to scale their businesses. TechCrunch has long been committed to spotlighting companies solving real-world problems in scalable and sustainable ways — making it a powerful launchpad for startups both in and outside the U.S. Several Latin American startups have…

BSidesLV24 – Common Ground – Beyond Whack-a-Mole: Scaling Vulnerability Management by Embracing Automation

Author/Presenter: Yotam Perkal Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – Beyond Whack-a-Mole: Scaling Vulnerability Management by Embracing Automation appeared first on…

WordPress Appliance - Powered by TurnKey Linux