Geek-Guy.com

Category: Global Security News

Senators take another swing at vulnerability disclosure policy bill for federal contractors

A bipartisan pair of senators is taking another shot at legislation that would require federal government contractors to follow National Institute of Standards and Technology guidelines on vulnerability disclosure policies. The Federal Contractor Cybersecurity Vulnerability Reduction Act from Sens. Mark Warner, D-Va., and James Lankford, R-Okla., advanced out of the chamber’s Homeland Security and Governmental…

Uber Freight’s AI bet, Tesla’s robotaxi caveat, and Nikola’s trucks hit the auction block

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! For those U.S.-based readers out there, enjoy the long Memorial Day weekend, and if you’re on the road, expect it to be crowded. AAA projects 45.1 million…

TechCrunch Mobility: Uber Freight’s AI bet, Tesla’s robotaxi caveat, and Nikola’s trucks hit the auction block

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! For those U.S.-based readers out there, enjoy the long Memorial Day weekend, and if you’re on the road, expect it to be crowded. AAA projects 45.1 million…

U.S. Authorities Seize DanaBot Malware Operation, Indict 16

U.S. authorities seized the infrastructure of the DanaBot malware and charged 16 people in an action that is part of the larger Operation Endgame, a multinational initiative launched last year to disrupt and take apart global cybercriminals operations. The post U.S. Authorities Seize DanaBot Malware Operation, Indict 16 appeared first on Security Boulevard.

Microsoft says its Aurora AI can accurately predict air quality, typhoons, and more

One of Microsoft’s latest AI models can accurately predict air quality, hurricanes, typhoons, and other weather-related phenomena, the company claims. In a paper published in the journal Nature and an accompanying blog post this week, Microsoft detailed Aurora, which the tech giant says can forecast atmospheric events with greater precision and speed than traditional meteorological…

ChatGPT: Everything you need to know about the AI-powered chatbot

ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users. 2024 was a big year for OpenAI, from its partnership…

At TechCrunch Sessions: AI, Artemis Seaford and Ion Stoica confront the ethical crisis — when AI crosses the line

As generative AI becomes faster, cheaper, and more convincing, the ethical stakes are no longer theoretical. What happens when the tools to deceive become widely accessible? And how do we build systems that are powerful — but safe enough to trust? At TechCrunch Sessions: AI, taking place June 5 at UC Berkeley’s Zellerbach Hall, Artemis…

X continues to suffer bugs following Thursday outage

For over 24 hours, many X users, including this reporter, have been experiencing issues with the site’s basic functionality. Some messages won’t load, timelines won’t update, and certain posts can’t be seen without a webpage refresh (or several). The trouble started Thursday afternoon, according to Downdetector, a crowdsourced platform for flagging web outages. Beginning at…

Founders First: Iliana Quinonez of Google Cloud on AI agents, infrastructure, and democratization at TechCrunch Sessions: AI

In the startup world, access to cutting-edge tools isn’t the biggest obstacle — it’s knowing how to wield them with precision. At TechCrunch Sessions: AI, taking place on June 5 at UC Berkeley’s Zellerbach Hall, we’re digging into the frameworks and decisions that determine whether an AI startup can scale — or stall. We’re excited…

Large-scale sting tied to Operation Endgame disrupts ransomware infrastructure

Law enforcement agencies from Europe and North America have dismantled key infrastructure behind several leading malware strains used in ransomware attacks, the latest action in a yearslong effort to combat cybercriminals.  The operation, conducted as part of Operation Endgame, targeted the early stages of the cybercrime chain, focusing on initial access malware. The coordinated effort…

Tick tock: Just 3 days left to save up to $900 on your TechCrunch Disrupt 2025 pass

Time’s almost up — save big before prices jump in 3 days!  You’ve got until May 25 at 11:59 p.m. PT to save up to $900 on individual tickets to TechCrunch Disrupt 2025. Or double your impact — grab one Early Bird pass and get another for your +1 at 90% off. These deals will…

Spotting scopes vs. telescopes: Choosing the right tool for land and sky observation

GUEST OPINION: Whether you’re captivated by the intricate patterns of a distant bird or the luminous glow of a nebula, selecting the right optical instrument is crucial. For enthusiasts keen on both terrestrial and celestial observations, the choice often narrows down to two primary tools: spotting scopes and telescopes. Each offers distinct advantages tailored to…

Over 91% of companies sacrifice hybrid cloud security in the AI adoption rush

A startling 91% of organizations admit to making risky security compromises in their hybrid cloud environments under a mounting strain from the growing influence of AI, according to Gigamon’s 2025 Hybrid Cloud Security Survey. As AI adoption surges and hybrid architectures expand, security postures remain dangerously fragmented. Breach rates have surged 17% year-on-year to 55%,…

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat actor has been observed exploiting a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers (CVE-2023-20118) to corral them…

Beijing may have breached US government systems before Cityworks plugged a critical flaw

A now-patched high-severity security flaw affecting Trimble Cityworks — a specialized software used by local governments in the US, utilities, and public agencies to manage their infrastructure and community services—was abused by Chinese hackers to compromise systems before a patch was available. According to a Talos intelligence report, the flaw (tracked as CVE-2025-0994) in the…

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

As part of the latest “season” of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets. Operation Endgame, first launched in May 2024, is an ongoing law enforcement operation targeting services and infrastructures assisting in or directly providing initial…

Cyberattacke auf Dienstgeräte des Landratsamt Bodenseekreis

Aufgrund einer Cyberattacke sind aktuell alle Diensthandys und Tablets des Landratsamt Bodenseekreis außer Betrieb. 512r – shutterstock.com Nach Angaben des Landratsamt Bodenseekreis haben Hacker kürzlich Diensthandys und weitere Mobilgeräte der Verwaltung angegriffen. Demnach sind die Täter über eine Schwachstelle in einem Programm zur Systemverwaltung der Geräte eingedrungen. Nachdem der Angriff entdeckt wurde, habe die IT-Abteilung…

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web application security solution has never been greater. SafeLine is currently the most starred open-source Web Application Firewall (WAF) on GitHub, with over 16.4K stars and a rapidly growing global user base. This walkthrough covers what SafeLine is, how…

Glean Announces Expansion of AI Agent Environment

Glean, a work AI platform, recently announced the expansion of Glean Agents, an open, horizontal environment for building, deploying, orchestrating, and governing AI agents at work. Glean’s AI agents are developed with broad LLM choice, expanded MCP server support for agent interoperability, complex workflow automation, and built-in governance. These are secure and enterprise-ready to enable…

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and unsealed charges against 16 individuals for their alleged involvement in the development and deployment of the malware, which it said was controlled by a Russia-based cybercrime organization. The malware, the DoJ said, infected more…

Critical infrastructure under attack: Flaws becoming weapon of choice

Threat actors are increasingly exploiting vulnerabilities to attack critical infrastructure systems. Critical infrastructure organizations accounted for 70% of all attacks that IBM X-Force responded to last year, with more than one quarter of those attacks carried out using vulnerability exploitation. “Over the past year, we observed a continued shift towards identity attacks across all sectors,…

BKA gelingt Schlag gegen Cyberkriminelle

Im Rahen der “Operation Endgame” wurden die derzeit einflussreichsten Schadsoftware-Varianten vom Netz genommen. BKA Sicherheitsbehörden ist ein Schlag gegen die weltweite Cyberkriminalität gelungen. Im Laufe dieser Woche seien dank der “Operation Endgame” die derzeit einflussreichsten Schadsoftware-Varianten vom Netz genommen und die dahinterstehenden Täter identifiziert worden, teilte das Bundeskriminalamt (BKA) mit. Von den insgesamt 37 identifizierten…

Detect Vulnerabilities Faster With Website Scanner

As digital transformation becomes a strategic imperative, development teams have emerged as a pillar of organizations. Agile and DevOps practices have revolutionized the pace of innovation, enabling businesses to respond rapidly to evolving market demands. However, this accelerated development comes with a cost—the expansion of the application attack surface. Every new feature or update introduces…

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. “Threat actors may have accessed client secrets for Commvault’s (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure,” the agency said. “This

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab’s artificial intelligence (AI) assistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. GitLab Duo is an artificial intelligence (AI)-powered coding assistant that enables users…

Heute startet der CIO Charity Run&Bike 2025

Seit Jahren engagiert sich die CIO-Community leidenschaftlich im Rahmen des CIO Charity Run&Bike für gemeinnützige Organisationen. Foundry Es geht los! Vom 23. Mai bis 9. Juni 2025 sporteln Deutschlands IT-Verantwortliche im Rahmen den CIO Charity Run&Bike gemeinsam für den guten Zweck. Über 1.000 IT-Verantwortliche haben sich bereits angemeldet. Kurzentschlossene können sich weiterhin registrieren unter: https://www.cio-charity.de/…

Video: The Blue Mantis Guide to MSP Growth Through Strategic Acquisitions

In this episode of Channel Insider: Partner POV, host Katie Bavoso sits down once again with returning guest Terry Richardson, CRO of Blue Mantis , to unpack the company’s rapid expansion through strategic MSP acquisitions and its evolving business strategy. Richardson explains what impact he believes economic uncertainty in the U.S. will have on M&A…

Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine

Intelligence and cybersecurity agencies from 10 countries has warned in a joint advisory that a cyberespionage group operated by the Russian military intelligence service, the GRU, has been targeting logistics and IT companies for the past three years. Known in the security industry as APT28 and Fancy Bear, the threat actor has been launching attacks…

Why continuous discovery is critical to closing security gaps

Ask me how many applications are running in a typical enterprise cloud environment, and I’ll give you an estimate. Ask me again a few minutes later, and I might give you a completely different number. It’s not that I’m unsure on purpose — it’s just that the landscape shifts constantly. From CI/CD pipelines redeploying workloads,……

DanaBot malware operation seized in global takedown

A global collection of private defenders and law enforcement agencies notched another win against a core facilitator for cybercrime, initiating coordinated seizures and takedowns of DanaBot’s command and control servers, disrupting the malware-as-a-service’s operations, the Justice Department said Thursday.  Federal officials also unsealed a grand jury indictment and criminal complaint charging 16 individuals for their…

Hinge Health pops 17%, but joins growing ranks of down round IPOs

Hinge Health, a digital physical therapist company, closed its first day of trading on the New York Stock Exchange on Thursday at $37.56, up about 17% over the $32 IPO price it set the previous day. That’s a good first-day result. But even with the pop, Hinge’s public valuation is significantly less than its last…

Oops: DanaBot Malware Devs Infected Their Own PCs

The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after…

Klarna CEO and Sutter Hill take victory lap after Jony Ive’s OpenAI deal

Hours after Sam Altman and Jony Ive announced on Wednesday that OpenAI was buying Ive’s company, io, in an all-stock transaction valued at $6.5 billion, Klarna CEO Sebastian Siemiatkowski posted a surprising message on X.  His family investment office, Flat Capital, had bought shares in io six months earlier, he said. Since this is an…

News Alert: Halo Security reaches SOC 2 milestone, validating its security controls and practices

Miami, Fla., May 22, 2025, CyberNewsWire — Halo Security, a leading provider of attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type 1 compliance following a comprehensive audit by Insight Assurance. This … (more…) The post News Alert: Halo Security reaches SOC 2 milestone, validating its security controls…

News alert: INE Security, Abadnet Institute partner to deliver cybersecurity training in Saudi Arabia

Cary, NC. May 22, 2025, CyberNewswire — INE Security, a global leader in Cybersecurity training and certifications, has announced a strategic partnership with Abadnet Institute for Training, a Riyadh-based leader in specialized Information Technology, Cybersecurity, and Networking training.… (more…) The post News alert: INE Security, Abadnet Institute partner to deliver cybersecurity training in Saudi Arabia…

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

Anthropic’s new flagship AI model, Claude Opus 4, is a strong programmer and writer, the company claims. When talking to itself, it’s also a prolific emoji user. That’s according to a technical report Anthropic released on Thursday, a part of which investigates how Opus 4 behaves in “open-ended self-interaction” — i.e. essentially having a chat…

FCC looking to expand anti-robocalling initiative 

Federal Communications Commission Chair Brendan Carr told Congress the agency is looking to expand the use of call authentication protocols that help crack down on robocalling more broadly, while floating the possibility that he may ask for enhanced authorities to take bad actors to court for AI-generated deepfakes over telephone and broadcast networks. While testifying…

BSidesLV24 – PasswordsCon – Breaking Historical Ciphertexts With Modern Means

Authors/Presenters: Elonka Dunin, Klaus Schmeh Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – PasswordsCon – Breaking Historical Ciphertexts With Modern Means appeared first on Security…

A safety institute advised against releasing an early version of Anthropic’s Claude Opus 4 AI model

A third-party research institute that Anthropic partnered with to test one of its new flagship AI models, Claude Opus 4, recommended against deploying an early version of the model due to its tendency to “scheme” and deceive. According to a safety report Anthropic published Thursday, the institute, Apollo Research, conducted tests to see in which…

Anthropic’s new AI model turns to blackmail when engineers try to take it offline

Anthropic’s newly launched Claude Opus 4 model frequently tries to blackmail developers when they threaten to replace it with a new AI system and give it sensitive information about the engineers responsible for the decision, the company said in a safety report released Thursday. During pre-release testing, Anthropic asked Claude Opus 4 to act as…