Geek-Guy.com

Category: Security

Auto Added by WPeMatico

Video: How Omega Systems Puts The Security In MSSP

In this episode of Channel Insider: Partner POV, host Katie Bavoso sits down with Mike Fuhrman, CEO of Omega Systems, to discuss the company’s transformation from a traditional Managed Service Provider (MSP) to a Managed Security Services Provider (MSSP). This shift was a priority for Fuhrman when he joined the company in 2021. Fuhrman explains…

US Army soldier pleads guilty to AT&T and Verizon hacks

Cameron John Wagenius pleaded guilty to hacking AT&T and Verizon and stealing a massive trove of phone records from the companies, according to court records filed on Wednesday. Wagenius, who was a U.S. Army soldier, pleaded guilty to two counts of “unlawful transfer of confidential phone records information” on an online forum and via an…

Hidden Dangers of Security Threats in the Tide of DeepSeek

Recently, DeepSeek attracted global attention and triggered worldwide discussion with its advanced AI models. Meanwhile, it has become the target of hackers and suffered frequent attacks. However, with the continuous improvement of AI large model capabilities, frequent security incidents and increasing risks expose users to greater threats. This post will use the NSFOCUS Large Model…

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking

In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy. We also discuss the first known case where AI chatbots were used in a stalking indictment, highlighting the dangers of technology misuse…

What is an encryption backdoor?

Talk of backdoors in encrypted services is once again doing the rounds after reports emerged that the U.K. government is seeking to force Apple to open up iCloud’s end-to-end encrypted (E2EE) device backup offering. Officials were said to be leaning on Apple to create a “backdoor” in the service that would allow state actors to…

CISO success story: How LA County trains (and retrains) workers to fight phishing

It cost neighboring San Bernardino County $1.1 million to resolve a ransomware attack on its sheriff’s department earlier this year. Jeff Aguilar, the chief information security officer for neighboring Los Angeles County, hopes to prevent a similar fate in any of the 38 county departments he’s charged with safeguarding. Aguilar, who has held high-level security…

Azul Achieves DORA Compliance

In December Azul announced that the integrated risk management practices for its OpenJDK solutions fully support the requirements of the European Union’s Digital Operational Resilience Act (DORA) provisions. The stability, resilience and integrity of Azul’s solution not only ensure DORA compliance but also enhance digital resilience and mitigate risks. Azul received assurance in December, but…

DLP solutions vs today’s cyberthreats: The urgent need for modern solutions

Today’s hybrid network environments are more complex than ever. With workforces and offices now widely distributed, data is actively used across thousands of endpoints, managed and unmanaged, on and off the network. In this new complex environment, insider threats, whether intentional data exfiltration or accidental leaks, add significant challenges for organizations. The rapid adoption of…

Spyware maker caught distributing malicious Android apps for years

Italian company SIO, which sells to government customers, is behind an Android spyware campaign called Spyrtacus that spoofed popular apps like WhatsApp, per security researchers. © 2024 TechCrunch. All rights reserved. For personal use only.

CyberArk snaps up Zilla Security for up to $175M

Identity security company CyberArk has acquired identity governance and administration (IGA) platform Zilla Security in a deal worth up to $175 million. The transaction consists of a $165 million cash portion and an additional $10 million “earn-out” which is payable upon meeting certain milestones — it can be seen as an incentive for the founders…

Händler sichern SB-Kassen mit Künstlicher Intelligenz

Experten sehen ein steigendes Diebstahlrisiko für den Einzelhandel durch den Einsatz von SB-Kassen. adriaticfoto – shutterstock.com Fast jeder kennt sie: Viele Kunden in Deutschland nutzen beim Einkaufen Selbstbedienungskassen. Um die Systeme gegen Betrug zu sichern, setzen immer mehr Unternehmen auf Künstliche Intelligenz. “Viele Händler verwenden KI-gestützte Überwachungs- und Analyse-Tools. Die Zahl der Geschäfte, die entsprechend…

Barcelona-based spyware startup Variston reportedly shuts down

Variston, a Barcelona-based spyware vendor, is reportedly being liquidated. Intelligence Online, a trade publication that covers the surveillance and intelligence industry, reported that a legal notice published in Barcelona’s registry on February 10 confirmed that Variston has gone into liquidation. This comes almost exactly a year after TechCrunch reported that Variston was in the process…

Security compliance firm Drata acquires SafeBase for $250M

Drata, a security compliance automation platform that helps companies adhere to frameworks such as SOC 2 and GDPR, has acquired software security review startup SafeBase for $250 million. SafeBase co-founders Al Yang (CEO) and Adar Arnon (CTO) will retain their roles, and SafeBase will continue to offer a standalone product while bringing its core solutions to…

SGNL snags $30M for a new take on ID security based on zero-standing privileges

Security experts often describe identity as the “new perimeter” in the world of security: in the world of cloud services where network assets and apps can range far and wide, the biggest vulnerabilities are often leaked and spoofed log-in credentials.  A startup called SGNL has built a new approach that it believes is better at…

Ermittler zerschlagen Ransomware-Gruppierung 8Base

Die Gruppierung 8Base nutzte die Ransomware „Phobos“ und agierte weltweit als höchst professionelle kriminelle Organisation. In Deutschland fanden 365 Phobos-Angriffe statt. Gorodenkoff – shutterstock.com Ermittlern aus Bayern ist es zusammen mit internationalen Partnern gelungen, mehrere mutmaßliche Mitglieder einer Gruppe von Cyberkriminellen festzunehmen. Vier führende Köpfe der Gruppierung mit dem Namen 8Base seien in Thailand festgenommen…

DeepSeek erfasst Tastatureingabemuster

Selbst Tastatureingaben in der DeepSeek App können womöglich mitgelesen werden, bevor sie abgeschickt werden. Mojahid Mottakin – shutterstock.com Behörden und Cybersicherheitsfachleute haben gravierende Sicherheitsbedenken gegen die chinesische KI DeepSeek. Dabei geht es um mehrere Punkte: die offenkundig sehr weitreichende Speicherung von Nutzerdaten, die mögliche Manipulierbarkeit der Anwendung für kriminelle Zwecke und die Frage, inwieweit der…

CISA election security officials placed on leave: report

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reportedly placed several members of its election security team on administrative leave. The Associated Press, citing a person familiar with the situation, reports that 17 CISA employees have been placed on leave pending review.  The employees had worked with election officials to counter a range of…

World Economic Forum Annual Meeting 2025: Takeaways, reflections, and learnings for the future

Last week, leaders from around the world gathered at the 55th Annual World Economic Forum (WEF) Meeting in Davos-Klosters, Switzerland. This annual event brings together influential voices from governments, international organizations, civil society, and the private sector to explore opportunities and solutions for global improvement. This year’s theme, “Collaboration for the Intelligent Age,” addressed the…

Why security leaders must ensure they have a recovery plan for Active Directory attacks

With mass digitisation and the rising prevalence of global, highly distributed enterprise, cybersecurity leaders must ensure they can combat Active Directory (AD) attacks. Enterprises rely on their AD installations to manage identities, a critical business activity rising in complexity due to digital transformation, and to operate key systems. It is far more than just the…

WordPress Appliance - Powered by TurnKey Linux