Geek-Guy.com

ChatGPT API flaws could allow DDoS, prompt injection attacks

OpenAI-owned ChatGPT might have a vulnerability that could allow threat actors to launch distributed denial of service (DDoS) attacks on unsuspecting targets.   According to a discovery made by German security researcher Benjamin Flesch, the ChatGPT crawler, which OpenAI uses to collect data from the internet to improve ChatGPT, can be tricked into DDoSing arbitrary websites.  …

A business owner’s guide to integrating SASE for improved data governance and compliance

GUEST OPINION: Data governance and compliance have become critical priorities for modern businesses as regulatory requirements tighten and cyber threats grow more sophisticated. For business owners navigating these challenges, Secure Access Service Edge (SASE) offers a powerful solution. SASE’s unified architecture combines advanced security and networking capabilities, enabling organizations to protect sensitive data, enforce compliance…

Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

COMPANY NEWS:  Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies Exabeam as a trusted innovator, providing real AI to automate cybersecurity while competitors underdeliver. LogRhythm Intelligence Copilot harnesses purpose-driven…

MoneyHash, which provides single access to payment services in MENA, banks $5.2M

When merchants or companies launch online, they typically start by partnering with one or two payment processors. But as they grow and expand into new regions, they often need to onboard additional payment partners to meet different customer (and sometimes regulatory) needs, a process that comes with some hurdles.  That’s given rise to companies to…

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, “Were all functionalities of the web app tested?” or ” Were there any security issues that could have been identified during testing?” often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among…

7 top cybersecurity projects for 2025

As 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends. Strong and carefully planned cybersecurity projects are the best way to stay a step ahead of attackers and prevent them gaining the upper hand. “Urgency is the mantra for 2025,” says Greg Sullivan, founding partner of cybersecurity services firm CIOSO…

Staying Ahead: Key Cloud-Native Security Practices

Can Effective Non-Human Identities and Secrets Management Bolster Your Cloud-Native Security Practices? The revolution in technology has seen a significant shift in business operations, with many organizations adopting cloud-native applications. These applications offer various benefits, including scalability, versatility, and cost-efficiency. However, they also open a Pandora’s box of security threats. In the sea of these…

Getting Better: Advances in Secrets Rotation Tech

Why is Secrets Rotation Technology Crucial in the Data Security Landscape? The safety of sensitive information matters more than ever. With the proliferation of Non-Human Identities (NHIs) and a marked increase in cyber threats, the management of these identities is an integral part of the data management ecosystem. This is where Secrets Rotation technology shines,…

Feel Reassured with Robust Machine Identity Protocols

Why Are Machine Identity Protocols Crucial for Robust Security Measures? Imagine opening your virtual “front door,” only to find unknown software entities exploring your data terrain. Chilling, isn’t it? Well, that’s where Machine Identity Protocols step in. They act as vigilant watchmen, identifying authorized non-human identities (NHIs) and keeping unauthorized ones at bay. So, let’s…

EU to take aim at healthcare cyber threat

The European Commission is presenting an action plan to strengthen cybersecurity in healthcare as one of its key priorities in the first 100 days of the commission’s new mandate. The healthcare sector has been under increasing pressure from cyberattacks in the past few years, with 309 cybersecurity incidents reported by member states in 2023. Ransomware…

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week. The infection chain commences…

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to assess the “level of security,” CERT-UA added, cautioning organizations to be on the lookout for such social…

Karmen secures $9.4 million for its revenue-based financing products

French startup Karmen has secured a small funding round so that it can improve its instant financing products. The company offers short-term loans to small companies facing a working capital crunch. It’s a €9 million equity-and-debt round ($9.4 million at today’s exchange rates) with Seventure Partners buying a stake in the small startup. Financière Arbevel…

So geht Tabletop Exercise

Übung macht den Incident-Response-Meister. Foto: GaudiLab – shutterstock.com Die Bedrohungslage entschärft sich bekanntermaßen nie – umso wichtiger ist es, dass Sicherheitsentscheider und ihre Teams nicht in eine Schockstarre verfallen, wenn ein Ernst-, beziehungsweise Notfall auftritt. An dieser Stelle kommen Cybersecurity Tabletop Exercises ins Spiel. In diesem Artikel lesen Sie: wie sich Tabletop-Übungen definieren, wie Sie…

Weekly Update 435

If I’m honest, I was in two minds about adding additional stealer logs to HIBP. Even with the new feature to include the domains an email address appears against in the logs, my concern was that I’d get a barrage of “that’s useless information” messages like I normally do when I load stealer logs! Instead,…

President Trump signs exec order to make Musk’s DOGE commission more official

The Department of Government Efficiency (DOGE), an advisory commission spearheaded by billionaire Elon Musk recommending deep cuts to federal agencies, could soon become more official, should an executive order signed by President Donald Trump pass legal muster. On Monday evening, Trump signed an order that renames the U.S. Digital Service, which was created in 2014…

Trump signs exec order, delaying TikTok enforcement action for 75 days

President Donald Trump has signed an executive order aimed at restoring TikTok service in the U.S. The order instructs relevant government agencies to “pursue a resolution” that “protects national security” while “saving [TikTok.]”  Via the order, Trump is instructing the U.S. Attorney General not to take any action for 75 days to enforce the Protecting…

President Trump repeals Biden’s AI executive order

During his first day in office, President Donald Trump revoked a 2023 executive order signed by former President Joe Biden that sought to reduce the potential risks AI poses to consumers, workers, and national security. Biden’s executive order directed the Commerce Department’s National Institute of Standards and Technology (NIST) to author guidance that helps companies…

UK to unveil ‘Humphrey’ assistant for civil servants with other AI plans to cut bureaucracy

A week after the U.K. government announced a sweeping plan to make big investments into AI, it’s laying out more details around how this will take shape in the public sector. On the agenda: AI assistants to speed up public services; data sharing deals across siloed departments; and a new set of AI tools —…

OpenAI’s agent tool may be nearing release

OpenAI may be close to releasing an AI tool that can take control of your PC and perform actions on your behalf. Tibor Blaho, a software engineer with a reputation for accurately leaking upcoming AI products, claims to have uncovered evidence of OpenAI’s long-rumored Operator tool. Publications including Bloomberg have previously reported on Operator, which…

Friend delays shipments of its ‘AI companion’ pendant

Friend, a startup creating a $99, AI-powered necklace designed to be treated as a digital companion, has delayed its first batch of shipments until Q3. Friend had planned to ship devices to pre-order customers in Q1. But according to co-founder and CEO Avi Schiffman, that’s no longer feasible. “As much as I would liked to…

US safety regulators expand Ford hands-free driving tech investigation

A U.S. federal safety regulator has “upgraded” its investigation into Ford’s hands-free advanced driver assistance system known as BlueCruise — a required step before a recall can be issued. The National Highway Traffic Safety Administration’s Office of Defects Investigation launched a probe into Ford BlueCruise last April after the agency confirmed the system was active…

At the Microsoft Excel World Championship, selfies and a ‘hype’ tunnel

An arena. A hype tunnel, the kind through which NBA players typically streak. A competitor dressed in a jersey patterned with a six-pack abs. In a new piece, the New York Times takes readers to an event that organizers call the Microsoft Excel World Championship, a 40-minute, Las Vegas-based competition featuring 12 contestants — all…

Powering profits with sunshine: How businesses are leading the Solar Revolution

GUEST OPINION: As the global push for sustainability intensifies, businesses are stepping up to the challenge, not just out of environmental responsibility but for strategic economic advantage. Solar energy has emerged as a cornerstone of this transformation, offering companies a chance to cut costs, boost profits, and enhance their reputations. Welcome to the solar revolution,…

DOGE Got Sued Three Times While Elon Musk Watched The Trump Inauguration

In less than 30 minutes on Monday, Elon Musk and his so-called Department of Government Efficiency were hit with three different lawsuits over the legal status of the effort to find federal regulations to eliminate and federal employees to fire. The lawsuits landed as Musk rubbed elbows with fellow billionaires at President Donald Trump’s inauguration.…

Flipboard’s new app Surf adds its own video feed, too

After the TikTok ban went into effect on Sunday, social network Bluesky launched a custom feed for videos on its platform. Now, Flipboard’s newest app, Surf, which is dedicated to browsing the open social web and decentralized services like Mastodon and Bluesky, is taking advantage of that move to introduce a video feed of its…

DeepSeek claims its reasoning model beats OpenAI’s o1 on certain benchmarks

Chinese AI lab DeepSeek has released an open version of DeepSeek-R1, its so-called reasoning model, that it claims performs as well as OpenAI’s o1 on certain AI benchmarks. R1 is available from the AI dev platform Hugging Face under an MIT license, meaning it can be used commercially without restrictions. According to DeepSeek, R1 beats…

RedNote, Flip, Clapper and Likee claim the top of the App Store as TikTok comes back online

TikTok may be back, but that hasn’t prevented other Chinese competitors from gaining users. In the lead up to a ban on TikTok — which kicked off Sunday and lasted a day — a number of other video apps rose through the ranks and now dominate the App Store’s Top Charts. The Chinese app RedNote…

Meta confirms it will keep fact-checkers outside the U.S. ‘for now’

Meta says it plans to keep its fact-checking program in place outside the U.S. for the time being, though it could eventually expand it elsewhere. “We’ll see how that goes as we move it out over the years,” Meta’s head of global business Nicola Mendelsohn told Bloomberg in a report from Davos on Monday. “So…

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. “Internet hosts that accept tunneling packets without verifying the sender’s identity can be hijacked to perform anonymous attacks and provide access to their networks,” Top10VPN said in a study, as part of a collaboration…

Here are the types of AI companies enterprise VCs want to back in 2025

The AI startup market is sprawling, from companies looking to develop new chips, to those using AI to build robots, to others looking to use AI to create niche solutions for industry-specific workflows. There are a lot of potential areas for venture capitalists to invest in, but there are clearly a few subsectors they are…

Cyberangriff auf Bundesdruckerei-Tochter

2476561975 TippaPatt – Shutterstock.com Die D-Trust GmbH fungiert als Trustcenter der Bundesdruckerei. Nach eigenen Angaben stellte das Unternehmen am 13. Januar fest, dass das Antragsportal für Signatur- und Siegelkarten von Cyberkriminellen angegriffen wurde. Bei dem Angriff seien möglicherweise personenbezogene Daten von Antragstellern entwendet worden, heißt es in einer offiziellen Mitteilung. Berichten zufolge teilte D-Trust in…

Rimini Street ‘honoured by clients and industry’ with Buyer’s Choice, Service and Leadership Awards

Company continues to lead the third-party software support and innovation solutions market, focusing on delivering strategic, operational and financial success for its clients COMPANY NEWS: Rimini Street, a global provider of end-to-end enterprise software support and innovation solutions, the leading third-party support provider for Oracle, SAP and VMware software, today announced it has been honoured…

Sources: AI vision startup Metropolis is buying Oosto (formerly known as AnyVision) for just $125M

The general hype around all things AI is not lifting all boats: certain startups continue to struggle and are looking for exits. In one of the latest developments, TechCrunch has heard from a reliable source that Metropolis, an AI-powered parking platform, is buying Oosto, the controversial computer vision company that used to be known as…

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]

As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that…

HPE’s sensitive data exposed in alleged IntelBroker hack

IntelBroker has struck again. This time, the notorious BreachForums bigwig, which has a long list of high-profile victims, including Europol, Cisco, and GE, has claimed to have breached IT giant Hewlett Packard Enterprise (HPE). The suspected Serbian-origin hacker is offering to sell on BreachForums, sensitive data allegedly stolen from HPE including product source codes and…

Vectra AI launches scholarship programme to foster the next Generation of talent in AI and cybersecurity

The Vectra AI Scholars Programme will empower students to develop creative solutions that harness the power of AI to identify patterns of attacker behaviour across the expanding hybrid attack surface COMPANY NEWS: Vectra AI, the leader in AI-driven XDR (extended detection and response), today announced the launch of the Vectra AI Scholars Programme, a scholarship…

Blinkit signals costly battle ahead in Indian quick commerce market

Zomato’s quick commerce unit Blinkit is accelerating its expansion and expects continued losses as competition intensifies in India’s instant delivery market. Blinkit now aims to reach 2,000 dark stores – small warehouses in residential areas that exclusively service online orders – by December 2025, a year ahead of its previous guidance, after exceeding 1,000 stores…

How African VC firm Oui Capital returned its first fund with Moniepoint’s unicorn exit

At a recent investor meeting, early-stage African investor Oui Capital informed limited partners that it had returned its $4 million debut fund following the sale of some shares in the business banking platform Moniepoint. The African fintech unicorn has so far proven to be a standout investment for five-year-old Oui Capital. When it launched its…

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data, user privacy, and other resources while streamlining compliance, preventing fraud, and establishing accountability. In fact, broken authentication is one of the leading causes of API-related breaches.  Ultimately, by applying robust authentication mechanisms, organizations can dramatically…

Midsize firms universally behind in slog toward DORA compliance

Beginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with the Digital Operational Resilience Act (DORA). The EU directive aims to increase cybersecurity in the financial industry. However, studies show that many companies are still struggling with implementation. According to a November 2024 survey from metafinanz, the average level…

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below – @async-mutex/mutex, a typosquat of async-mute (npm) dexscreener, which masquerades as a library for accessing…

Diese Security-Technologien haben ausgedient

Zeit für eine Frischzellenkur? JL_OFF | shutterstock.com Sicherheitsentscheidern steht eine ständig wachsende Auswahl von digitalen Tools zur Verfügung, die sie dabei unterstützen, Cyberattacken abzuwehren. Und wie aktuelle Zahlen von Gartner belegen, nutzen sie diese auch ausgiebig: Demnach prognostizieren die Marktforscher für das Jahr 2025 einen Anstieg der Ausgaben für Cybersicherheit um 15 Prozent von 87,5…

How to stream Donald Trump’s Inauguration Day 2025

Donald Trump will take the presidential oath of office on Monday in front of the Capitol building in Washington, D.C., once again. The event takes place at noon ET and is expected to attract considerable attention from both supporters and opponents. How to stream Trump’s inauguration You can watch the inauguration live with cable or…

AI benchmarking organization criticized for waiting to disclose funding from OpenAI

An organization developing math benchmarks for AI didn’t disclose that it had received funding from OpenAI until relatively recently, drawing allegations of impropriety from some in the AI community. Epoch AI, a nonprofit primarily funded by Open Philanthropy, a research and grantmaking foundation, revealed on December 20 that OpenAI had supported the creation of FrontierMath.…

The Pentagon says AI is speeding up its ‘kill chain’

Leading AI developers, such as OpenAI and Anthropic, are threading a delicate needle to sell software to the United States military: make the Pentagon more efficient, without letting their AI kill people. Today, their tools are not being used as weapons, but AI is giving the Department of Defense a “significant advantage” in identifying, tracking,…

WordPress Appliance - Powered by TurnKey Linux