Geek-Guy.com

Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25

Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at unprecedented speeds, and vulnerabilities, whether human or AI-generated, are lingering far too long. What’s the logical outcome? Increased exploitation in your production environment. The strategic imperative is clear: We must implement robust detection and response capabilities…

Critical Commvault SSRF could allow attackers to execute code remotely

Commvault is warning customers of a critical vulnerability affecting Command Center, a web-based management console for its data protection and backup offerings. The flaw, tracked as CV-2025-34028, could allow remote attackers to execute arbitrary code without authentication on affected Linux as well as Windows installations. “This Commvault vulnerability underscores a significant risk: attackers can exploit…

Darcula phishing toolkit gets AI boost, democratizing cybercrime

Enterprise security teams face an immediate escalation in phishing threats as the notorious Darcula toolkit has now started weaponizing generative AI to create highly convincing phishing pages at unprecedented speed and scale. Researchers at cybersecurity firm Netcraft detected this alarming development on April 23, documenting how the platform has evolved to enable even novice attackers…

Avaya Transforms Contact Centers with New Infinity Platform

Avaya just released its new Infinity platform, which is designed to solve the problem of “fragmented” customer experiences. The platform helps businesses transform their contact centers into what they’re calling “connection centers” that build stronger relationships with customers.  Infinity is designed to blend AI and intelligent orchestration into existing business systems, connecting previously siloed channels,…

NVIDIA Announces General Availability for NeMo Microservices

Multinational technology company NVIDIA recently announced that its NeMo microservices will now be generally available to help enterprise IT build AI teammates using data flywheels to scale employee productivity. These microservices provide an end-to-end platform for building AI agents to scale employee productivity with data flywheels using human and AI feedback, and are informed by…

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  “The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this…

Vor diesen Ransomware-Banden sollten Sie sich hüten

loading=”lazy” width=”400px”>Ransomware-Attacken werden immer mehr. Höchste Zeit, die Schutzmaßnahmen hochzufahren. Zephyr_p – shutterstock.com In den ersten drei Monaten des laufenden Jahres gab es einen neuen Höchststand bei den weltweit gemeldeten Ransomware-Vorfällen. Laut dem aktuellen Bericht State of Ransomware von Check Point Research (CPR) haben Hacker im ersten Quartal 2025 insgesamt 2.289 Unternehmen erpresst – 126…

Hackers access sensitive SIM card data at South Korea’s largest telecoms company

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this month that saw malware infiltrate its internal systems, and access data related to customers’ SIM cards. Read more in my article on the Hot for Security blog.

Cybercriminals switch up their top initial access vectors of choice

Third-party involvement in breaches and exploitation of vulnerabilities have become more important factors in security breaches, according to the latest edition of Verizon’s Data Breach Investigation Report (DBIR). An analysis of 22,000 security incidents, including 12,195 confirmed data breaches in 139 countries, found that credential abuse (22%) and exploitation of vulnerabilities (20%, up from 14.9%…

6 types of risk every organization must manage — and 4 strategies for doing it

Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your organization. That’s a straightforward description of a generic process, but as any IT leader knows, risk management applied to your industry or company is anything but. To help break down this complex process, this article provides an overview…

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below – CVE-2025-27610 (CVSS score: 7.5) – A path…

RSAC 2025 Innovation Sandbox | Aurascape: Reconstructing the Intelligent Defense Line of AI Interactive Visibility and Native Security

Company Overview Aurascape is a cybersecurity startup founded in 2023 and headquartered in Santa Clara, California, USA. The company was co-founded by senior security experts and engineers from world-class technology companies such as Palo Alto Networks, Google, and Amazon. The team has deep expertise in the fields of network security, artificial intelligence, and network infrastructure,…

A Smarter Alternative to Entra Permissions Management

Microsoft has announced the retirement of Entra Permissions Management (formerly CloudKnox), with sales ending June 30, 2025. EPM offered valuable visibility into cloud permissions, helping teams identify overprivileged identities across AWS, Azure, and GCP. But for many organizations, that visibility came with significant manual overhead: Policy rewrites, change windows, and time-consuming investigations. As EPM sunsets,…

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were “installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024,” JPCERT/CC researcher Yuma

Ransomware-Angriff auf guenstiger.de

Das Portal von guenstiger.de ist online – was die Hacker jedoch im Backend angerichtet haben, darüber liegen noch keine Informationen vor. guenstiger.de Das deutsche Preisvergleichsportal guenstiger.de ist Opfer einer Ransomware-Attacke geworden. In der Nacht vom 23. auf den 24. April seien die Angreifer in die Systeme des Anbieters eingedrungen, teilten die Verantwortlichen in einem LinkedIn-Post…

TechCrunch StrictlyVC in Athens in May will feature a special guest: the Greece Prime Minister

We’re thrilled to announce that Greece Prime Minister Kyriakos Mitsotakis will be joining us at our upcoming StrictlyVC event in Athens, co-hosted with Endeavor, on Thursday night, May 8, at the stunning Stavros Niarchos Foundation Cultural Center. For those who might not be familiar with his background, Mitsotakis brings a fascinating blend of experiences to…

Bezos-backed Slate Auto debuts analog EV pickup truck that is decidedly anti-Tesla

A new American electric vehicle startup called Slate Auto has made its debut, and it’s about as anti-Tesla as it gets. It’s affordable, deeply customizable, and very analog. It has manual windows and it doesn’t come with a main infotainment screen. Heck, it isn’t even painted. It can also transform from a two-seater pickup to…

Lesson from huge Blue Shield California data breach: Read the manual

CISOs can learn two lessons from a US health insurance provider’s admission this month that misconfiguring Google Analytics led to the disclosure of personal health information of 4.7 million subscribers, says an expert. Those lessons, according to Brandon Evans, a senior instructor at the SANS Institute and a Tennessee-based independent security consultant, boil down to…

Faraday Future founder named co-CEO three years after being sidelined by internal probe

Troubled electric vehicle startup Faraday Future’s board of directors has appointed founder Jia Yueting as the company’s co-CEO, three years after he was sidelined following an internal probe into allegations of fraud — a probe that led to a investigation by the Securities and Exchange Commission that remains ongoing. Jia will serve alongside current CEO…

As clock ticks, vendors slowly patch critical flaw in AMI MegaRAC BMC firmware

Weeks after BIOS developer AMI released an update fixing a critical vulnerability in its MegaRAC baseband management controller (BMC) firmware used in many enterprise servers and storage systems, OEM patches addressing the issue are slowly trickling out. A BMC is an embedded chip that allows IT teams to monitor, troubleshoot, and control servers remotely via…

Anthropic CEO wants to open the black box of AI models by 2027

Anthropic CEO Dario Amodei published an essay Thursday highlighting how little researchers understand about the inner workings of the world’s leading AI models. To address that, Amodei set an ambitious goal for Anthropic to reliably detect most AI model problems by 2027. Amodei acknowledges the challenge ahead. In “The Urgency of Interpretability,” the CEO says Anthropic has…

CISA gets new No. 2: Madhu Gottumukkala

The Cybersecurity and Infrastructure Security Agency will soon have a new second-in-command. Madhu Gottumukkala has been named deputy director. He comes over to CISA from his prior position in the South Dakota government, where Kristi Noem was most recently governor before taking over as secretary of the Department of Homeland Security. Gottumukkala had been commissioner…

VulnCheck spotted 159 actively exploited vulnerabilities in first few months of 2025

Attackers exploited nearly a third of vulnerabilities within a day of CVE disclosure in the first quarter of 2025, VulnCheck said in a report released Thursday. The company, which focuses on vulnerability threat intelligence, identified 159 actively exploited vulnerabilities from 50 sources during the quarter. The time from CVE disclosure to evidence of exploitation in…

AI speeds up analysis work for humans, two federal cyber officials say

Two federal cybersecurity officials said Thursday that they’re using — or contemplating using — artificial intelligence to conduct tasks that speed up the work of human analysts. AI is an important current and future contributor to a variety of security-related administrative jobs like accreditation and compliance, and for the Department of the Air Force as…

Vanta Announces New AI Security Assessment

Vanta, a trust management platform, has recently unveiled a new AI Security Assessment offering to provide organizations with a means of demonstrating AI security and evaluating AI risk across their ecosystems. Assessments target the growing need to address AI security proactively Customers who use, develop, or build with AI can utilize this assessment tool to…

Intel reverses course, opts not to spin out Intel Capital

Semiconductor giant Intel won’t spin out its venture arm, Intel Capital, after all. During Intel’s Q1 earnings call Thursday, Intel CEO Lip-Bu Tan said the company has reversed its decision to spin out its 34-year-old venture arm. Instead, Intel Capital will remain internal and continue to invest with Intel’s interests in mind. “We have made…

Public comments to White House on AI policy touch on copyright, tariffs

Individuals, industry groups, and local governments submitted over 10,000 comments to the White House about its work-in-progress national AI policy, also known as the AI Action Plan. The White House Office of Science and Technology Policy (OSTP) on Thursday published the text of the submissions in a PDF spanning 18,480 pages. The comments, which touch…

Calm Your NHI Management Concerns

What if You Could Calm Your NHI Management Concerns? Where businesses are migrating to the cloud at an astonishing pace, the security of Non-Human Identities (NHIs) and their associated secrets has become an absolutely critical concern. NHIs and their associated secrets, if not managed correctly, can significantly increase the risk of security breaches and data…

Is Your Cybersecurity Scalable Enough?

Are Your Cybersecurity Efforts Truly Scalable? A question all organizations grapple with: is your cybersecurity infrastructure ready to adapt, evolve and scale alongside your business? Achieving scalable cybersecurity solutions forms the bedrock of data protection strategies. Not just from the viewpoint of managing the increasing volume of data, but also to combat advanced threats that…

Feel Reassured with Enhanced Data Security

How Can We Mitigate Security Risks? Finding an answer to this pressing question is crucial. The answer often lies in focusing on enhanced data security. While organizations are transitioning to digitized platforms, protecting digital assets becomes paramount. Where does enhanced data security fit into this equation, and how can it reassure organizations about the safety…

Empowered by Better Secrets Vaulting

Why is Secrets Vaulting a Critical Component of Modern Cybersecurity? Several organizations have stepped up to embrace digital transformation, only to overlook a crucial aspect of cybersecurity- Non-Human Identities (NHIs) and Secrets Security Management. Without effective secrets vaulting, organizations are left exposed to the risk of unauthorized access and data breaches. But what makes secrets…

Astro Teller is joining us at TechCrunch Disrupt 2025 in October

We are thrilled to announce that Astro Teller, the head honcho of Alphabet’s “moonshot factory,” X, will be joining us as a featured speaker at TechCrunch Disrupt 2025, happening from October 27-29 at Moscone West in San Francisco. The whole affair promises to be fun-filled and rife with intel and insights that you won’t want…

Judge tosses citizenship provisions in Trump elections order

A federal court partially blocked a Trump administration executive order Thursday that seeks to impose requirements on states to use the White House’s definition of “documentary proof” of citizenship, inhibit mail voting and other election-related elements by threatening to withhold federal funding.  The order was subject to multiple lawsuits from Democratic Party organizations as well…

Evernote founder’s video startup mmhmm becomes Airtime, launches new products

Evernote founder Phil Libin is ready to liven up your video meetings. The entrepreneur’s video startup, mmhmm, launched in 2020 amid the pandemic, on Thursday unveiled its latest product: a video toolkit for online meetings called Airtime. The suite includes two related tools: a virtual camera that helps you appear more polished on video calls,…

Report: Adam Neumann’s Flow raises $100M+, more than doubles valuation to $2.5B

Former WeWork CEO Adam Neumann has raised over $100 million in capital for his proptech startup, Flow, in a round that values that company at about $2.5 billion, Bloomberg reported on Thursday.  Citing anonymous sources familiar with the deal, Bloomberg reported that existing backer Andreessen Horowitz (a16z) participated in the financing. Neumann told Bloomberg that…

Report: Neumann’s Flow raises $100M+, more than doubles valuation to $2.5B

Former WeWork CEO Adam Neumann has raised over $100 million in capital for his proptech startup, Flow, in a round that values that company at about $2.5 billion, Bloomberg reported on Thursday.  Citing anonymous sources familiar with the deal, Bloomberg reported that existing backer Andreessen Horowitz (a16z) participated in the financing. Neumann told Bloomberg that…

You’re invited to a fireside chat with Baiju Bhatt on Sand Hill Road on June 18 at StrictlyVC

We’re thrilled to announce that Baiju Bhatt, co-founder of Robinhood and founder and CEO of Aetherflux, will be joining us for a rare, intimate fireside chat as part of TechCrunch’s StrictlyVC evening series on June 18 on Sand Hill Road in Menlo Park. As with all of our StrictlyVC evenings, the event will feature just…

Meta conducts layoffs in Oculus Studios, impacting VR exercise app Supernatural

Meta laid off employees on Thursday in its Reality Labs division, which encompasses various virtual and augmented reality projects. The cuts impact employees within Oculus Studios, which develops apps and games for Meta’s Quest headsets. Meta did not specify how many people were impacted by the layoffs, but said that the cuts impacted people working…

Parents who lost children to online harms protest outside of Meta’s NYC office

Meta may have managed to kill a bipartisan bill to protect children online, but parents of children who have suffered from online harm are still putting pressure on social media companies to step up. On Thursday, 45 families who lost children to online harms – from sextortion to cyberbullying – held a vigil outside of…

Threads officially moves to Threads.com and updates its web app

Instagram Threads, Meta’s newest social network and X competitor, is officially relocating from the website Threads.net to Threads.com. The transition will coincide with a handful of quality-of-life improvements for the Threads web app, including features to more easily access custom feeds, saved posts, and likes, as well as other tools for creating new columns, copying…

RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity

As enterprises brace for a new wave of stealthy intrusions — so-called Typhoon attacks — security leaders are doubling down on network intelligence that goes beyond surface-level alerts. Related: What is NDR? In this RSAC 2025 Fireside Chat, I sat … (more…) The post RSAC Fireside Chat: The NDR evolution story—from open source start to…

Flex acquires a16z-backed Maza for $40M as fintech M&A heats up

Flex, a startup that offers personal finance software for business owners, has acquired Maza, a finance app aimed at Spanish speakers in the U.S., for $40 million, the companies told TechCrunch exclusively. At first glance, the pairing may seem a bit curious. Flex’s software and payments infrastructure is to help business owners have a single…

Netflix now offers dialogue-only subtitles

Netflix just introduced a new way to experience subtitles that eliminates the need to read audio cues like “door slams” or “phone rings.”  Announced on Thursday, Netflix’s new dialogue-only subtitles can be enabled by going to “Navigate to Audio” and then “Subtitles.” Users will see an option labeled “English” instead of “English (CC),” indicating that…

Client-Side Security Breach Alert: Blue Shield of California Exposes 4.7 Million Members’ Health Data Through Web Analytics Configuration

by Source Defense A recent incident at Blue Shield of California highlights the critical importance of client-side security controls when implementing third-party scripts on healthcare websites. The nonprofit health plan has disclosed a significant data breach affecting 4.7 million members, stemming from a misconfiguration of Google Analytics on their web properties between April 2021 and…

Facebook cracks down on spammy content by cutting reach and monetization

Facebook will begin lowering the reach of accounts sharing spammy content and making them ineligible for monetization, Meta announced on Thursday. The company is also increasing efforts to remove Facebook accounts that coordinate fake engagement and impersonate others, it says. The move comes as Meta CEO Mark Zuckerberg has promised a return to “OG Facebook.”…

TikTok adds support for ALT text for photos

TikTok is rolling out support for ALT text for photo posts to make content more accessible for users with visual and cognitive impairments. The company says creators can now provide descriptive text for photos to help users with screen readers understand the visual content through spoken descriptions. TikTok told TechCrunch in an email that creators…

Spotify’s AI playlist rolls out to Asia and more markets

Spotify announced on Thursday that it expanded the availability of its AI Playlist feature to over 40 additional markets, including countries in Africa, Asia, Europe, and the Caribbean.  The AI-powered tool, currently in beta on Android and iOS devices, lets listeners create personalized playlists based on written prompts, such as “workout music to make my…

Speak at TechCrunch Disrupt 2025: Applications now open

TechCrunch Disrupt returns October 27–29 to Moscone West in San Francisco — and we’re inviting thought leaders, founders, VCs, and tech experts to apply for a chance to take the stage at one of the most anticipated tech events of the year. Applications are now open to speak at Disrupt 2025, where over 10,000+ tech…

WordPress Appliance - Powered by TurnKey Linux