Geek-Guy.com

Developer Leaks API Key for Private Tesla, SpaceX LLMs

In AI, as with so many advancing technologies, security often lags innovation. The xAI incident, during which a sensitive API key remained exposed for nearly two months, is a stark reminder of this disconnect. Such oversights not only jeopardize proprietary technologies but also highlight systemic vulnerabilities in API management. As more organizations integrate AI into…

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The high-severity vulnerability, tracked as CVE-2025-4664 (CVSS score: 4.3), has been characterized as a case of insufficient policy enforcement in a component called Loader. “Insufficient policy enforcement…

Die acht wichtigsten Sicherheitsmetriken

Je schneller Schwachstellen entdeckt werden, desto geringer der Schaden. Das zahlt sich für alle aus. Pressmaster – shutterstock.com Kennzahlen und Metriken wie KPIs sind essenziell, um die Effektivität der Cyberabwehr zu bewerten, da sie Schwachstellen, Bedrohungen und Reaktionsfähigkeit sichtbar machen. Trotz der Vielzahl möglicher Indikatoren sind nur wenige besonders relevant und unverzichtbar für eine erfolgreiche…

Deputy unveils enterprise-grade analytics+ to ‘power smarter workforce decisions’ for shift-based businesses

Built for scale with detailed insights to optimise operations and drive profitability Deputy, the workforce management platform for shift work, has announced the global launch of Deputy Analytics+, a next-generation business intelligence and reporting solution that gives businesses of all sizes enterprise-grade technology to power smarter decisions, improve efficiency, and drive profitability.

Billionaire founder of Luminar replaced as CEO following ethics inquiry

Austin Russell, who became a billionaire after his lidar startup Luminar went public, appears to be out as CEO, according to the company’s board. Luminar’s board announced Wednesday — the same day of its first-quarter earnings report — it had replaced Russell and appointed Paul Ricci to the role. Ricci is the former Chairman and…

Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters

Don’t get duped, doxxed, or drained! In this episode of “Smashing Security” we dive into the creepy world of sextortion scams, and investigate how crypto wallet firm Ledger’s Discord server was hijacked in an attempt to phish for cryptocurrency recovery phrases. All this and more is discussed in the latest edition of the award-winning “Smashing…

Ivanti patches two EPMM flaws exploited in the wild

IT software company Ivanti released emergency patches for its enterprise mobile device management (MDM) solution after learning of in-the-wild attacks exploiting two previously unknown vulnerabilities. The two flaws have moderate and high severity, but when combined in an exploit chain, they enable unauthenticated remote code execution on Ivanti Endpoint Manager Mobile (EPMM). “We are aware…

YouTube introduces an interactive product feed for shoppable TV ads

YouTube made its pitch to advertisers on Wednesday, accompanied by a flashy performance from Lady Gaga and special appearances from popular YouTubers like Brittany Broski and MrBeast.  During its upfront presentation, YouTube executives introduced new ad formats coming to the platform, including an enhanced shoppable connected TV (CTV) offering that includes a new interactive product…

YouTube targets TV dollars with NFL deal, bingeable ‘shows’ from creators

YouTube announced a range of initiatives designed to attract more TV ad dollars to its platform at Brandcast, its annual Upfront event for advertisers. Notably, the Google-owned video service is expanding its relationship with the NFL and plans to exclusively stream the NFL’s first Friday game of the 2025-2026 season. It’s also preparing to pilot…

YouTube viewers will start seeing ads after ‘peak’ moments in videos

Imagine you’re watching a highly anticipated video from your favorite YouTube creator—perhaps the moment a famous couple finally gets engaged—when an ad pops up immediately after the clip. This is part of YouTube’s new ad format called “Peak Points.” The company revealed the new ad format during its upfront presentation on Wednesday in New York.…

Continuous Improvement in NHIs Management

Can Continuous Improvement in NHIs Management Be the Key to Securing Your Operations? You’re no stranger to the importance of vigilant cybersecurity. But have you considered the role of Non-Human Identities (NHIs) and Secrets Security Management in fortifying your organization’s defense? The strategic employment of NHIs management is evolving into a game-changer for many industries,…

Cultivate Independent Secrets Management Protocols

Why is Independent Secrets Management Crucial for Cybersecurity? How crucial do you believe independent secrets management is to your organization’s cybersecurity strategy? I’ve seen firsthand how managing Non-Human Identities (NHIs) and their secrets can immensely impact an organization’s security posture. The management of NHIs aims to bridge the gap between security and R&D teams, providing…

Building Trust Through Secure NHIs Practices

How Can We Cultivate Trust with Secure NHIs Practices? When we navigate in increased digital interconnection, establishing trust in cybersecurity practices becomes paramount. But how do we foster such trust? The answer lies in secure Non-Human Identities (NHIs) management practices. NHIs are machine identities employed within cybersecurity frameworks. They are birthed by merging a unique…

Stay Relaxed with Efficient Non-Human Identity Security

Are You Safe With Your Current Non-Human Identity Security? The migration of services to the cloud promises flexibility, scalability, and reduced operational costs. But how confident are you about the security of your data in the cloud? A pivotal aspect often overlooked is the management of Non-Human Identities (NHIs) and their secrets. What Does it…

CFPB to withdraw rule targeting data brokers

The Consumer Financial Protection Bureau is set to withdraw a Biden-era rule aimed at cracking down on data brokers and their selling of Americans’ personal and financial information. In a notice set to publish Thursday in the Federal Register, the CFPB said legislative rulemaking on the data broker industry “is not necessary or appropriate at…

Waymo recalls 1,200 robotaxis following low-speed collisions with gates and chains

Waymo issued a software recall on 1,200 self-driving vehicles after some of its robotaxis were involved in minor collisions with gates, chains, and other gate-like roadway objects. The software update, which was first reported by Reuters, was conducted late last year, according to documents filed with the National Highway Traffic Safety Administration. The Alphabet-owned company…

Foxconn gets nod for $435M project to make more of Apple chips in India, eventually

Foxconn, a key manufacturer for Apple, has received an approval from India’s cabinet to build a new 37 billion Indian rupees ($435 million) semiconductor plant in a joint venture with the country’s IT giant HCL Group. The deal is the latest move to reduce Apple’s reliance on China and produce more components in India. The…

The Kids Online Safety Act is back, with the potential to change the internet

The Kids Online Safety Act (KOSA) has been reintroduced into Congress. If passed into law, this bill could impose some of the most significant legislative changes that the internet has seen in the U.S. since the Children’s Online Privacy Protection Act (COPPA) of 1998. As it currently stands, KOSA would be able to hold social…

BSidesLV24 – GroundFloor – A Quick Story Of Security Pitfalls With Exec Commands In Software Integrations

Author/Presenter: Lenin Alevski Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – GroundFloor – A Quick Story Of Security Pitfalls With Exec Commands In Software Integrations…

DHS won’t tell Congress how many people it’s cut from CISA

The Department of Homeland Security won’t tell Congress how many employees at the Cybersecurity and Infrastructure Security Agency it has fired or pushed to leave, a top congressional Democrat said Wednesday. “You’ve overseen mass reductions in the workforce at CISA and” the Federal Emergency Management Agency, Mississippi Rep. Bennie Thompson, the top Democrat on the…

Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

Samsung has released software updates to address a critical security flaw in MagicINFO 9 Server that has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-4632 (CVSS score: 9.8), has been described as a path traversal flaw. “Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version…

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver, indicating that multiple threat actors are taking advantage of the bug. Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and…

SoundCloud backtracks on AI-related terms of use updates

SoundCloud says it’s revising its terms after widespread backlash over a clause related to AI model training. Earlier this year, SoundCloud quietly updated its usage policies, adding wording that many users interpreted as legal cover to allow the company to train AI on audio uploaded to its platform. SoundCloud was quick to assert that it wasn’t…

Hacking the Hardware Brains of Computers is the Ultimate Cyberattack

Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware proof-of-concept that infects at the hardware layer, inside the CPU, is truly scary. The research demonstrates just how real this threat could become. He was able to…

MCP, OAuth 2.1, PKCE, and the Future of AI Authorization

6 min readThe MCP authorization spec sets a new standard for securing non-human AI agents – with lessons for anyone building autonomous, scalable systems. The post MCP, OAuth 2.1, PKCE, and the Future of AI Authorization appeared first on Aembit. The post MCP, OAuth 2.1, PKCE, and the Future of AI Authorization appeared first on…

Stability AI releases an audio-generating model that can run on smartphones

AI startup Stability AI has released Stable Audio Open Small, a “stereo” audio-generating AI model that the company claims is the fastest on the market — and efficient enough to run on smartphones. Stable Audio Open Small is the fruit of a collaboration between Stability AI and Arm, the chipmaker that produces many of the…

HPE to Expand Private Cloud Portfolio

Hewlett Packard Enterprise (HPE) recently announced the expansion of its advanced private cloud portfolio to combine flexible, enterprise-grade software for virtualized workloads and unified cloud management for customers through HPE Morpheus Software. Among the features of the expansion are: HPE Private Cloud Business Edition is now available with HPE Morpheus VM Essentials, which reduces up…

How IT Teams Can Standardize Email Communication Across Departments

In today’s fast-paced business environment, communication consistency is more than a branding choice—it’s a necessity. For IT teams tasked with managing the technological backbone of internal and external communications, one often overlooked area is the standardization of email signatures across the organization. Yet, this seemingly minor element can have a significant impact on brand perception,…

NetApp and Intel Establish Partnership for AI Deployment

Data infrastructure company NetApp and Intel have partnered to deploy NetApp AIPod Mini, a solution to streamline enterprise adoption of AI inferencing.  The two companies are addressing challenges involved with deploying AI, such as cost and complexity, at the department and team level. Integrated AI inference from two tech powerhouses Through this partnership, NetApp and…

Pinterest finally admits mass bans were a mistake caused by an ‘internal error’

Pinterest has now publicly apologized for the wave of moderation issues that have swept across the social network over the past few weeks, leading to account bans and Pin removals that users said were unwarranted. In posts published to social media Tuesday, the company took responsibility for the issue, saying that an “internal error” led…

Macquarie Cloud Services collaborates with CAUDIT to ‘advance IT in education’

Macquarie Cloud Services to provide a purpose-built platform for Australasian education and research sectors to modernise IT infrastructure securely, affordably, and without disruption Macquarie Cloud Services, part of Macquarie Technology Group (ASX: MAQ), has announced the launch of CAUDIT Cloud, a purpose-built cloud solution for research and education, designed in collaboration with CAUDIT, the peak…

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion in transactions since 2022, making it the second major black market to be exposed after HuiOne Guarantee. According to a report published by blockchain analytics firm Elliptic, merchants on the marketplace have been found to peddle technology, personal data, and money…

A new bipartisan bill aims to lift the 52-year ban on supersonic flight

U.S. lawmakers introduced Wednesday the Supersonic Aviation Modernization Act in a bid to revise the FAA’s 52-year ban on supersonic flight over U.S. soil. The bipartisan legislation – introduced by Senator Ted Budd (R-NC), Aviation Subcommittee Chair Troy Nehls (R-TX), and Representative Sharice Davids (D-KS) – would allow supersonic travel, provided no audible sonic boom…

DeepMind claims its newest AI tool is a whiz at math and science problems

Google’s AI R&D lab, DeepMind says it has developed a new AI system to tackle problems with “machine-gradeable” solutions. In experiments, the system, called AlphaEvolve, could help optimize some of the infrastructure Google uses to train its AI models, DeepMind said. The company says it’s building a user interface for interacting with AlphaEvolve, and plans…

Uber to introduce fixed-route shuttles in major US cities designed for commuters

Ride-hail and delivery giant Uber is introducing cheap, fixed-route rides along busy corridors during weekday commute hours in major U.S. cities – one solution to a world that feels, for most people, more expensive everyday.  Starting Wednesday, riders in Baltimore, Boston, Chicago, Dallas, New York City, Philadelphia, and San Francisco will be able to save…

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

A new global phishing threat called “Meta Mirage” has been uncovered, targeting businesses using Meta’s Business Suite. This campaign specifically aims at hijacking high-value accounts, including those managing advertising and official brand pages. Cybersecurity researchers at CTM360 revealed that attackers behind Meta Mirage impersonate official Meta communications, tricking users into handing

HP Updates Partner Program Compensation Structure

HP Inc. recently announced new benefits through its Amplify partner program to assist partners with navigating the evolving demands of the future of work with smarter, more connected experiences. Among these new enhancements are the launch of the Amplify SuperPower Booster, an upgraded compensation structure that rewards portfolio-wide HP sales and supports flexible technology solutions,…

Tensor9 helps vendors deploy their software into any environment using digital twins

Enterprises want access to new software and AI tools but can’t risk sending their sensitive data out to a third-party software-as-a-service (SaaS) providers. Tensor9 looks to help software companies land more enterprise customers by helping them deploy their software directly into a customer’s tech stack. Tensor9 converts a software vendor’s code into the format needed…