Geek-Guy.com

Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia

The threat actor known as Cloud Atlas has been observed using a previously undocumented malware called VBCloud as part of its cyber attack campaigns targeting “several dozen users” in 2024. “Victims get infected via phishing emails containing a malicious document that exploits a vulnerability in the formula editor (CVE-2018-0802) to download and execute malware code,”…

Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately

Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices. The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS

FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks

Cybersecurity researchers are warning about a spike in malicious activity that involves roping vulnerable D-Link routers into two different botnets, a Mirai variant dubbed FICORA and a Kaiten (aka Tsunami) variant called CAPSAICIN. “These botnets are frequently spread through documented D-Link vulnerabilities that allow remote attackers to execute malicious commands via a GetDeviceSettings

Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization

The Apache Software Foundation (ASF) has released patches to address a maximum severity vulnerability in the MINA Java network application framework that could result in remote code execution under specific conditions. Tracked as CVE-2024-52046, the vulnerability carries a CVSS score of 10.0. It affects versions 2.0.X, 2.1.X, and 2.2.X. “The ObjectSerializationDecoder in Apache MINA uses…

Data protection challenges abound as volumes surge and threats evolve

In the global digital economy, data is the most important asset organizations must protect from theft and damage. CISOs are fundamentally guardians of that asset, obligated to keep it secure and available to relevant users when and where they need it. “Every company has become a data company in this day and age; even if…

Security-Awareness-Trainings – ein Ratgeber

Wenn Ihre erste Verteidigungslinie fällt, haben Cyberschurken leichtes Spiel. Leremy | shutterstock.com Security-Awareness-Schulungen sind für Unternehmen und Organisationen obligatorisch und sollten Teil jeder übergreifenden Cybersecurity-Strategie sein. Zumindest, wenn sämtliche Mitarbeiter möglichst gut über alle relevanten Sicherheitsrisiken aufgeklärt sein und bestmöglich zum Schutz unternehmenskritischer Assets beitragen sollen. Insofern zielen Security-Awareness-Trainings in erster Linie darauf ab, Cyberrisiken…

AI sales rep startups are booming. So why are VCs wary?

When you really probe venture capitalists about investing in AI startups, they’ll tell you that businesses are experimenting wildly but are very slow to add AI solutions into their ongoing business processes.  But there are some exceptions. And one of them appears to be an area known as AI sales development representatives, or AI SDRs.…

Build Confidence with Advanced Secret Management

Can Advanced Secret Management Accelerate Your Cybersecurity Confidence? As a seasoned data management expert and cybersecurity specialist, I can confirm that Non-Human Identities (NHIs) and Secrets Security Management provide a significant boost to modern cybersecurity strategies. With a rise in digital transformations, the role of NHIs has become pivotal. But how can we build confidence…

Ensuring Safety with Automated Secrets Handling

How Does Automated Secrets Handling Enhance Security? There’s a pressing puzzle to solve in today’s hyper-connected businesses. How do you ensure the safe management of non-human identities (NHIs) and their secrets in a cloud environment? NHIs are critical components in the cybersecurity landscape. They are machine identities established by combining a secret (a unique encrypted…

Revolutionizing Cloud Security for Future Threats

Why Do We Need a Paradigm Shift in Cloud Security? The surge in cybersecurity incidents globally has left experts asking: Is it time we change our approach to cloud security, considering that breaches are no longer a question of if, but when? The answer, according to data-driven insights, is a resounding yes. A paradigm shift…

South Korea sanctions 15 North Koreans for IT worker scams, financial hacking schemes

The South Korean government has sanctioned more than a dozen individuals and one organization for a wide-ranging global scheme to fund North Korea’s nuclear and missile programs through impersonating IT workers abroad, stealing cryptocurrency and facilitating cyberattacks. South Korean officials on Thursday identified 15 North Korean nationals and the Chosun Geumjeong Economic Information Technology Exchange…

SaaS SIEM: Transforming Cybersecurity with Seceon’s Innovative ApproachSaaS SIEM

As organizations continue to shift toward digital-first operations, the demand for robust cybersecurity solutions has never been greater. Cyber threats are evolving at an unprecedented rate, and businesses must remain agile to protect sensitive data and operations. Security Information and Event Management (SIEM) systems have long been a critical tool in this effort. However, the…

ChatGPT and Sora are down for the second time this month

ChatGPT, Sora, and OpenAI’s developer-facing API went down Thursday for an hour and counting. OpenAI says it started experiencing a major outage at 11 AM PT, and the services still appear to be down at the time of publishing this article, around 12:40 PM PT. Frequent users of ChatGPT may recall that the service went…

Best of 2024: The Best SIEM Tools To Consider in 2024

What is a SIEM? SIEM solutions enable enterprises to monitor and analyze security-related data from a variety of sources, such as firewalls, intrusion detection systems (IDS), and endpoint security devices. By collecting and analysing this data, companies can spot patterns that may signal a security breach, allowing them to take quick and appropriate action to…

Microsoft and OpenAI have a financial definition of AGI: report

Microsoft and OpenAI have a very specific, internal definition of artificial general intelligence (AGI) based on the startup’s profits, according to a new report from The Information. And by this definition, OpenAI is many years away from reaching it. The two companies reportedly signed an agreement last year stating OpenAI has only achieved AGI when…

Network problems delay flights at two oneworld Alliance airlines

IT problems struck flights at two oneworld Alliance member airlines this week, leading to delays and flight cancellations. Network equipment connecting internal and external systems at Japan Airlines (JAL) malfunctioned early on Dec. 26 after “receiving a large amount of data from an external source,” the company said. Delays due to too much traffic The…

Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts

A Brazilian citizen has been charged in the United States for allegedly threatening to release data stolen by hacking into a company’s network in March 2020. Junior Barros De Oliveira, 29, of Curitiba, Brazil has been charged with four counts of extortionate threats involving information obtained from protected computers and four counts of threatening communications,…

Top Cybersecurity Compliance Issues Businesses Face Today

As organizations increasingly rely on digital infrastructure, the stakes have never been higher. Cybersecurity compliance is necessary to safeguard sensitive data, maintain customer trust, and avoid costly fines. With a constantly shifting threat landscape, evolving regulations, and the rise of new technologies, businesses must prioritize cybersecurity posture improvement to stay ahead of the curve. Assura……

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Top Cyber Asset Attack Surface Management (CAASM) Tools for 2024

In today’s dynamic cybersecurity landscape, organizations face an ever-evolving threat environment where new vulnerabilities are continuously discovered, and attack surfaces expand with the increasing digitalization of business processes. This is where (CAASM) Cyber Asset Attack Surface Management tools come into play. As we move from 2024 to 2025, the importance of CAASM tools has never…

PharmEasy’s $5.6 billion value shrinks to $456 million, investor data shows

Indian online pharmacy PharmEasy’s valuation now stands at about $456 million, according to disclosures from its investor Janus Henderson, a 92% drop from its peak valuation of $5.6 billion. The British American global asset firm’s Global Research Fund values its holding of 12.9 million shares in PharmEasy at $766,043, according to its latest filing for…

How are you securing your communications in the wake of the Volt Typhoon revelations?

The FBI recently released information that text messages between Apple and Android texting systems were insecure and that attackers could listen in and access those communications, more fallout from the revelation that a Chinese-affiliated threat actor had breached telecommunications companies. The announcement that the group known as Salt Typhoon had compromised networks of major global…

Adobe ColdFusion Any File Read Vulnerability (CVE-2024-53961)

Overview Recently, NSFOCUS CERT detected that Adobe issued a security announcement and fixed any file read vulnerability in Adobe ColdFusion (CVE-2024-53961). Due to improper restrictions on pathnames in Adobe ColdFusion, unauthenticated attackers can bypass the application’s restrictions to read files or directories outside of the restricted directory. As a result, sensitive information may be disclosed…

Drive Innovation with Enhanced Secrets Scanning

How Can Secrets Scanning Drive Innovation? Does the thought of data breaches keep you up at night? If so, you’re not alone. The modern, interconnected business landscape offers unprecedented opportunities for growth and innovation. However, it also presents new, complex security risks, especially when it comes to non-human identities (NHIs) and secrets management in cloud…

Stay Calm and Secure: Secrets Management for the Modern Age

How Effective is Your Modern Secrets Management Strategy? Have you ever wondered about the strength of your modern secrets management? In an age where security is paramount and breaches can mean irrevocable damage, it is essential to ensure your approach to Non-Human Identities (NHIs) and their secrets is rock solid. With increasingly sophisticated threats, the…

Relax with Secure Cloud-Native Solutions

What Does Securing Your Cloud-Native Solutions Mean? Cloud-native solutions are becoming more popular by the day. They are seen as the future of application development and deployment in today’s digital age. But with great innovation comes great responsibility – the responsibility of securing these cloud-native solutions. Wondering what ‘securing the cloud’ means in practical terms?…

Feel Supported: Integrating IAM with Your Security Policies

Why is Integrating IAM Crucial for Your Security Policies? As we move more and more of our activities online, the importance of robust security policies cannot be overstated. And central to these security policies is a concept that remains somewhat nebulous in the minds of many – Identity and Access Management (IAM). So why exactly…

Elon Musk’s xAI lands $6B in new cash to fuel AI ambitions

Updated December 25, 12:21 p.m. Pacific: Added details of xAI’s valuation and Kingdom Holdings’ contribution. xAI, Elon Musk’s AI company, has raised $6 billion in a Series C financing round. The company announced this week that Andreessen Horowitz , Blackrock, Fidelity, Lightspeed, MGX, Morgan Stanley, OIA, QIA, Sequoia Capital, Valor Equity Partners, Vy Capital, Nvidia,…

$132K – $149K, here’s what seed-stage founders pay early employees, based on data

Once a startup has raised its seed round, the perennial question becomes how much should the founders pay themselves and their first few employees? Kruze Consulting, a CPA firm that specializes in venture-backed startups, recently analyzed average salary ranges for over 450 seed-stage startups and shared that data with TechCrunch. The following averages are based…

Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks

Cybersecurity researchers have discovered several security flaws in the cloud management platform developed by Ruijie Networks that could permit an attacker to take control of the network appliances. “These vulnerabilities affect both the Reyee platform, as well as Reyee OS network devices,” Claroty researchers Noam Moshe and Tomer Goldschmidt said in a recent analysis. “The…

Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now

The Apache Software Foundation (ASF) has shipped security updates to address a critical security flaw in Traffic Control that, if successfully exploited, could allow an attacker to execute arbitrary Structured Query Language (SQL) commands in the database. The SQL injection vulnerability, tracked as CVE-2024-45387, is rated 9.9 out of 10.0 on the CVSS scoring system.…

Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware

The Iranian nation-state hacking group known as Charming Kitten has been observed deploying a C++ variant of a known malware called BellaCiao. Russian cybersecurity company Kaspersky, which dubbed the new version BellaCPP, said it discovered the artifact as part of a “recent” investigation into a compromised machine in Asia that was also infected with the…

Weekly Update 431

I fell waaay behind the normal video cadence this week, and I couldn’t care less 😊 I mean c’mon, would you rather be working or sitting here looking at this view after snowboarding through Christmas?! Christmas Day awesomeness in Norway 🇳🇴 Have a great one friends, wherever you are 🧑‍🎄 pic.twitter.com/F2FtcJYzRC — Troy Hunt (@troyhunt)…

10 essenzielle Maßnahmen für physische Sicherheit

Wenn physische Security nur immer so simpel umzusetzen wäre… Foto: Leremy | shutterstock.com Obwohl CISOs im Allgemeinen eher selten mit dem gesamten Spektrum der Gesundheits- und Arbeitssicherheitsbelange betraut sind, spielen sie diesbezüglich doch eine wichtige, strategische Rolle – insbesondere, wenn es um physische Sicherheitssysteme mit IT-Anbindung und den direkten Zugang zu IT-Assets geht. Die wesentlichen…

The 2024 cyberwar playbook: Tricks used by nation-state actors

In 2024, nation-state cyber activity was off the charts, with Chinese, Russian, and Iranian actors leading the charge. Their campaigns weren’t just relentless — they were innovative, using a crafty mix of Tactics, Techniques, and Procedures (TTPs) to gain footholds, stay hidden, and spy-like pros. “There was definitely a continued and noted uptick in nation-state…

$2m boost for messaging startup 8seats aims to ‘transform business communication’

Next generation messaging platform startup for businesses 8seats has raised A$2 million in seed funding from a consortium of investors including Black Nova, former Woolworths CEO Brad Banducci, and tech entrepreneurs Mike Priddis and Greg Miller, with the funding to enable the homegrown startup to scale its platform and accelerate its go-to-market strategy in preparation…

Onyx Motorbikes is back, one year after its owner died leaving the company in shambles

A year after Onyx Motorbikes owner James Khatiblou died suddenly, leaving customers with unfulfilled orders and millions in unpaid debts, the brand has been revived by its original founder. “I’m excited to announce I have resurrected my original brand Onyx with incredible backers!” founder Tim Seward wrote in a LinkedIn post on Monday. “Onyx is…

OpenAI ‘considered’ building a humanoid robot: report

OpenAI has recently explored building its own humanoid robot, according to The Information. The report cites “two people with direct knowledge” of those conversations. The ChatGPT maker has been involved in the space for some time now, by way of financial backing. It has thus far invested in Figure and 1X, along with the “general…

Revenue-based financing startups continue to raise capital in MENA, where the model just works

In an era where it’s become tougher to raise venture capital, many companies have turned to non-dilutive, Revenue-Based Financing (RBF) as an alternative. As a result, plenty of startups have risen to meet that challenge, none more so than in the MENA region, which has taken to the model like a duck to water. The…

The AI Fix #30: ChatGPT reveals the devastating truth about Santa (Merry Christmas!)

In episode 30 of The AI Fix, AIs are caught lying to avoid being turned off, Apple’s AI flubs a headline, ChatGPT is available to people who haven’t left the 1970s, our hosts regret to inform you that an AI artist now has a personality, and ant-like robots join forces to lob each other over…

DEF CON 32 – Your Smartcard Is Dumb: A Brief History Of Hacking Access Control Systems

Authors/Presenters: Chad Shortman Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Your Smartcard Is Dumb: A Brief History Of Hacking Access…

Watch Boston Dynamics’ electric Atlas do a backflip

A little early holiday surprise from Boston Dynamics this week, as Santa suit-wearing electric Atlas performs a backflip. The feat occurs about 13 minutes into a new video, showcasing yet another trick in the humanoid robot’s arsenal. It’s worth noting that – unlike with humans – a robot performing a backflip isn’t necessarily more complicated…

WordPress Appliance - Powered by TurnKey Linux