Geek-Guy.com

The trends that shaped EVs, robotaxis, and electric flight in 2024

If there was one phrase that captured the vibe and theme of 2024 — at least in the transportation sector — it was business whiplash. Legacy automakers changed direction on their all-EVs-or-bust strategy, startups pivoted, and some Silicon Valley VCs and executives adjusted their views to a changing political landscape, in which they now are…

Why DeepSeek’s new AI model thinks it’s ChatGPT

Earlier this week, DeepSeek, a well-funded Chinese AI lab, released an “open” AI model that beats many rivals on popular benchmarks. The model, DeepSeek V3, is large but efficient, handling text-based tasks like coding and writing essays with ease. It also seems to think it’s ChatGPT. Posts on X — and TechCrunch’s own tests —…

White House: Salt Typhoon hacks possible because telecoms lacked basic security measures

The White House said Friday that as the U.S. government continues to assess the damage caused by the Salt Typhoon hacks, the breach occurred in large part due to telecommunications companies failing to implement rudimentary cybersecurity measures across their IT infrastructure.  Anne Neuberger, the White House’s deputy national security adviser for cyber and emerging technology,…

Watch this four-legged robot adapt to tricky situations like an animal

Researchers at the University of Leeds recently demonstrated a framework for a quadruped robot with a design inspired by the bio-mechanics of four-legged animals. The versatile robot is able to navigate complex environments, maintain stability on uneven ground, and recover after a fall — all without the use of extra-perceptive sensors. © 2024 TechCrunch. All…

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign

North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often posing as recruiters to trick individuals looking for potential job opportunities into

Top 6 Vendor Risk Management Software for MSPs in 2025

Managing third-party risks is becoming more critical for managed service providers (MSPs) as cybersecurity threats evolve. Vendor risk management (VRM) software simplifies this process, helping MSPs assess, monitor, and mitigate risks associated with third-party vendors. Explore six of the best vendor risk management tools to streamline compliance, enhance security, or protect your client’s sensitive data.…

OpenAI lays out its for-profit transition plans

OpenAI says its corporate structure must evolve to advance its mission of ensuring artificial general intelligence (AGI) — AI that can complete most tasks humans can — benefits all humanity. OpenAI currently has a for-profit org controlled by a nonprofit, with a “capped profit” share for investors and employees. But in a blog post published…

Best of 2024: CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability

In a recent security advisory, Microsoft disclosed a high-severity vulnerability identified as CVE-2024-38063. This critical Remote Code Execution (RCE) flaw, rated with a CVSS score of 9.8, poses a significant… The post CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability appeared first on Strobes Security. The post Best of 2024: CVE-2024-38063: An…

Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia

The threat actor known as Cloud Atlas has been observed using a previously undocumented malware called VBCloud as part of its cyber attack campaigns targeting “several dozen users” in 2024. “Victims get infected via phishing emails containing a malicious document that exploits a vulnerability in the formula editor (CVE-2018-0802) to download and execute malware code,”…

Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately

Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices. The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS

FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks

Cybersecurity researchers are warning about a spike in malicious activity that involves roping vulnerable D-Link routers into two different botnets, a Mirai variant dubbed FICORA and a Kaiten (aka Tsunami) variant called CAPSAICIN. “These botnets are frequently spread through documented D-Link vulnerabilities that allow remote attackers to execute malicious commands via a GetDeviceSettings

Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization

The Apache Software Foundation (ASF) has released patches to address a maximum severity vulnerability in the MINA Java network application framework that could result in remote code execution under specific conditions. Tracked as CVE-2024-52046, the vulnerability carries a CVSS score of 10.0. It affects versions 2.0.X, 2.1.X, and 2.2.X. “The ObjectSerializationDecoder in Apache MINA uses…

Data protection challenges abound as volumes surge and threats evolve

In the global digital economy, data is the most important asset organizations must protect from theft and damage. CISOs are fundamentally guardians of that asset, obligated to keep it secure and available to relevant users when and where they need it. “Every company has become a data company in this day and age; even if…

Security-Awareness-Trainings – ein Ratgeber

Wenn Ihre erste Verteidigungslinie fällt, haben Cyberschurken leichtes Spiel. Leremy | shutterstock.com Security-Awareness-Schulungen sind für Unternehmen und Organisationen obligatorisch und sollten Teil jeder übergreifenden Cybersecurity-Strategie sein. Zumindest, wenn sämtliche Mitarbeiter möglichst gut über alle relevanten Sicherheitsrisiken aufgeklärt sein und bestmöglich zum Schutz unternehmenskritischer Assets beitragen sollen. Insofern zielen Security-Awareness-Trainings in erster Linie darauf ab, Cyberrisiken…

AI sales rep startups are booming. So why are VCs wary?

When you really probe venture capitalists about investing in AI startups, they’ll tell you that businesses are experimenting wildly but are very slow to add AI solutions into their ongoing business processes.  But there are some exceptions. And one of them appears to be an area known as AI sales development representatives, or AI SDRs.…

Build Confidence with Advanced Secret Management

Can Advanced Secret Management Accelerate Your Cybersecurity Confidence? As a seasoned data management expert and cybersecurity specialist, I can confirm that Non-Human Identities (NHIs) and Secrets Security Management provide a significant boost to modern cybersecurity strategies. With a rise in digital transformations, the role of NHIs has become pivotal. But how can we build confidence…

Ensuring Safety with Automated Secrets Handling

How Does Automated Secrets Handling Enhance Security? There’s a pressing puzzle to solve in today’s hyper-connected businesses. How do you ensure the safe management of non-human identities (NHIs) and their secrets in a cloud environment? NHIs are critical components in the cybersecurity landscape. They are machine identities established by combining a secret (a unique encrypted…

Revolutionizing Cloud Security for Future Threats

Why Do We Need a Paradigm Shift in Cloud Security? The surge in cybersecurity incidents globally has left experts asking: Is it time we change our approach to cloud security, considering that breaches are no longer a question of if, but when? The answer, according to data-driven insights, is a resounding yes. A paradigm shift…

South Korea sanctions 15 North Koreans for IT worker scams, financial hacking schemes

The South Korean government has sanctioned more than a dozen individuals and one organization for a wide-ranging global scheme to fund North Korea’s nuclear and missile programs through impersonating IT workers abroad, stealing cryptocurrency and facilitating cyberattacks. South Korean officials on Thursday identified 15 North Korean nationals and the Chosun Geumjeong Economic Information Technology Exchange…

SaaS SIEM: Transforming Cybersecurity with Seceon’s Innovative ApproachSaaS SIEM

As organizations continue to shift toward digital-first operations, the demand for robust cybersecurity solutions has never been greater. Cyber threats are evolving at an unprecedented rate, and businesses must remain agile to protect sensitive data and operations. Security Information and Event Management (SIEM) systems have long been a critical tool in this effort. However, the…

ChatGPT and Sora are down for the second time this month

ChatGPT, Sora, and OpenAI’s developer-facing API went down Thursday for an hour and counting. OpenAI says it started experiencing a major outage at 11 AM PT, and the services still appear to be down at the time of publishing this article, around 12:40 PM PT. Frequent users of ChatGPT may recall that the service went…

Best of 2024: The Best SIEM Tools To Consider in 2024

What is a SIEM? SIEM solutions enable enterprises to monitor and analyze security-related data from a variety of sources, such as firewalls, intrusion detection systems (IDS), and endpoint security devices. By collecting and analysing this data, companies can spot patterns that may signal a security breach, allowing them to take quick and appropriate action to…

Microsoft and OpenAI have a financial definition of AGI: report

Microsoft and OpenAI have a very specific, internal definition of artificial general intelligence (AGI) based on the startup’s profits, according to a new report from The Information. And by this definition, OpenAI is many years away from reaching it. The two companies reportedly signed an agreement last year stating OpenAI has only achieved AGI when…

Network problems delay flights at two oneworld Alliance airlines

IT problems struck flights at two oneworld Alliance member airlines this week, leading to delays and flight cancellations. Network equipment connecting internal and external systems at Japan Airlines (JAL) malfunctioned early on Dec. 26 after “receiving a large amount of data from an external source,” the company said. Delays due to too much traffic The…

Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts

A Brazilian citizen has been charged in the United States for allegedly threatening to release data stolen by hacking into a company’s network in March 2020. Junior Barros De Oliveira, 29, of Curitiba, Brazil has been charged with four counts of extortionate threats involving information obtained from protected computers and four counts of threatening communications,…

Top Cybersecurity Compliance Issues Businesses Face Today

As organizations increasingly rely on digital infrastructure, the stakes have never been higher. Cybersecurity compliance is necessary to safeguard sensitive data, maintain customer trust, and avoid costly fines. With a constantly shifting threat landscape, evolving regulations, and the rise of new technologies, businesses must prioritize cybersecurity posture improvement to stay ahead of the curve. Assura……

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Enabling seamless healthcare operations through APIs and composable commerce

Outdated systems and manual processes remain a frustrating reality for Australian healthcare providers, making it harder for professionals to deliver efficient, high-quality care. Thankfully, data interoperability is no longer a distant goal — it’s now essential for improving patient outcomes and streamlining operations. As the healthcare industry evolves to meet growing demands and increasing consumer…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Predicting the future of cybersecurity for 2025

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise…

Top Cyber Asset Attack Surface Management (CAASM) Tools for 2024

In today’s dynamic cybersecurity landscape, organizations face an ever-evolving threat environment where new vulnerabilities are continuously discovered, and attack surfaces expand with the increasing digitalization of business processes. This is where (CAASM) Cyber Asset Attack Surface Management tools come into play. As we move from 2024 to 2025, the importance of CAASM tools has never…

PharmEasy’s $5.6 billion value shrinks to $456 million, investor data shows

Indian online pharmacy PharmEasy’s valuation now stands at about $456 million, according to disclosures from its investor Janus Henderson, a 92% drop from its peak valuation of $5.6 billion. The British American global asset firm’s Global Research Fund values its holding of 12.9 million shares in PharmEasy at $766,043, according to its latest filing for…

How are you securing your communications in the wake of the Volt Typhoon revelations?

The FBI recently released information that text messages between Apple and Android texting systems were insecure and that attackers could listen in and access those communications, more fallout from the revelation that a Chinese-affiliated threat actor had breached telecommunications companies. The announcement that the group known as Salt Typhoon had compromised networks of major global…

Adobe ColdFusion Any File Read Vulnerability (CVE-2024-53961)

Overview Recently, NSFOCUS CERT detected that Adobe issued a security announcement and fixed any file read vulnerability in Adobe ColdFusion (CVE-2024-53961). Due to improper restrictions on pathnames in Adobe ColdFusion, unauthenticated attackers can bypass the application’s restrictions to read files or directories outside of the restricted directory. As a result, sensitive information may be disclosed…

Drive Innovation with Enhanced Secrets Scanning

How Can Secrets Scanning Drive Innovation? Does the thought of data breaches keep you up at night? If so, you’re not alone. The modern, interconnected business landscape offers unprecedented opportunities for growth and innovation. However, it also presents new, complex security risks, especially when it comes to non-human identities (NHIs) and secrets management in cloud…

Stay Calm and Secure: Secrets Management for the Modern Age

How Effective is Your Modern Secrets Management Strategy? Have you ever wondered about the strength of your modern secrets management? In an age where security is paramount and breaches can mean irrevocable damage, it is essential to ensure your approach to Non-Human Identities (NHIs) and their secrets is rock solid. With increasingly sophisticated threats, the…

Relax with Secure Cloud-Native Solutions

What Does Securing Your Cloud-Native Solutions Mean? Cloud-native solutions are becoming more popular by the day. They are seen as the future of application development and deployment in today’s digital age. But with great innovation comes great responsibility – the responsibility of securing these cloud-native solutions. Wondering what ‘securing the cloud’ means in practical terms?…

Feel Supported: Integrating IAM with Your Security Policies

Why is Integrating IAM Crucial for Your Security Policies? As we move more and more of our activities online, the importance of robust security policies cannot be overstated. And central to these security policies is a concept that remains somewhat nebulous in the minds of many – Identity and Access Management (IAM). So why exactly…

Elon Musk’s xAI lands $6B in new cash to fuel AI ambitions

Updated December 25, 12:21 p.m. Pacific: Added details of xAI’s valuation and Kingdom Holdings’ contribution. xAI, Elon Musk’s AI company, has raised $6 billion in a Series C financing round. The company announced this week that Andreessen Horowitz , Blackrock, Fidelity, Lightspeed, MGX, Morgan Stanley, OIA, QIA, Sequoia Capital, Valor Equity Partners, Vy Capital, Nvidia,…

$132K – $149K, here’s what seed-stage founders pay early employees, based on data

Once a startup has raised its seed round, the perennial question becomes how much should the founders pay themselves and their first few employees? Kruze Consulting, a CPA firm that specializes in venture-backed startups, recently analyzed average salary ranges for over 450 seed-stage startups and shared that data with TechCrunch. The following averages are based…

Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks

Cybersecurity researchers have discovered several security flaws in the cloud management platform developed by Ruijie Networks that could permit an attacker to take control of the network appliances. “These vulnerabilities affect both the Reyee platform, as well as Reyee OS network devices,” Claroty researchers Noam Moshe and Tomer Goldschmidt said in a recent analysis. “The…

Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now

The Apache Software Foundation (ASF) has shipped security updates to address a critical security flaw in Traffic Control that, if successfully exploited, could allow an attacker to execute arbitrary Structured Query Language (SQL) commands in the database. The SQL injection vulnerability, tracked as CVE-2024-45387, is rated 9.9 out of 10.0 on the CVSS scoring system.…

Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware

The Iranian nation-state hacking group known as Charming Kitten has been observed deploying a C++ variant of a known malware called BellaCiao. Russian cybersecurity company Kaspersky, which dubbed the new version BellaCPP, said it discovered the artifact as part of a “recent” investigation into a compromised machine in Asia that was also infected with the…

Weekly Update 431

I fell waaay behind the normal video cadence this week, and I couldn’t care less 😊 I mean c’mon, would you rather be working or sitting here looking at this view after snowboarding through Christmas?! Christmas Day awesomeness in Norway 🇳🇴 Have a great one friends, wherever you are 🧑‍🎄 pic.twitter.com/F2FtcJYzRC — Troy Hunt (@troyhunt)…

10 essenzielle Maßnahmen für physische Sicherheit

Wenn physische Security nur immer so simpel umzusetzen wäre… Foto: Leremy | shutterstock.com Obwohl CISOs im Allgemeinen eher selten mit dem gesamten Spektrum der Gesundheits- und Arbeitssicherheitsbelange betraut sind, spielen sie diesbezüglich doch eine wichtige, strategische Rolle – insbesondere, wenn es um physische Sicherheitssysteme mit IT-Anbindung und den direkten Zugang zu IT-Assets geht. Die wesentlichen…

The 2024 cyberwar playbook: Tricks used by nation-state actors

In 2024, nation-state cyber activity was off the charts, with Chinese, Russian, and Iranian actors leading the charge. Their campaigns weren’t just relentless — they were innovative, using a crafty mix of Tactics, Techniques, and Procedures (TTPs) to gain footholds, stay hidden, and spy-like pros. “There was definitely a continued and noted uptick in nation-state…

$2m boost for messaging startup 8seats aims to ‘transform business communication’

Next generation messaging platform startup for businesses 8seats has raised A$2 million in seed funding from a consortium of investors including Black Nova, former Woolworths CEO Brad Banducci, and tech entrepreneurs Mike Priddis and Greg Miller, with the funding to enable the homegrown startup to scale its platform and accelerate its go-to-market strategy in preparation…

WordPress Appliance - Powered by TurnKey Linux