Geek-Guy.com

Category: Blog

Auto Added by WPeMatico

O que é um ataque cibernético? Tipos e prevenção

A segurança digital se tornou uma prioridade inegociável. Com o avanço da tecnologia, surgem também novas ameaças digitais e uma das mais perigosas é o ataque cibernético. Empresas, governos e até mesmo usuários comuns estão constantemente na mira de criminosos digitais que buscam explorar vulnerabilidades. Mas afinal, o que é ataque cibernético, quais são os…

NSFOCUS WAF Selected in the 2025 Gartner® Market Guide for Cloud Web Application and API Protection

Santa Clara, Calif. May 14, 2025 – Recently, Gartner released the “Market Guide for Cloud Web Application and API Protection”[1], and NSFOCUS was selected as a Representative Vendor with its innovative WAAP solution. We believe this recognition reflects the technical accumulation and practical capabilities of NSFOCUS WAF in the field of cloud native security protection. Its…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… The post Rethinking Executive Security in the Age of Human Risk appeared first on Nisos by Nisos The post Rethinking Executive Security…

The Ultimate ISO 27001 Checklist: Step-by-Step Guide to Simplify Your Compliance Journey

Navigating the path to ISO 27001 certification resembles assembling IKEA flat-pack furniture. Each piece is essential, but the sparse instructions can leave you scratching your head. Sure, both ISO and IKEA have Scandinavian roots, but when it comes to security standards, you’ll probably need more than minimalist-style advice. This guide offers a comprehensive, step-by-step breakdown…

NSFOCUS APT Monthly Briefing – March 2025

Regional APT Threat Situation Overview In March 2025, the global threat hunting system of NSFOCUS Fuying Laboratory discovered a total of 19 APT attack activities. These activities were mainly distributed in South Asia, East Asia, Eastern Europe, and South America, as shown in the following figure. In terms of group activity, the most active APT…

RSAC 2025 Innovation Sandbox | Aurascape: Reconstructing the Intelligent Defense Line of AI Interactive Visibility and Native Security

Company Overview Aurascape is a cybersecurity startup founded in 2023 and headquartered in Santa Clara, California, USA. The company was co-founded by senior security experts and engineers from world-class technology companies such as Palo Alto Networks, Google, and Amazon. The team has deep expertise in the fields of network security, artificial intelligence, and network infrastructure,…

Client-Side Security Breach Alert: Blue Shield of California Exposes 4.7 Million Members’ Health Data Through Web Analytics Configuration

by Source Defense A recent incident at Blue Shield of California highlights the critical importance of client-side security controls when implementing third-party scripts on healthcare websites. The nonprofit health plan has disclosed a significant data breach affecting 4.7 million members, stemming from a misconfiguration of Google Analytics on their web properties between April 2021 and…

Unifying Identity Signals: Turning Breach Data into Actionable Identity Intelligence

The Fragmentation Problem in CTI and OSINT Investigations Cyber threat intelligence (CTI) and open-source intelligence (OSINT) workflows are often flooded with fragmented identity data – leaked credentials, infostealer logs, dark web posts, and forum aliases. While this data holds enormous potential, making sense of it is no easy task. To draw meaningful insights, analysts must…

AppOmni and Splunk SaaS: A Unified Front for Enhanced Security Insights

AppOmni and Splunk SaaS work together to elevate SaaS security with enriched insights, streamlined investigations, and advanced AI-driven detection. The post AppOmni and Splunk SaaS: A Unified Front for Enhanced Security Insights appeared first on AppOmni. The post AppOmni and Splunk SaaS: A Unified Front for Enhanced Security Insights appeared first on Security Boulevard.

CSP FY: A Magecart Attack That Dodges Policy—and Makes a Joke While Doing It

by Source Defense When attackers are clever enough to name their cookie “csp_f_y,” you know they’re not just exfiltrating data—they’re mocking your defenses. In a recent attack spotted by the Source Defense Cyber Research team, a compromised first-party script on a payment page stored sensitive data in a cookie named csp_f_y. The exfiltration didn’t happen…

Trump vs. Biden Cyber Strategy — According to AI 

We asked an AI agent to analyze the latest shift in U.S. cybersecurity policy, comparing past strategies under Biden to the new 2025 Trump Executive Order. The result? A surprisingly structured analysis that maps out the core philosophical and operational differences, from federal-led resilience to localized risk ownership.  But this raises a more provocative question:…

NSFOCUS WAF New UI Showcase: Brand New Policy and Template Management Workflow

Three-Tier Protection Rules • Basic Protection: Pre-configured, general and popular security rules for out-of-box deployment.• Optional/Advanced Protection: Advanced rules, customized for specific Web/API applications for optimum protection. Basic Protection HTTP Protocol Verification Server Plug-in Crawler Web General Illegal Upload Information Disclosure Semantic Engine Scan Protection Optional Protection HTTP Access Control Sensitive Information Filter Smart Engine…

GRC for Building Customer Trust: A Strategic Imperative for Long-Term Success

In business, trust is a make-or-break factor. It’s what holds customer relationships together. And it’s the quiet force that determines whether someone clicks “buy” or walks away from your website.  So how do you gain it?  You need to earn it. Trust isn’t something you can fake or sprinkle onto your company’s brand just by…

PCI DSS Tokenization vs Encryption: Key Differences to Protect Payment Data

If your organization handles sensitive financial information, you must implement security measures that fulfill the Payment Card Industry Data Security Standard (PCI DSS) requirements. The most commonly used methods for securing cardholder data are tokenization and encryption. These techniques aim to protect sensitive payment information, but they work in fundamentally different ways. This blog will…

PCI DSS Tokenization vs Encryption: Key Differences to Protect Payment Data

If your organization handles sensitive financial information, you must implement security measures that fulfill the Payment Card Industry Data Security Standard (PCI DSS) requirements. The most commonly used methods for securing cardholder data are tokenization and encryption. These techniques aim to protect sensitive payment information, but they work in fundamentally different ways. This blog will…

Tax Season Threat Surge 

Veriti Research has identified a significant rise in tax-related malware samples across multiple platforms. The research team discovered malware samples targeting Android, Linux, and Windows, all connected to the same adversary operating from a single IP address.  We believe the attacker is running multiple parallel campaigns and using “Malware-as-a-Service” tools to target various platforms simultaneously,…

Inside Daisy Cloud: 30K Stolen Credentials Exposed 

Veriti research recently analyzed stolen data that was published in a telegram group named “Daisy Cloud” (potentially associated with the RedLine Stealer), exposing the inner workings of a cybercrime marketplace. This group offers thousands of stolen credentials in an ongoing basis across a wide range of services, from crypto exchanges to government portals, at disturbingly…

Genetic Breach Fallout: 23andMe’s Collapse Raises Security Alarms 

In 2023, a massive data breach at 23andMe shook the foundation of the consumer genomics industry. Fast forward to today, the company has filed for bankruptcy. From Veriti’s perspective, this incident highlights the devastating consequences of failing to secure deeply sensitive personal data, especially when that data reaches beyond individuals and into family legacies.  Veriti…

Juniper Routers, Network Devices Targeted with Custom Backdoors

Backdoored Juniper networking devices are at the center of two major cybersecurity stories that highlight the ongoing vulnerability and active targeting of network infrastructure by cyber adversaries. J-Magic and TINYSHELL The first story broke in January 2025, when researchers at Black Lotus Labs, a research arm of the ISP Lumen Technologies, revealed information about an…

The Essential Role of Supply Chain Security in ASPM

Threat actors are continuously evolving their tactics to exploit vulnerabilities and gain unauthorized access. That increasingly involves attacks targeting the software supply chain. The post The Essential Role of Supply Chain Security in ASPM appeared first on Cycode. The post The Essential Role of Supply Chain Security in ASPM appeared first on Security Boulevard.

Generative AI: threat or opportunity? It depends on your adaptive speed!

Now that AI reasoning capabilities are blasting and becoming accessible, folks tend to argue that generative AI will bring us a new era of exploitation. More zero days, more vulnerabilities, more sophisticated, and in higher frequency. The emergence of more new exploitation techniques will significantly increase the number of new vulnerabilities. We have seen in…

Next.js Middleware Permission Bypass Vulnerability (CVE-2025-29927)

Overview Recently, NSFOCUS CERT detected that Next.js issued a security announcement and fixed the middleware permission bypass vulnerability (CVE-2025-29927). Because Next.js lacks effective verification of the source of the x-middleware-subrequest header, when configuring to use middleware for authentication and authorization, an unauthenticated attacker can bypass system permission controls by manipulating the x-middleware-subrequest header to access…

How Data Visualization Helps Prevent Cyber Attacks

Cybersecurity Relies on Visualization Raw data often tells a story that’s hidden in plain sight. No matter how accurate or comprehensive, numbers on a spreadsheet can easily blur into an incomprehensible haze when patterns and anomalies are buried deep within thousands or millions of rows.  The human brain processes visuals 60,000 times faster than text,…

Why So Many Employee Phishing Training Initiatives Fall Short

During the work-from-home boom of 2020, GitLab, a company that largely employs tech-savvy individuals, decided to test its security by sending fake phishing messages to its WFH workers. About one out of every five tested employees fell for it, and […] The post Why So Many Employee Phishing Training Initiatives Fall Short appeared first on…

Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)

Overview Recently, NSFOCUS CERT detected that Microsoft released a security announcement and fixed the spoofing vulnerability of Windows File Explorer (CVE-2025-24071), with a CVSS score of 7.5. Due to the implicit trust and automatic file parsing behavior of .library-ms files by Windows Explorer, unauthenticated attackers can save files by constructing RAR/ZIP with an embedded malicious…

Rethinking Risk: ICS & OT Security with Purdue 2.0 and GRC

The rise of the extended Internet of Things (XIoT) across industrial (IIoT), healthcare (IoMT), commercial (OT, BMS/EMS/ACS/iBAS/FMS), and other sectors […] The post Rethinking Risk: ICS & OT Security with Purdue 2.0 and GRC appeared first on Security Boulevard.

Beyond Patching: Why a Risk-Based Approach to Vulnerability Management Is Essential 

The cybersecurity industry has long treated patching as the gold standard for vulnerability management. It is the cornerstone of compliance frameworks, a key metric for security performance, and often the first response to a newly discovered vulnerability. But patching alone is no longer enough.  In the 2025 Gartner® report, We’re Not Patching Our Way Out…

Secrets Detection Beyond the Repository: Securing The End-to-End Software Development Factory

Imagine this: A developer, pressed for time, drops an AWS access key into a Slack channel, asking a teammate for help debugging a production issue. The post Secrets Detection Beyond the Repository: Securing The End-to-End Software Development Factory appeared first on Cycode. The post Secrets Detection Beyond the Repository: Securing The End-to-End Software Development Factory…

How to Build a Robust Cloud Security Strategy: Key Solutions and Tips

As businesses continue to shift their operations to the cloud, ensuring robust cloud security has never been more critical. While the cloud offers flexibility, scalability, and cost-effectiveness, it also introduces a host of new security challenges. Cloud security strategies must be adaptable, comprehensive, and proactive, especially in a constantly evolving cyber threat environment. In this…

Inside Black Basta Ransomware Group’s Chat Leak

Internal conflicts within the notorious Black Basta ransomware group have led to a massive leak of the group’s internal chat messages. While the messages are disorganized and full of internal jargon, they contain a wealth of insight into the group’s operations and techniques. This type of disclosure can be a goldmine for security professionals because…

Veriti Research Uncovers Malware Exploiting Cloud Services 

Veriti Research has identified a growing trend – attackers leveraging cloud infrastructure to facilitate malware distribution and command-and-control (C2) operations. This evolving tactic not only makes detection more challenging but also exposes organizations to significant security risks.  Malware Hosted on Cloud Services  One of the most alarming findings from our research is that over 40%…

DPRK IT Fraud Network Uses GitHub to Target Global Companies

Nisos DPRK IT Fraud Network Uses GitHub to Target Global Companies Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Vietnamese, Japanese, and Singaporean nationals with the goal of obtaining employment in remote engineering… The post DPRK IT Fraud Network Uses GitHub to Target Global Companies appeared first on Nisos…