Geek-Guy.com

Category: Cybersecurity

Auto Added by WPeMatico

Heightened Cyber Threat from Iran Sparks Urgent Calls for Vigilance and Mitigation

Following last week’s U.S. airstrikes targeting Iranian nuclear sites, cybersecurity experts and government officials are now warning of a possible digital retaliation, a surge in cyber threats originating from Iran. On June 22, the Department of Homeland Security (DHS) issued a National Terrorism Advisory System Bulletin warning of a “heightened threat environment” in the United..…

Russian court releases several REvil ransomware gang members

Four members of the notorious cybercriminal group REvil were found guilty of financial fraud and computer crimes targeting primarily American victims, but were released after a Russian court determined their sentence would amount to time already served. The four men — Andrey Bessonov, Mikhail Golovachuk, Roman Muromsky, and Dmitry Korotayev — all admitted guilt and…

Simbian Advances the AI Frontier With Industry’s First Benchmark for Measuring LLM Performance in the SOC

Simbian’s approach offers a new blueprint for how to evaluate and evolve AI for real-world use, without losing sight of the human element.   The post Simbian Advances the AI Frontier With Industry’s First Benchmark for Measuring LLM Performance in the SOC appeared first on Security Boulevard.

Okta Introduces Cross App Access to Secure AI Agents in Enterprise

Okta Inc. on Monday said it has created a new protocol to secure artificial intelligence (AI) agents to bring visibility, control and governance to agent-driven and app-to-app interactions. The Cross App Access platform is especially important as more AI tools use protocols like Model Context Protocol (MCP) to connect their AI learning models to important..…

Scattered Spider Targets Aflac, Other Insurance Companies

The prolific Scattered Spider threat group, which recently targeted U.S. and UK retailers in a series of attacks, is now turning its attention to the insurance industry and appears to have landed a big victim in Aflac after compromising networks and systems of the Philadelphia Insurance and Erie Insurance companies. The post Scattered Spider Targets…

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat

Cybernews researchers reported that since the beginning of the year, they’ve detected 30 datasets containing 16 billion stolen credentials exposed on the internet, most of which had not been previously recorded and represent a massive trove of records that can be used in ransomware, phishing, BEC, and other attacks. The post 16 Billion Leaked Records…

AWS Raises Expertise Bar for MSSP Partners

Amazon Web Services (AWS) this week revealed it has added new categories for describing offerings provided by partners offering managed services security providers (MSSP) as part of an effort to ensure a more consistent customer experience. The post AWS Raises Expertise Bar for MSSP Partners appeared first on Security Boulevard.

Are Your Secrets Protected Against Data Breaches?

Are Your Secrets Well Guarded in the Name of Data Security? Have you ever pondered the magnitude of secrets protection in your organizational data security framework? Non-Human Identities (NHIs) and Secrets Security Management has proven to be a significant line of defense against data breaches and unauthorized access to sensitive information. The Role of NHIs…

How Secure Are Your Cloud-Based Non-Human Identities?

Are Your Cloud-Based Non-Human Identities as Secure as You Think They Are? We all want to believe that our cybersecurity measures are infallible. But in reality, our digital defense mechanisms – even those earmarked for cloud security – are only as powerful as their weakest link. A surprising chink in this armor comes in the…

Why Being Proactive with NHIs Can Save Your Business

Why is NHI Management a Game Changer in Business Protection? Have you ever wondered how organizations manage to protect enormous amounts of data? An overlooked but vital component in data security is Non-Human Identities (NHIs). Through proactive security measures, organizations can defend their business from costly data breaches and ensure continued operation. Understanding the Role…

Aflac duped by social-engineering attack, marking another hit on insurance industry

Aflac disclosed Friday that it experienced a cyberattack last week that potentially impacted the supplemental insurance company’s data.  The Georgia-based company said it identified unauthorized access on its network June 12. Upon initiating its cybersecurity incident response protocols, Aflac “believes that it contained the intrusion within hours,” the company said in a regulatory filing. “The…

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report

Alphabet Inc.’s Google’s proposed $32 billion acquisition of cloud security startup Wiz is drawing early-stage antitrust scrutiny from the Department of Justice. The all-cash deal, which would integrate Wiz into Google Cloud, has antitrust enforcement officials investigating whether it could illegally limit rivals’ access to advanced security tooling, according to a Bloomberg report. The renewed..…

Data Resilience in a Post-Quantum World

As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting to a resilience-first model. This model prioritizes continuity, recovery, and adaptability in the face of emerging risks. Why Resilience Is the New..…

Simplify Threat Analysis and Boost Detection Rate with Detonation Actions 

Threat analysis is a complex task that demands full attention, especially during active incidents, when every second counts. ANY.RUN’s Interactive Sandbox is designed to ease that pressure with an intuitive interface and fast threat detection.   Our new feature, Detonation Actions, takes this further by highlighting detonation steps during analysis. When a specific action is needed…

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

The Iranian government has sharply restricted internet access in the country following almost a week of Israeli airstrikes and a cyberattacks on an Iranian bank and cryptocurrency exchange by a pro-Israeli hacker group called Predatory Sparrow. The post Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks appeared first on Security Boulevard.

Iran’s financial sector takes another hit as largest crypto exchange is targeted

Cyberattacks targeting Iran’s financial sector widened Wednesday, as a pro-Israel hacktivist group stole more than $90 million from Nobitex, the country’s largest cryptocurrency exchange. The attack marks the second attack on Iran’s financial systems in as many days.  Predatory Sparrow, the group that self identifies as Gonjeshe Darande in Persian, claimed responsibility for the attack…

AWS Makes Bevy of Updates to Simplify Cloud Security

Amazon Web Services (AWS) added a bevy of additional cybersecurity tools and services to its portfolio that collectively make securing its cloud computing platform simpler. Announced at the AWS re:Inforce 2025 conference, the additions include a preview of a revamped AWS Security Hub that now identifies which vulnerabilities from a threat perspective are potentially the..…

Why AI Agents are the Secret to a Proactive Cybersecurity Defense

To level the playing field, enterprise security teams must begin to use AI — especially AI agents — to augment their existing human talent. The post Why AI Agents are the Secret to a Proactive Cybersecurity Defense appeared first on Security Boulevard.

Researchers say AI hacking tools sold online were powered by Grok, Mixtral

Multiple variants of jailbroken and uncensored AI tools being sold on hacker forums were likely generated using popular commercial large language models from Mistral AI and X’s Grok, according to research published Tuesday from Cato Networks. As some commercial AI companies have sought to build guardrails into their models for safety and security — preventing…

Ensure Certainty in Your Cloud-Native Security

How Secure is Your Cloud-Native Security? We can’t ignore the rising importance of non-human identities (NHIs) and Secrets Security Management in the field of cloud-native security. Defined by the unique interplay between “Secrets” and permissions, NHIs illustrate an innovative approach to cybersecurity where both machine identities and their respective access credentials are effectively managed. Boosting…

Make Your Team Capable with Advanced NHIDR

Are You Leveraging NHIDR Capabilities for Advanced Cybersecurity? Managing Non-Human Identities (NHIs) and Secrets Security is not only a critical factor but also a cornerstone. With cyber threats become increasingly sophisticated, isn’t it time your team upgraded its capabilities with advanced NHIDR? NHIs, the machine identities used in cybersecurity, have a pivotal role in securing…

Iran’s Bank Sepah disrupted by cyberattack claimed by pro-Israel hacktivist group

Bank Sepah’s website is offline following a hacktivist group’s claimed attack on the Iran state-owned bank. The group, known as Predatory Sparrow —  or Gonjeshke Darande in Persian — said in a social media post early Tuesday that it “destroyed the data of the Islamic Revolutionary Guard Corps’ Bank Sepah.” Iran-focused media outlets report Bank…

U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam

The DOJ is moving to collect $7.74 million seized two years ago in connection with a criminal case involving an IT worker scam run by North Korean operatives. The case is one of many that have been running in the United States and elsewhere for almost a decade. The post U.S. Moves to Collect $7.74…

Cyber experts call for supercharging volunteer network to protect community organizations

The United States should move toward a new model where “target rich, resource-poor” community organizations like hospitals, schools, utilities and municipal governments share their cybersecurity responsibilities with “other, more capable actors” in the government and private sectors. That is the primary conclusion of a new report released Tuesday by the Cyber Resilience Corps, a volunteer…

Novel TokenBreak Attack Method Can Bypass LLM Security Features

Researchers with HiddenLayers uncovered a new vulnerability in LLMs called TokenBreak, which could enable an attacker to get around content moderation features in many models simply by adding a few characters to words in a prompt. The post Novel TokenBreak Attack Method Can Bypass LLM Security Features appeared first on Security Boulevard.

Scattered Spider, fresh off retail sector attack spree, pivots to insurance industry

Scattered Spider, the loose-knit cybercrime collective that recently ran roughshod over U.K.- and U.S.-based retailers, has pivoted once again, setting its sites on insurance companies, according to Google Threat Intelligence Group. Google previously warned that the financially motivated threat group, which it tracks as UNC3944, was pivoting to U.S. retailers following a wave of ransomware…

Cybercrime crackdown disrupts malware, infostealers, marketplaces across the globe

As spring gives way to summer, a wave of cybercrime crackdowns has taken root, with law enforcement and private security companies directing a surge of takedowns, seizures, indictments and arrests. Prolific infostealers, malware loaders, counter antivirus and crypting services, cybercrime marketplaces, ransomware infrastructure and DDoS-for-hire operations have all been seized, taken offline or severely disrupted…

Washington Post Journalists’ Microsoft Email Accounts Hacked

The Microsoft email accounts of several Washington Post journalists whose coverage includes national security and economic policy, including China, where hacked and could give the bad actors access to the messages that were sent and received. The post Washington Post Journalists’ Microsoft Email Accounts Hacked appeared first on Security Boulevard.

Drive Innovation Through Advanced NHI Management

Why is Advanced NHI Management Crucial for Driving Innovation? Where data is the new gold, organizations must ensure the safety of this precious commodity. But how can this be achieved? Could enhancing Non-Human Identities (NHIs) management be a powerful tool to drive innovation and boost cybersecurity? One might argue that the answer lies in advanced…

How Can NHIs Enhance Overall System Security?

How Can NHIs Serve as the Crucial Backbone in Overall System Protection? What if there was a foolproof method for safeguarding your organization’s systems and data from potential threats? A diligent layer of security that offers complete visibility and control over system vulnerabilities? The answer lies in the competent management of Non-Human Identities (NHIs) and…

Zero-Click Flaw in Microsoft Copilot Illustrates AI Agent, RAG Risks

Aim Security researchers found a zero-click vulnerability in Microsoft 365 Copilot that could have been exploited to have AI tools like RAG and AI agents hand over sensitive corporate data to attackers simply by issuing a request for the information in a specially worded email. Microsoft fixed the security flaw. The post Zero-Click Flaw in…

Assured Compliance Through Effective NHI Management

Is Assured Compliance Your Ultimate Goal? Consider Effective NHI Management Ever wondered how Non-Human Identities (NHIs) and Secrets Security Management could significantly enhance your cybersecurity strategy and lead to assured compliance? With the ever-increasing threats, it is essential for every organization, regardless of its sector, to prioritize robust strategies that can provide end-to-end protection. By…

Freedom to Choose Your NHI Security Approach

Does Non-Human Identity Management Hold the Key to Effective Cybersecurity? The management of Non-Human Identities (NHIs) and secrets has emerged as a pivotal component. For organizations aiming to bolster their cybersecurity strategy, the integration of NHI management can yield substantial benefits. But what is NHI management, and how can it mitigate risks associated with security…

Global law enforcement action in Asia nets large infrastructure seizure, 32 arrests

Authorities from 26 countries scored another win in the global crackdown on cybercrime earlier this year, chipping away at multiple operations in Asia by arresting dozens of alleged cybercriminals and seizing a vast array of infrastructure, Interpol announced Wednesday.  Operation Secure, which ran through the first four months of the year, targeted physical and virtual…

How Amazon Web Services uses AI to be a security ‘force multiplier’

When Amazon Web Services deploys thousands of new digital sensors around the globe, it often runs into a ruthless truth of the internet: Within minutes, the sensors are poked, prodded, and attacked. However, using large language models, the company is turning those immediate attacks into actionable security intelligence for its vast array of cloud-centered services.  …

Integrate Threat Intelligence Feeds via TAXII Protocol 

ANY.RUN’s Threat Intelligence Feeds (TI Feeds) provide security teams with exclusive intel on threats targeting 15,000 companies worldwide. With TAXII protocol, you can safely and easily reinforce your company’s proactive detection with TI Feeds.   Why Use TAXII for TI Feeds?  TAXII (Trusted Automated eXchange of Indicator Information) allows for swift and comfortable delivery of threat…

5 Key Ways Threat Intelligence Feeds Drive SOC Performance  

Modern Security Operations Centers (SOCs) face an unprecedented challenge: defending against an ever-evolving threat landscape while managing alert fatigue, resource constraints, and the need for rapid response times. The integration of high-quality Threat Intelligence (TI) feeds has proven itself as a force multiplier for SOC teams, transforming reactive security postures into proactive defense strategies.  ANY.RUN’s…

Microsoft Patch Tuesday addresses 66 vulnerabilities, including an actively exploited zero-day

Microsoft addressed 66 vulnerabilities across its suite of products and systems, including a zero-day in WebDAV that allows unauthorized attackers to remotely execute code, the company said in its latest security update Tuesday.  The espionage group Stealth Falcon exploited the zero-day — CVE-2025-33053 — to execute malware on a defense company in Turkey in March,…

Innovative Approaches to NHI Protection

Will Rising Cybercrimes Warrant a More Innovative Approach to NHI Protection? With the intensifying wave of cybercrimes, robust and innovative strategies are crucial in tackling these emerging threats. One area that is often overlooked yet holds immense potential for a more secure digital is the management of Non-Human Identities (NHIs) and Secrets. Are we ready…

United Natural Foods fulfilling orders on ‘limited basis’ in wake of cyberattack

United Natural Foods’ operations remain significantly impacted by a cyberattack that prompted the company to completely shut its network down last week, executives said Tuesday. The food distributor and wholesaler is fulfilling some customers’ orders on a limited basis, depending on the technology platform involved, and some customers are maintaining inventory with help from other…

How SOC Teams Save Time and Effort with ANY.RUN: Action Plan 

Recently, we hosted a webinar exploring the everyday challenges SOC teams face and how ANY.RUN helps solve them. From low detection rates to alert fatigue, poor coordination, and infrastructure overhead, our team outlined a practical action plan to tackle it all.  Missed the session? Here are the key highlights in this quick recap.  Quick reminderTry…

Why Traditional Email Filters Aren’t Enough to Stop Phishing in K–12

How to stop phishing in K-12 using artificial intelligence Phishing is one of the most common—and most damaging—cybersecurity threats facing K–12 schools today. And yet, many districts still rely on basic, built-in email filters as their primary line of defense. These tools simply aren’t built to handle the sophisticated, social engineering threats schools are facing…

United Natural Foods, distributor for Whole Foods Market, hit by cyberattack

Whole Foods Market’s primary food distributor United Natural Foods is experiencing operational disruptions in response to a cyberattack it detected last week, the company said in a regulatory filing released Monday. The Rhode Island-based natural food distributor said it took some systems offline Thursday when it became aware of unauthorized activity on its IT systems.…

BadBox 2.0 Botnet Infects Million-Plus Devices, FBI Says

BadBox 2.0, which emerged two years after the initial iteration launched and a year after it was disrupted by vendors, has infected more than 1 million IoT consumer devices, prompting a warning to such systems from the FBI. The post BadBox 2.0 Botnet Infects Million-Plus Devices, FBI Says appeared first on Security Boulevard.

FBI veteran Brett Leatherman to lead Cyber division

A familiar face is being promoted from within to lead the FBI’s Cyber division. In a LinkedIn post Sunday, Leatherman said that FBI Director Kash Patel had selected him as assistant director and lead official for the FBI’s primary division for investigating cybercrimes.  e The role is prominent in national security, espionage and counterintelligence investigations.…

Security in the Age of AI with Anand Oswal at RSAC Conference 2025

At this year’s RSAC Conference, one theme loomed large: AI isn’t just a tool anymore—it’s a battleground. Industry veteran Anand Oswal discussed how AI is reshaping both sides of the cybersecurity equation: It’s amplifying the speed and scale of attacks while simultaneously offering new ways to fight back. The complexity of securing AI applications is..…

Security in the Age of AI with Anand Oswal

At this year’s RSAC Conference, one theme loomed large: AI isn’t just a tool anymore—it’s a battleground. Industry veteran Anand Oswal discussed how AI is reshaping both sides of the cybersecurity equation: It’s amplifying the speed and scale of attacks while simultaneously offering new ways to fight back. The complexity of securing AI applications is..…

Internet infamy drives The Com’s crime sprees

The Com doesn’t fit into a traditional definition of cybercrime. While the majority of groups tend either be financially-motivated or working at the behest of a government, The Com’s chaotic, sprawling network, composed of mostly teenagers and young adults, are committing their crimes primarily for notoriety amongst their peers on the internet, Allison Nixon, chief…

Trump EO Takes Aim at Biden, Obama Provisions for Identity, Sanctions, AI

In a new cybersecurity EO, President Trump is taking a hatchet to some mandates imposed by Presidents Biden and Obama around digital identities and election interference and narrowing requirements for AI, quantum computing, and software development. The post Trump EO Takes Aim at Biden, Obama Provisions for Identity, Sanctions, AI appeared first on Security Boulevard.

Unverified code is the next national security threat

American infrastructure is powered by open-source software and no one knows who wrote it. That’s not hyperbole. It’s a structural vulnerability. Every day, government agencies, contractors, and Fortune 500 companies deploy software built by anonymous developers and downloaded from public repositories into critical systems — sometimes with no scrutiny of who created it or whether…

WordPress Appliance - Powered by TurnKey Linux