Geek-Guy.com

Breachforums Boss to Pay $700k in Healthcare Breach

In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on the forum in 2023. Conor Brian Fitzpatrick, a.k.a. “Pompompurin,” is slated for resentencing next month…

Anthropic’s lawyer was forced to apologize after Claude hallucinated a legal citation

A lawyer representing Anthropic admitted to using an erroneous citation created by the company’s Claude AI chatbot in its ongoing legal battle with music publishers, according to a filing made in a Northern California court on Thursday. Claude hallucinated the citation with “an inaccurate title and inaccurate authors,” Anthropic says in the filing, first reported…

FBI warns of fake texts, deepfake calls impersonating senior U.S. officials

The FBI said Thursday that malicious actors have been impersonating senior U.S. government officials in a text and voice messaging campaign, using phishing texts and AI-generated audio to trick other government officials into giving up access to their personal accounts. The warning provided few details about the campaign, which started in April and appears to…

Lucid’s record quarter got a lift from rental sales and company leases

Lucid Motors set a company record for deliveries in the first quarter of 2025, shipping 3,109 EVs to customers in North America, Europe, and Saudi Arabia. It appears that a new company car program and sales to rental fleets helped it get there.  According to a footnote in Lucid Motors’ latest regulatory filing, it sold…

Google patches Chrome vulnerability used for account takeover and MFA bypass

Chrome users are advised to update their browser immediately to fix a critical vulnerability that is being exploited to launch account takeover attacks. In some environments, this could even give attackers the ability to bypass multi-factor authentication (MFA). The recently-reported vulnerability, one of four fixed in a Wednesday update, is tracked as CVE-2025-4664 and affects…

Startups Weekly: A brighter outlook, but don’t get carried away

Welcome to Startups Weekly — your weekly recap of everything you can’t miss from the world of startups. Want it in your inbox every Friday? Sign up here. Startup news this week was fairly routine — in a good way: Aside from a minor kerfuffle between Y Combinator and Google, there was no headline-grabbing drama.…

The ‘Network of Tomorrow’ begins with the innovation of today

GUEST OPINION by Anthony Behan, Global Managing Director, Communications, Media & Entertainment at Cloudera: Australians are more digitally connected than ever – relying heavily on mobile networks to manage daily life.  Around 94.1% of Australians aged 16-64 access the internet through their mobile phones, spending nearly 3 hours a day online. Telstra alone reported managing…

Unlocking Smarter In-Store Insights: SOTI Launches Personal Shopper Dashboards to Empower Australian Retailers

GUEST RESEARCH:  New research reveals the two most important factors that determine a positive in-store experience for Australian consumers. According to an exclusive study of Australian shoppers by SOTI, 85% of people say the speed at which they can access the store, find their item and complete payment, is critical to ensuring a positive instore experience.…

SAP cyberattack widens, drawing Salt Typhoon and Volt Typhoon comparisons

Hundreds of victims are surfacing across the world from zero-day cyberattacks on Europe’s biggest software manufacturer and company, in a campaign that one leading cyber expert is comparing to the vast Chinese government-linked Salt Typhoon and Volt Typhoon breaches of critical infrastructure. The zero-days — vulnerabilities previously unknown to researchers or companies, but that malicious…

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced…

North Korea’s ‘state-run syndicate’ looks at cyber operations as a survival mechanism

Over the past few years, cybersecurity experts have increasingly said that nation-state operatives and cybercriminals often blur the boundaries between geopolitical and financial motivations. A new report released Wednesday shows how North Korea has flipped that idea on its head.  North Korea has silently forged a global cyber operation that experts now liken to a…

Cognichip emerges from stealth with the goal of using generative AI to develop new chips

Chips are a critical component of the AI industry. But new chips don’t hit the market with the same speed as new AI models and products do. Cognichip has a lofty goal of creating a foundational AI model that can help bring new chips to market faster. San Francisco-based Cognichip is working to build a…

Google rolls out new AI and accessibility features to Android and Chrome

Google announced on Thursday that it’s rolling out new AI and accessibility features to Android and Chrome. Most notably, TalkBack, Android’s screen reader, now lets you ask Gemini about what’s in images and what’s on your screen. Last year, Google brought Gemini’s capabilities to TalkBack to give people who are blind or have low vision…

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

Arachnid alarm: Three major British retailers recently attacked, resulting in huge damage. Now we see the self-same scum spotlighting stores in the States. The post Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware) appeared first on Security Boulevard.

BSidesLV24 – GroundFloor – The Road To Developers’ Hearts

Author/Presenter: Sing Ambikapathi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – GroundFloor – The Road To Developers’ Hearts appeared first on Security Boulevard.

Host a tailored Side Event at All Stage 2025 in Boston

Looking to make a splash at TechCrunch All Stage 2025? Our Side Events initiative is a fantastic opportunity to engage with Boston’s tech community in a dynamic and memorable manner. Plus, we’ll assist in promoting your event at no cost to you! Submit your event here by June 10. Throw your own Side Event at…

Threads now lets creators add up to 5 links to profiles, track clicks

Instagram Threads is taking on Linktree and other “link-in-bio” solutions by introducing a way for creators to use their Threads profile to share links to their other interests and online presences. At launch, the feature will support adding up to five links to a bio, which can connect visitors to the creator’s blog, newsletter, website,…

Boomi and AWS Announce Strategic Collaboration to Transform Enterprise AI Integration, Automation, and SAP Cloud Migration

Boomi, the leader in AI-driven automation, today announced a multi-year Strategic Collaboration Agreement (SCA) with Amazon Web Services (AWS) to help customers build, manage, monitor and govern generative artificial intelligence (AI) agents across enterprise operations. Additionally, the SCA will aim to help customers accelerate SAP migrations from on-premises to AWS.

Informatica Unveils Agentic AI Offerings on Its AI-Powered Cloud Data Management Platform

Informatica (NYSE: INFA), an AI-powered enterprise cloud data management leader, has announced its comprehensive strategy for Agentic AI, building on the company’s position as the industry’s first AI-powered cloud data management platform. Informatica’s strategic approach to Agentic AI expands on the company’s AI innovation history, which includes the launch of CLAIRE GPT, CLAIRE Copilot and GenAI…

Apple finally launches next-gen ‘CarPlay Ultra’ software, starting with Aston Martin

Apple’s next-generation version of its popular CarPlay infotainment software is finally launching three years after it was first announced. The company said Thursday that this new version of CarPlay — now known as “CarPlay Ultra” — will start rolling out on new Aston Martin vehicles in the U.S. and Canada, roughly half a year late.…

Doji raises $14M to make virtual try-ons fun through your avatars

For years, big tech companies like Amazon and Google have been trying to make virtual try-ons engaging to encourage consumers to shop more online. Startups also tried to solve for inspiration and fit in fashion using AI. A new startup called Doji is now entering this space with an app designed to make apparel try-ons…

XTIUM Exec on How Channel Can Navigate 2025 Complexities

Managed IT services provider XTIUM supports customers with a security-first approach to technology. Channel Insider spoke with Kevin Sullivan,  principal technology consultant focused on cloud offerings at XTIUM, to dive into how uncertain times can lead to untapped potential in the market. Uncertainty is the name of the (confusing) game this year Sullivan has worked…

Tenable Adds Connectors, Dashboards to Platform Offering

Exposure management platform vendor Tenable has added new connectors to nearly 40 third-party solutions in an effort to simplify how organizations stay secure. Tenable One gains third-party tool integrations and customizable dashboards The company today announced various updates to its Tenable One platform, all aimed at simplifying an organization’s approach to security. Tenable One now…

Alternatives to Microsoft Outlook webmail come under attack in Europe

CISOs need to ensure that web email clients and browsers are kept up to date following the discovery of cross site scripting attacks on organizations running webmail clients such as Roundcube, Horde, MDaemon, and Zimbra. The alert came today from researchers at ESET, who, after seeing attacks on government and defense organizations in Ukraine, Romania,…

Acorns acquires family wealth and digital memory platform EarlyBird

Savings and investing startup Acorns has acquired EarlyBird, an investment gifting platform for families, the company told TechCrunch exclusively. The financial terms of the deal were not disclosed. As part of the acquisition, EarlyBird will shut down, and all customer accounts will officially close on June 23. Customers’ funds will be returned to the bank…

Roblox now lets creators sell physical products within their experiences

Roblox announced on Thursday that creators can now sell physical merchandise directly within their experiences and games on the platform with the launch of new Commerce APIs. The offering provides creators with a new way to generate revenue beyond the purchases of virtual goods or one-time fees to access specific experiences. The company first began…

Stealth RAT uses a PowerShell loader for fileless attacks

>Threat actors have been spotted using a PowerShell-based shellcode loader to stealthily deploy Remcos RAT, a popular espionage-ready tool in line with a broader shift toward fileless techniques. As discovered by Qualys, the campaign executes a number of steps to phish an obfuscated .HTA (HTML Application) file that runs layered PowerShell scripts entirely in memory.…

Small but Mighty: UX Design Tips for a Lean Team Environment

As a senior UX designer at Tidal Cyber, I often field questions from other designers and cybersecurity industry colleagues on how to work effectively in a lean team environment. Lean teams typically operate with a ratio of one designer for every 10 to 20 developers. So, it requires a lot of multi-tasking, context-switching, and cross-team…

Who needs VC funding? How cybercriminals spread their ill-gotten gains to everyday business ventures

Cybercriminals aren’t so different from the rest of us — they live in the real world, and their spending and investment habits, though funded through crime, can look surprisingly ordinary. Luxury cars and lavish vacations may still grab headlines, but those perks are reserved for the most elite cybercriminals. In reality, everyday businesses — like pizza…

Pen Testing for Compliance Only? It’s Time to Change Your Approach

Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected. This situation isn’t theoretical: it

Data on sale: Trump administration withdraws data broker oversight proposal

The US Consumer Financial Protection Bureau has withdrawn a proposed rule that would have restricted data brokers from selling US citizens’ personal and financial information.   The decision, announced Wednesday in the Federal Register, marks a significant reversal in consumer privacy protection efforts and raises serious concerns about the security of sensitive personal data.  “With the…

South Korea delays decision on letting Google move hi-res map data overseas

South Korea has once again postponed a decision on whether to approve Google’s request to transfer the high-precision map data it has on the country’s geography to its international servers. In February, Google had requested approval from the Korean National Geographic Information Institute to deploy a 1:5,000 scale map on its app in the country…

5 BCDR Essentials for Effective Ransomware Defense

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a chilling example, Microsoft recently disclosed how threat actors misused its Quick Assist remote assistance tool to deploy the destructive

Hacker nehmen Rüstungslieferanten der Ukraine ins Visier

Russische Hacker greifen gezielt Rüstungsfirmen an, die die Ukraine mit Waffen versorgen. PeopleImages.com – Yuri A – Shutterstock.com Die berüchtigte russische Hackergruppe Fancy Bear hat gezielt Rüstungsfirmen angegriffen, die Waffen an die Ukraine liefern. Das geht aus einer aktuellen Studie des slowakischen Sicherheitsunternehmens Eset aus Bratislava hervor. Danach richteten sich die Angriffe vor allem gegen…

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting (XSS) vulnerabilities, including a then-zero-day in MDaemon, according to new findings from ESET. The activity, which commenced in 2023, has been codenamed Operation RoundPress by the Slovak cybersecurity company. It…

CyberStrong May Product Update

The team at CyberSaint is thrilled to announce the latest additions and updates to the CyberStrong solution. To start, we’ve expanded Continuous Control Automation to help our clients streamline adoption and configuration, helping you assess your cyber risk data faster than ever before. We’ve also added updates to editing reports and an important update to…

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems. “This campaign employs clever Unicode-based steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final

How phones get hacked: 7 common attack methods explained

The smartphone revolution was supposed to provide a second chance for the tech industry to roll out a secure computing platform. These new devices were purported to be locked down and immune to malware, unlike buggy PCs and vulnerable servers. But it turns out that phones are still computing devices and their users are still people,…

Fancy Bear campaign sought emails of high-level Ukrainians and their military suppliers

Fancy Bear, the hacking group linked to Russia’s Main Intelligence Directorate (GRU), has been targeting the email accounts of high-ranking Ukrainian officials as well as executives at defense contractors located in other countries who sell weapons and equipment to Kyiv, according to new research from ESET. The campaign, ongoing since at least 2023, has taken…

Riverbed Supercharges Networks for AI’s Data Demands

Riverbed has launched its most comprehensive acceleration update in seven years, significantly enhancing its SteelHead hardware and software portfolio. The company just rolled out significant updates to its SteelHead products, which tackle the complex data handling challenges AI brings to the table. Riverbed’s timing couldn’t be better—networks are increasingly being completely reconfigured for AI workloads.…