433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

Kyndryl launches recovery retainer service for cyberattack response

Kyndryl is now offering a “recovery retainer service,” providing its own expert personnel as on-the-ground help to businesses recovering from ransomware and other types of cyberattacks. The service starts work before attacks happen, however—part of the offering is expert review and remediation of cyberattack preparedness, ensuring that organizations aren’t making easy targets of themselves. If an attack does occur, Kyndryl can provide live expert advice, either virtually or physically at the client’s facilities, to help ensure that critical data can be recovered and systems brought back online with a minimum of fuss. To read this article in full, please click here
http://news.poseidon-us.com/SVV4gc

TSP millionaires club: Brace for a hit!

Feds are likely to get the word, this week, that membership in the TSP millionaires club has plunged.
http://news.poseidon-us.com/SVV3lM

9 tips to prevent phishing

Phishing, in which an attacker sends a deceptive email tricks the recipient into giving up information or downloading a file, is a decades-old practice that still is responsible for innumerable IT headaches. Phishing is the first step for all kinds of attacks, from stealing passwords to downloading malware that can provide a backdoor into a corporate network. The fight against phishing is a frustrating one, and it falls squarely onto IT’s shoulders. To read this article in full, please click here
http://news.poseidon-us.com/SVSDgY

Week in review: The future of Metasploit, detecting lateral movement, new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Beware of password-cracking software for PLCs and HMIs! A threat actor is targeting industrial engineers and operators with trojanized password-cracking software for programmable logic controllers (PLCs) and human-machine interfaces (HMIs), exploiting their pressing needs to turn industrial workstations into dangerous bots. Vulnerabilities in popular GPS tracker could allow hackers to remotely stop cars Six vulnerabilities in the MiCODUS MV720 GPS … More → The post Week in review: The future of Metasploit, detecting lateral movement, new issue of (IN)SECURE Magazine appeared first on Help Net Security.
http://news.poseidon-us.com/SVQ1BZ

CommScope partners with Microsoft to help transform industrial manufacturing

CommScope announced that it has collaborated with Microsoft to create a converged private wireless network solution, enabling new low-latency and mobile applications to transform industrial manufacturing. CommScope successfully deployed the combined solution—using Microsoft Azure private MEC and CommScope CBRS access points—in its own manufacturing innovation center in Shakopee, Minnesota. Through this cloud-connected, low-latency private wireless network, CommScope is already improving both the operational efficiency and manufacturing agility of its facilities. This solution brings augmented reality … More → The post CommScope partners with Microsoft to help transform industrial manufacturing appeared first on Help Net Security.
http://news.poseidon-us.com/SVPMPB

Analysis of SSH Honeypot Data with PowerBI, (Sat, Jul 23rd)

I have been experimenting for a while with Microsoft PowerBI (1) using honeypot data, parsing it into comma delimited (CSV), sorting this data in a way that is easier to manipulate and visualize.
http://news.poseidon-us.com/SVNcLX