433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

Critical ManageEngine RCE flaw is being exploited (CVE-2022-35405)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2022-35405, a critical remote code execution vulnerability in ManageEngine PAM360, Password Manager Pro, and Access Manager Plus, to its Known Exploited Vulnerabilities (KEV) Catalog. The details of in-the-wild exploitation of the flaw aren’t available – though, according to data collected by Greynoise, exploitation attempts don’t seem widespread. About CVE-2022-35405 CVE-2022-35405 is a remote code execution vulnerability that can be exploited to execute arbitrary code on … More → The post Critical ManageEngine RCE flaw is being exploited (CVE-2022-35405) appeared first on Help Net Security.
http://news.poseidon-us.com/SYry7g

Tackling the weaknesses of smart buildings’ technology

Like any other innovation, the integration of IoT technology in smart buildings will bring benefits as well as more and newer risks. The market for smart building technologies continues to grow at even faster rates. By 2020, 1.7B connected devices have already been deployed and used globally, and this number is expected to grow to over 3B by 2024. 97% of these IoT technologies and devices are vulnerable to medium and high-level potential cyber risks, … More → The post Tackling the weaknesses of smart buildings’ technology appeared first on Help Net Security.
http://news.poseidon-us.com/SYr907

How does identity crime affect victims?

The Identity Theft Resource Center (ITRC) has published a research that shows nearly 40 percent of ITRC victims say their personal information was stolen, compromised or misused in the past year. The report goes beyond the known financial implications of identity crimes and explores the lost opportunities as well as the emotional, physical and psychological impacts experienced by victims resulting from the crimes. For the report, the ITRC surveyed victims who contacted the ITRC and … More → The post How does identity crime affect victims? appeared first on Help Net Security.
http://news.poseidon-us.com/SYr902

Risk management focus shifts from external to internal exposure

Coalfire released its fourth annual Securealities Penetration Risk Report which analyzes enterprise and cloud service providers (CSPs) internal and external attack vectors, application development and mobile app security, social engineering and phishing, and PCI- and FedRAMP-specific findings, with data segmented by industry and company size. The report reflects the results of more than 3,100 penetration tests from nearly 1,600 client engagements in the technology, financial services, healthcare, and retail sectors. Long-term data shows that cyber … More → The post Risk management focus shifts from external to internal exposure appeared first on Help Net Security.
http://news.poseidon-us.com/SYr8Zy

State Department looking to pay college students who speak fluent computer

In today’s Federal Newscast — Special delivery: Louis DeJoy brings joy to postal managers with a 3% pay raise. There appears to be no end in sight trying to attract qualified Americans to join the military. And another Bureau of Land Management office votes to join the union.
http://news.poseidon-us.com/SYp5ZM

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

Credential compromise has been one of the top causes for network security breaches for a long time, which has prompted more organizations to adopt multi-factor authentication (MFA) as a defense. While enabling MFA for all accounts is highly encouraged and a best practice, the implementation details matter because attackers are finding ways around it. One of the most popular ways is spamming an employee whose credentials have been compromised with MFA authorization requests until they become annoyed and approve the request through their authenticators app. It’s a simple yet effective technique that has become known as MFA fatigue and was also used in the recent Uber breach. To read this article in full, please click here
http://news.poseidon-us.com/SYnK8J

The best ways to safeguard crypto assets

The mainstream emergence of cryptocurrency, coupled with its popularity among cybercriminals, has created a potentially dangerous environment for those with significant crypto holdings. In this Help Net Security video, Nick Percoco, Chief Security Officer at Kraken, explains why it’s important for crypto holders to think about personal security as an ongoing, holistic process, and offers tips on how to safeguard crypto assets. The post The best ways to safeguard crypto assets appeared first on Help Net Security.
http://news.poseidon-us.com/SYmgZ2