433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

State Dept faces subpoena for confidential records. Diplomats fear chilling effect

House Republicans investigating the rapid U.S. withdrawal from Afghanistan are demanding access to confidential messages from career diplomats to State Department leadership.
http://news.poseidon-us.com/Slz1MJ

Views of a hot cyberwar — the Ukrainian perspective on Russia’s online assault

In a recent report issued by the State Service of Special Communications and Information Protection of Ukraine (SSSCIP) titled “Russia’s Cyber Tactics: Lessons Learned in 2022 — SSSCIP analytical report on the year of Russia’s full-scale cyberwar against Ukraine” readers obtained a 10,000-foot overview of what a hot cyberwar entails from the Ukrainian perspective. The SSSCIP report highlights the major targets, the coordination between government-advanced persistent threat groups and “hacktivists”, espionage operations and influence operations, and the Ukrainian analysis and discoveries. To read this article in full, please click here
http://news.poseidon-us.com/SlyjR4

Jeff Otto joins Riskified as CMO

Riskified has announced that Jeff Otto has joined the company as Chief Marketing Officer, effective immediately. Otto will be responsible for a global integrated marketing strategy that will amplify Riskified’s brand, strengthen its category leadership and accelerate demand for Riskified’s expanding product suite. “It’s an exciting moment to have Jeff lead the charge on marketing with Riskified reaching the crossroads of both growth and profitability,” said Eido Gal, CEO, Riskified. “Jeff has the ideal blend … More → The post Jeff Otto joins Riskified as CMO appeared first on Help Net Security.
http://news.poseidon-us.com/SlxpZL

A Serial Tech Investment Scammer Takes Up Coding?

John Clifton Davies, a 60-year-old con man from the United Kingdom who fled the country in 2015 before being sentenced to 12 years in prison for fraud, has enjoyed a successful life abroad swindling technology startups by pretending to be a billionaire investor. Davies’ newest invention appears to be “CodesToYou,” which purports to be a “full cycle software development company” based in the U.K.
http://news.poseidon-us.com/SlwtV8

Malware and machine learning: A match made in hell

We’ve been developing machine learning-based cybersecurity systems for many years and began developing automation for analysis in our labs in 2005. These early automation projects have since evolved into full-blown machine-learning frameworks. Since then, we’ve been waiting for our enemies to make the same move, and after 18 years, the wait is over – malware with artificial intelligence has arrived. Defenders have been able to automate their work for some time, enabling excellent detection, analysis … More → The post Malware and machine learning: A match made in hell appeared first on Help Net Security.
http://news.poseidon-us.com/Slvqsz

5 strategies to manage cybersecurity risks in mergers and acquisitions

Mergers and acquisitions (M&A) have the potential to introduce significant cybersecurity risks for organizations. M&A teams are generally limited in size and focused on financials and business operations, with IT and cybersecurity taking a back seat early in the process, according to Doug Saylors, partner and co-lead of cybersecurity with global technology research and advisory firm ISG.  “Assumptions about connecting networks, ‘rationalizing’ IT and cybersecurity platforms and staff are generally made with limited knowledge of the actual functions and work performed in each organization,” Saylor says. A company merging, being acquired, or undergoing any other M&A activity must be able to evaluate security requirements that could affect the business strategy and risks of the future entity, according to a report on cybersecurity in the M&A and due diligence process from Gartner. “This results in an understanding of the state of security in the acquired company (to the extent possible pre-deal) to ensure that there are no rude shocks and in a plan for how to address the integration aspect safely and securely,” the report noted. To read this article in full, please click here
http://news.poseidon-us.com/Slvn0v

Week in review: 3CX supply chain attack, ChatGPT data leak

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Visa fraud expert outlines the many faces of payment ecosystem fraud In this Help Net Security interview, Michael Jabbara, the VP and Global Head of Fraud Services at Visa, delves into digital skimming attacks, highlighting their common causes, and provides insights into what measures merchants can take to prevent them. Exchange Online will soon start blocking emails from old, vulnerable … More → The post Week in review: 3CX supply chain attack, ChatGPT data leak appeared first on Help Net Security.
http://news.poseidon-us.com/Slt77C