433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

Why data, AI, and regulations top the threat list for 2024

The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges. Let’s explore the three main security challenges businesses will face in 2024: 1. Data Modern businesses generate and manage vast volumes of data daily. Since data is central to decision-making and competitive advantage, its sudden disruption or unavailability can … More → The post Why data, AI, and regulations top the threat list for 2024 appeared first on Help Net Security.
http://news.poseidon-us.com/T0QSBq

A closer look at the manufacturing threat landscape

The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing cybersecurity challenges. In this Help Net Security video, Kory Daniels, CISO at Trustwave, discusses recent comprehensive research highlighting the distinct cybersecurity threats confronting manufacturers. Trustwave SpiderLabs has documented the attack flow utilized by threat groups, exposing their tactics, techniques, and procedures. From email-borne malware to exploiting SMB and DCOM protocols for lateral movement, these … More → The post A closer look at the manufacturing threat landscape appeared first on Help Net Security.
http://news.poseidon-us.com/T0QMTK

How executives adapt to rising cybersecurity concerns in mobile networks

In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in network operators as they struggle to protect consumers from sophisticated (usually state-sponsored) cyber threats. The post How executives adapt to rising cybersecurity concerns in mobile networks appeared first on Help Net Security.
http://news.poseidon-us.com/T0QMSM

ISC Stormcast For Thursday, December 21st, 2023 https://isc.sans.edu/podcastdetail/8788, (Thu, Dec 21st)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/T0Q9jd

SimSpace raises $45 million to fuel continued growth

SimSpace has closed a $45 million equity raise led by L2 Point Management, a private investment firm specializing in flexible capital solutions for growth companies. This investment brings the total capital raised by SimSpace over the past year to $70 million and will support the company’s continued growth trajectory, including its expansion into new geographies. SimSpace works with the most advanced Fortune 2000 companies, as well as national and state governments, to provide unmatched training … More → The post SimSpace raises $45 million to fuel continued growth appeared first on Help Net Security.
http://news.poseidon-us.com/T0NQnH

Product showcase: ImmuniWeb AI Platform

ImmuniWeb is a global application security company that currently serves over 1,000 customers from more than 50 countries. ImmuniWeb AI Platform has received numerous prestigious awards and industry recognitions for intelligent automation and acceleration of application security testing, which delivers better quality of testing and faster results for a more competitive price. ImmuniWeb’s AI technology received its first award back in 2019, and has received over 10 international awards for technical excellence and innovation in … More → The post Product showcase: ImmuniWeb AI Platform appeared first on Help Net Security.
http://news.poseidon-us.com/T0MyKh

Balancing AI’s promise with privacy and intellectual property concerns

Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key strengths of AI in cybersecurity lies in its ability to predict and prevent attacks before they occur. Powered by AI, predictive analytics enables security systems to forecast potential vulnerabilities and weaknesses, allowing organizations to implement proactive defense strategies and stay one step ahead of cyber adversaries. In this article, you will find excerpts from AI … More → The post Balancing AI’s promise with privacy and intellectual property concerns appeared first on Help Net Security.
http://news.poseidon-us.com/T0Mq6p

Subdominator: Open-source tool for detecting subdomain takeovers

Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools. “Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps in their functionality. No tool had a complete set of accurate service fingerprints or features. As a cybersecurity company, we want to ensure our clients get consistent and comprehensive testing, so I developed a new … More → The post Subdominator: Open-source tool for detecting subdomain takeovers appeared first on Help Net Security.
http://news.poseidon-us.com/T0Mq6C

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)

Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade the connection’s security by truncating the extension negotiation message. The Terrapin attack Terrapin is a prefix truncation attack targeting the SSH protocol. “By carefully adjusting the sequence numbers during the handshake, an attacker can remove an arbitrary amount of messages sent by the client or server at the beginning of the secure channel without the … More → The post SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795) appeared first on Help Net Security.
http://news.poseidon-us.com/T0Kvkd