433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom

Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. “The attackers behind this campaign likely leveraged extensive automation techniques to operate successfully and rapidly,” according to Palo Alto Networks researchers. Exposed environment files hold keys to hosting cloud environments The attackers gained access to the cloud storage containers by scanning for and … More → The post Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom appeared first on Help Net Security.
http://news.poseidon-us.com/TByHVQ

Engineers conduct first in-orbit test of ‘swarm’ satellite autonomous navigation

With 2D cameras and space robotics algorithms, astronautics engineers have created a navigation system able to manage multiple satellites using visual data only. They just tested it in space for the first time.
http://news.poseidon-us.com/TBwxzF

Sexual misconduct at Coast Guard is a fleet-wide problem, congressional probe finds

Accounts of Coast Guard whistleblowers reveal that sexual assault and harassment “impact enlisted members and officers just as pervasively as cadets.” The post Sexual misconduct at Coast Guard is a fleet-wide problem, congressional probe finds first appeared on Federal News Network.
http://news.poseidon-us.com/TBwbwt

How military service members can start building wealth early

To young service members, the idea of building wealth might seem like a pipe dream. They don’t earn much and often have high borrowing and housing costs. The post How military service members can start building wealth early first appeared on Federal News Network.
http://news.poseidon-us.com/TBw91b

ClearSale introduces three solutions to protect businesses from fraud

ClearSale has announced a new portfolio of fraud prevention tools designed to meet the evolving needs of today’s digital retail landscape. The newly launched suite, dubbed “Preventative Intel,” introduces three powerful solutions: Instant Decision, Automatic Decision, and Complete Decision. These tools are available now, offering a comprehensive approach to fraud management that helps brands prevent, combat, and protect against fraudulent activities in an increasingly complex market. Developed to protect businesses from advancing fraud risks, ClearSale’s … More → The post ClearSale introduces three solutions to protect businesses from fraud appeared first on Help Net Security.
http://news.poseidon-us.com/TBvmjZ

NIST releases finalized post-quantum encryption standards

NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first completed standards from NIST’s post-quantum cryptography (PQC) standardization project and are ready for immediate use. “The transition to quantum security will protect critical national infrastructure and make the entire technology supply chain more secure for decades – but modernizing vital security systems and components won’t happen overnight. With the threat … More → The post NIST releases finalized post-quantum encryption standards appeared first on Help Net Security.
http://news.poseidon-us.com/TBtjN8

ISC Stormcast For Wednesday, August 14th, 2024 https://isc.sans.edu/podcastdetail/9096, (Wed, Aug 14th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TBtZv6

Microsoft August 2024 Patch Tuesday, (Tue, Aug 13th)

This month we got patches for 186 vulnerabilities. Of these, 9 are critical, and 9 are zero-days (3 previously disclosed, and 6 are already being exploited). The CVEs CVE-2024-38189, CVE-2024-38178, CVE-2024-38193, CVE-2024-38106, CVE-2024-38213, and CVE-2024-38107 are related to the already exploited vulnerabilities and the CVEs CVE-2024-38202, CVE-2024-21302, and CVE-2024-38200 are related to previously disclosed ones. Amongst exploited vulnerabilities, the highest CVSS (CVSS 8.8) is related to the Microsoft Project Remote Code Execution Vulnerability (CVE-2024-38189) rated as Important. According to the advisory, Exploitation requires the victim to open a malicious Microsoft Office Project file on a system where the Block macros from running in Office files from the Internet policy is disabled and VBA Macro Notification Settings are not enabled allowing the attacker to perform remote code execution. Amongst critical vulnerabilities, one of the two 9.8 CVSS this month is associated to the Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability (CVE-2024-38140). According to the exploit, this vulnerability is exploitable only if there is a program listening on a Pragmatic General Multicast (PGM) port. If PGM is installed or enabled but no programs are actively listening as a receiver, then this vulnerability is not exploitable. An unauthenticated attacker could exploit the vulnerability by sending specially crafted packets to a Windows Pragmatic General Multicast (PGM) open socket on the server, without any interaction from the user. The other CVSS 9.8 is associated with the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). Systems are not affected if IPv6 is disabled on the target machine. The advisory says that an unauthenticated attacker could repeatedly send IPv6 packets, that include specially crafted packets, to a Windows machine which could enable remote code execution.
http://news.poseidon-us.com/TBtDjX

What Is Lead Time? How to Calculate Lead Time in Manufacturing

Projects are all about delivering a product or service. Whether you’re working in project management, manufacturing, supply chains or inventory management, you need to deliver something valuable to your customers. This is why lead time is so important. There are… Read More The post What Is Lead Time? How to Calculate Lead Time in Manufacturing appeared first on ProjectManager.
http://news.poseidon-us.com/TBsq5Y