433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Bad data costs Americans trillions. Let’s fix it with a renewed data strategy

Nick Hart of the Data Foundation and Suzette Kent, a former federal CIO, explain how using federal data could cut waste, create jobs and own America’s future. The post Bad data costs Americans trillions. Let’s fix it with a renewed data strategy first appeared on Federal News Network.
http://news.poseidon-us.com/TGbFjL

Bad data costs Americans trillions. Let’s fix it with a renewed data strategy

Nick Hart of the Data Foundation and Suzette Kent, a former federal CIO, explain how using federal data could cut waste, create jobs and own America’s future. The post Bad data costs Americans trillions. Let’s fix it with a renewed data strategy first appeared on Federal News Network.
http://news.poseidon-us.com/TGbFMf

My 2025 Tech Predictions

AI: everything, everywhere, all at once. From AI PCs to data center transformations, Jeff Clarke, Vice Chairman and COO at Dell Technologies identifies the top five trends that will drive business in 2025.
http://news.poseidon-us.com/TGbDc1

Maximizing Microsoft Intune: Insights for IT Leaders

Whether you’re new to Intune or looking to expand the capabilities of your Intune install, this is the Webinar for you — register today!
http://news.poseidon-us.com/TGbDL7

Solana’s popular web3.js library backdoored in supply chain compromise

A software supply chain attack has lead to the publication of malicious versions of Solana’s web3.js library on the npm registry. Just like the recent Lottie Player supply chain compromise, this attack was reportedly made possible due to compromised (phished) npm.js account credentials. What happened? “Earlier today, a publish-access account was compromised for @solana/web3.js, a JavaScript library that is commonly used by Solana [decentralized apps]. This allowed an attacker to publish unauthorized and malicious packages … More → The post Solana’s popular web3.js library backdoored in supply chain compromise appeared first on Help Net Security.
http://news.poseidon-us.com/TGbCQ7

Cisco NX-OS Software Image Verification Bypass Vulnerability

A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification. This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-image-sig-bypas-pQDRQvjL Security Impact Rating: High CVE: CVE-2024-20397
http://news.poseidon-us.com/TGb9vQ

How widespread is mercenary spyware?

A targeted hunt on 2,500 mobile devices for indicators of compromise associated with mercenary spyware has revealed that its use is not as rare as one would hope. The results of the hunt Earlier this year, iVerify added a threat hunting feature to its mobile security solution for Android-based phones and iPhones and urged users to try it out. 2,500 of them did, and six (possibly seven) discovered that they’ve been infected with NSO Group’s … More → The post How widespread is mercenary spyware? appeared first on Help Net Security.
http://news.poseidon-us.com/TGb3Zz

Product showcase: Securing Active Directory passwords with Specops Password Policy

Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a strong and unique password, significantly reducing the risk of unauthorized access and data breaches. These policies not only protect sensitive data but also align with best practices and compliance requirements, such as those outlined by NIST. Specops research has found that passwords are still used by 88% of organizations. So even if they can cause … More → The post Product showcase: Securing Active Directory passwords with Specops Password Policy appeared first on Help Net Security.
http://news.poseidon-us.com/TGb3YN

U.S. Offered $10M for Hacker Just Arrested by Russia

In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as “Wazawaka,” a cybercriminal who was deeply involved in the formation and operation of multiple ransomware groups. The U.S. government indicted Matveev as a top ransomware purveyor a year later, offering $10 million for information leading to his arrest. Last week, the Russian government reportedly arrested Matveev and charged him with creating malware used to extort companies.
http://news.poseidon-us.com/TGb3JL