433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

What companies need to help secure AI

Experts say MLOps will bridge the gap between development and operations, creating room for the inclusion of security and privacy practices, too.
http://news.poseidon-us.com/THCqtm

McAfee Scam Detector spots scams across text, email, and video

McAfee launched the AI-powered McAfee Scam Detector — a tool designed to protect against text, email, and video scams. Today’s scams are smarter, sneakier, and more convincing than ever — and they’re everywhere. 59% of Americans say they or someone they know has fallen for an online scam in the last 12 months, with scam victims losing an average of $1,471. The rise of deepfakes and ease of access to the AI tools to create … More → The post McAfee Scam Detector spots scams across text, email, and video appeared first on Help Net Security.
http://news.poseidon-us.com/THCkfn

Making the most of cryptography, now and in the future

Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is that in a conventional computing world, compute power advances and older cryptographic techniques have been revealed to be insecure. In addition to the cryptography algorithms themselves, we should remember that cryptography is also implemented in software, which … More → The post Making the most of cryptography, now and in the future appeared first on Help Net Security.
http://news.poseidon-us.com/THCXk3

eBay CISO on managing long-term cybersecurity planning and ROI

In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning with immediate threat response, evaluating the ROI of new technologies, and addressing employee cybersecurity fatigue. As a CISO, how do you balance long-term strategic cybersecurity investments with immediate tactical threat response? The most important word here is “balance”, and effective cybersecurity programs need to have a longer-term strategy but be … More → The post eBay CISO on managing long-term cybersecurity planning and ROI appeared first on Help Net Security.
http://news.poseidon-us.com/THCXjW

Cyberbro: Open-source tool extracts IoCs and checks their reputation

Cyberbro is an open-source application that extracts IoCs from garbage input and checks their reputation using multiple services. Cyberbro features Input handling: Paste raw logs, IoCs, or fanged IoCs, and let the regex parser do the rest. Multi-service reputation checks: Verify observables (IP, hash, domain, URL) across multiple services like VirusTotal, AbuseIPDB, IPInfo, Spur.us, IP Quality score, MDE, Google Safe Browsing, Shodan, Abusix, Phishtank, ThreatFox, Github, Google. Detailed reports: Generate reports with advanced search and … More → The post Cyberbro: Open-source tool extracts IoCs and checks their reputation appeared first on Help Net Security.
http://news.poseidon-us.com/THCXg2

PacketCrypt Classic Cryptocurrency Miner on PHP Servers, (Tue, Jan 7th)

The SANS DShield project receives a wide variety of logs submitted by participants of the DShield project. Looking at the “” URLs page, I observed an interesting URL and dived deeper to investigate. The URL recorded is as follows:
http://news.poseidon-us.com/THCWZ6

Open source worldwide: Critical maintenance gaps exposed

Lineaje recently released a report identifying the US and Russia as the leading generators of open-source projects, with both countries also having the highest numbers of anonymous open-source contributions. In this Help Net Security video, Nick Mistry, SVP and CISO of Lineaje, discusses where the deepest layers of open-source software component dependencies originate from and their critical vulnerabilities. The report revealed that regardless of geographic origin, the average mid-size application has several disturbing trends leading … More → The post Open source worldwide: Critical maintenance gaps exposed appeared first on Help Net Security.
http://news.poseidon-us.com/THCTKG

How AI and deepfakes are redefining social engineering threats

This article presents key insights from 2024 reports on the rise of phishing attacks, focusing on how advancements in AI and deepfake technology are making social engineering tactics more sophisticated. Cybercriminals exploit file sharing services to advance phishing attacks Examining data collected between June 2023 and June 2024, Abnormal saw file-sharing phishing volume more than triple, increasing 350% over the year. The majority of these attacks were sophisticated in nature, with 60% exploiting legitimate domains, … More → The post How AI and deepfakes are redefining social engineering threats appeared first on Help Net Security.
http://news.poseidon-us.com/THCST3

How do directional connections shape complex dynamics in neuronal networks?

In order to uncover the relationship between structure and function, researchers used microfluidic devices to study neuronal networks.
http://news.poseidon-us.com/THCRnk

ISC Stormcast For Tuesday, January 7th, 2025 https://isc.sans.edu/podcastdetail/9268, (Tue, Jan 7th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/THCR5t