433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Crypto-stealing iOS, Android malware found on App Store, Google Play

A number of iOS and Android apps on Apple’s and Google’s official app stores contain a software development kit (SDK) that allows them to exfiltrate cryptowallets’ seed recovery phrases, Kaspersky researchers have found. “The infected apps in Google Play had been downloaded more than 242,000 times. This was the first time a stealer had been found in Apple’s App Store,” they pointed out. The apps have also been pushed via unofficial app stores. The malicious … More → The post Crypto-stealing iOS, Android malware found on App Store, Google Play appeared first on Help Net Security.
http://news.poseidon-us.com/THntV4

Dynatrace strengthens cloud security posture management

Dynatrace announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises managing complex hybrid and multi-cloud environments, Dynatrace CSPM can significantly enhance security, compliance, and resource-efficiency through continuous monitoring, automated remediation, and centralized visibility. Dynatrace CSPM extends its existing Kubernetes Security Posture Management (KSPM) solution and enables organizations to manage their entire cloud security posture through a single, unified platform. The solution aggregates and contextualizes security and … More → The post Dynatrace strengthens cloud security posture management appeared first on Help Net Security.
http://news.poseidon-us.com/THnqhW

Veriti Cloud automates remediation across both on-premises and cloud environments

Veriti launched Veriti Cloud, an expansion of its Exposure Assessment and Remediation platform that brings proactive cloud native remediation to the forefront. With Veriti Cloud, organizations gain advanced capabilities to automate remediation across both on-premises and cloud environments, hardening their security posture while ensuring operational continuity. Veriti has long provided automated remediation for cloud environments, but the introduction of Veriti Cloud takes this to the next level with proactive enforcement, seamless cross-platform integrations, and the … More → The post Veriti Cloud automates remediation across both on-premises and cloud environments appeared first on Help Net Security.
http://news.poseidon-us.com/THnqh9

Atrinet URL Scanner helps comabat SMS phishing

Atrinet launched Atrinet URL Scanner, a solution designed to combat real-time SMS fraud. The solution combines Google Web Risk’s technology scanning capabilities with Atrinet’s telecom security expertise, enabling Communication Service Providers (CSPs) to safeguard subscribers, protect revenues, and build customer trust. The rising threat of SMS Fraud Smishing attacks—fraudulent messages containing harmful links—have surged by 60% in 2024, costing billions of dollars globally. Existing firewalls can fail to scan URLs effectively, leaving fraudulent links unchecked. … More → The post Atrinet URL Scanner helps comabat SMS phishing appeared first on Help Net Security.
http://news.poseidon-us.com/THnqgp

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data. OpenNHP offers the following benefits: Reduces attack surface by hiding infrastructure Prevents unauthorized network reconnaissance Mitigates vulnerability exploitation Stops phishing via encrypted DNS Protects against DDoS attacks Enables fine-grained access control Provides identity-based connection tracking Attack attribution “The OpenNHP proposed a cost-effective way to solve the vulnerability problem. The common way to mitigate vulnerabilities is … More → The post OpenNHP: Cryptography-driven zero trust protocol appeared first on Help Net Security.
http://news.poseidon-us.com/THnXJ8

The API security crisis and why businesses are at risk

In this Help Net Security video, Ivan Novikov, CEO of Wallarm, discusses the 2025 API ThreatStats Report, highlighting how APIs have become the primary attack surface over the past year, mainly driven by the rise of AI-related risks. Researchers identified 439 AI-related CVEs—a staggering 1,025% increase from the previous year. 99% were linked to APIs, with vulnerabilities including injection flaws, misconfigurations, and emerging memory corruption issues caused by AI’s reliance on high-performance binary APIs. In … More → The post The API security crisis and why businesses are at risk appeared first on Help Net Security.
http://news.poseidon-us.com/THnXHz

More destructive cyberattacks target financial institutions

Financial institutions will continue to be the ultimate targets for criminals and threat actors, as a successful attack offers a significant payoff, according to Contrast Security. Contrast Security has surveyed 35 of the world’s leading financial institutions to better understand their cyber threat landscape and the extent to which they are — or are not — addressing key threats. 64% of financial institutions said their organization had experienced cybersecurity incidents in the past 12 months. … More → The post More destructive cyberattacks target financial institutions appeared first on Help Net Security.
http://news.poseidon-us.com/THnXHk

ISC Stormcast For Wednesday, February 5th, 2025 https://isc.sans.edu/podcastdetail/9310, (Wed, Feb 5th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/THnSMQ

AI-driven performance prediction model to advance space electric propulsion technology?

A research team presents an AI assessor for Hall-effect ion thrusters, the engines of satellites and space probes.
http://news.poseidon-us.com/THnRwD