433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Building a cybersecurity strategy that survives disruption

Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans built for more predictable times just can’t keep up. With everything from ransomware to geopolitical threats to cloud slip-ups hitting companies, there’s a shift happening: security needs to be ready for chaos, not just focused on keeping things safe. That shift changes everything: how companies plan, how they invest, and how they recover. From protection … More → The post Building a cybersecurity strategy that survives disruption appeared first on Help Net Security.
http://news.poseidon-us.com/TJwRn2

Cybercriminals exfiltrate data in just three days

In 56% of Sophos managed detection and response (MDR) and incident response (IR) cases, attackers gained initial access to networks by exploiting external remote services, including edge devices such as firewalls and VPNs, and by leveraging valid accounts. Compromised credentials remain the top cause of attacks The combination of external remote services and valid accounts aligns with the top root causes of attacks. For the second year in row, compromised credentials were the number one … More → The post Cybercriminals exfiltrate data in just three days appeared first on Help Net Security.
http://news.poseidon-us.com/TJwRm3

Open-source malware doubles, data exfiltration attacks dominate

There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1 2025, according to Sonatype. Quarterly breakdown (Source: Sonatype) The Q1 figure represents a significant decrease from the more than 34,000 malicious packages discovered last quarter, largely due to a sharp drop in security holdings packages. However, compared to the same period last year, the overall malware count more than doubled. … More → The post Open-source malware doubles, data exfiltration attacks dominate appeared first on Help Net Security.
http://news.poseidon-us.com/TJwRlh

Review: Zero to Engineer

Zero to Engineer is a practical guide for anyone looking to launch a career in information technology without a traditional college degree. The book draws from the author’s unlikely journey – from being expelled from high school to earning six figures in the tech industry. About the author Terry Kim brings more than two decades of experience in the IT industry, with a career that includes roles at major technology companies such as Cisco Systems … More → The post Review: Zero to Engineer appeared first on Help Net Security.
http://news.poseidon-us.com/TJwPkk

ISC Stormcast For Thursday, April 3rd, 2025 https://isc.sans.edu/podcastdetail/9392, (Thu, Apr 3rd)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TJwMzg

Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive [Guest Diary], (Wed, Apr 2nd)

[This is a Guest Diary by Gregory Weber, an ISC intern as part of the SANS.edu BACS program]
http://news.poseidon-us.com/TJwLFj

Scientists unveil starfish-inspired wearable tech for heart monitoring

When we move, it’s harder for existing wearable devices to accurately track our heart activity. But researchers found that a starfish’s five-arm shape helps solve this problem. Inspired by how a starfish flips itself over — shrinking one of its arms and using the others in a coordinated motion to right itself — scientists have created a starfish-shaped wearable device that tracks heart health in real time.
http://news.poseidon-us.com/TJwKG9

Multi-resistance in bacteria predicted by AI model

An AI model trained on large amounts of genetic data can predict whether bacteria will become antibiotic-resistant. The new study shows that antibiotic resistance is more easily transmitted between genetically similar bacteria and mainly occurs in wastewater treatment plants and inside the human body.
http://news.poseidon-us.com/TJwJN6