433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Why outsourcing cybersecurity is rising in the Adriatic region

In this Help Net Security interview, Aleksandar Stančin, Board Member Adriatics, Exclusive Networks, discusses the state of cybersecurity in the Adriatic region. He talks about how local markets often lag behind EU regulations, despite facing threats comparable to those in other parts of Europe. While adoption may be slower, progress is underway to strengthen cybersecurity across industries. Since your role focuses on the Adriatic region, what unique security challenges do you see compared to other … More → The post Why outsourcing cybersecurity is rising in the Adriatic region appeared first on Help Net Security.
http://news.poseidon-us.com/TM4xkz

Your app is under attack every 3 minutes

Application-layer attacks have become one of the most common and consequential methods adversaries use to gain access and compromise organizations, according to Contrast Security. These attacks target the custom code, APIs, and logic that power applications, often slipping past detection tools such as Endpoint Detection and Response (EDR) and network-based defenses such as Web Application Firewalls (WAFs). The average application is targeted by attacks more than 14,000 times each month (Source: Contrast Security) Enterprise security’s … More → The post Your app is under attack every 3 minutes appeared first on Help Net Security.
http://news.poseidon-us.com/TM4xjh

Most data breaches have unknown causes as transparency continues to fall

The Identity Theft Resource Center (ITRC) reports 1,732 publicly disclosed data breaches in H1 2025, marking a 5% increase over the same period in 2024. The ITRC could track a record number of compromises in 2025 if the current data breach trend continues through Q3 and Q4. Data breaches show no signs of slowing in H1 2025 The number of victim notices in H1 2025 (165,745,452) represents only 12% of the victim notices issued by … More → The post Most data breaches have unknown causes as transparency continues to fall appeared first on Help Net Security.
http://news.poseidon-us.com/TM4wlv

New Tool: ficheck.py, (Thu, Jul 24th)

As I mention every time I teach FOR577, I have been a big fan of file integrity monitoring tools (FIM) since Gene Kim first released Tripwire well over 30 years ago. I've used quite a few of them over the years including tripwire, OSSEC, samhain, and aide, just to name a few. For many years, I used the fcheck Perl script (by Michael A. Gumienny) that was available as an apt package on Ubuntu because it was lightning fast. Unfortunately, sometime between Ubuntu 16.04 and Ubuntu 20.04 (my memory fails me as to exactly when), it slowed down on many of the systems I managed to the point where instead of being able to run it 4-6 times a day, it would now sometimes take more than 24 hours to run. And that was just running it on select directories, not the entire system, the way I run tools like aide. Though I started writing Perl scripts in 1989, I didn't spend any time trying to figure out why fcheck was suddenly having so many issues. I let it go for quite a while, but a few months ago, I started thinking about it again and decided I'd write a look-alike in python. What I'm releasing today is not quite complete, hence the 0.9.0 version number, but I've been using it an about a dozen systems (Debian and Ubuntu, though it shoud run just fine on any Linux with Python 3.9 or newer, probably older, too, but I again haven't tried it on anything older) for about 6 months. I still want to add a couple of things including the ability to include additional config files like the .local.cfg that fcheck had, rather than having to put all the additions into the primary config.
http://news.poseidon-us.com/TM4v3N

ISC Stormcast For Thursday, July 24th, 2025 https://isc.sans.edu/podcastdetail/9540, (Thu, Jul 24th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TM4sv9

DATA Act spurred a quiet revolution in government spending transparency

The DATA Act transformed the way federal agencies collect and report their spending information, changing culture around budget transparency along the way. The post DATA Act spurred a quiet revolution in government spending transparency first appeared on Federal News Network.
http://news.poseidon-us.com/TM4sfx