433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

A new C2 era dawns – thanks to F1 racing

Satellite swarms, containerization and new architectures combine to give new collaboration possibilities for military command-and-control. The post A new C2 era dawns – thanks to F1 racing first appeared on Federal News Network.
http://news.poseidon-us.com/TNvpPX

72 states sign first global UN Convention against Cybercrime

The world’s first global convention to prevent and respond to cybercrime opened for signature today in Hanoi, Vietnam, and will remain open at United Nations Headquarters in New York until 31 December 2026. Adopted by the UN General Assembly in December 2024, the UN Convention against Cybercrime will enter into force 90 days after its 40th ratification. Once in force, a Conference of the States Parties will meet periodically to strengthen national capacities, enhance cooperation, … More → The post 72 states sign first global UN Convention against Cybercrime appeared first on Help Net Security.
http://news.poseidon-us.com/TNvmDg

Bytes over DNS, (Mon, Oct 27th)

I was intrigued when Johannes talked about malware that uses BASE64 over DNS to communicate. Take a DNS request like this: label1.label2.tld. Labels in a request like this can only be composed with letters (not case-sensitive), digits and a hyphen character (-). While BASE64 is encoded with letters (uppercase and lowercase), digits and special characters + and /. And also a special padding character: =.
http://news.poseidon-us.com/TNvZ2d

Can your earbuds recognize you? Researchers are working on it

Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step could be inside the ear. New research explores how the ear canal’s unique acoustic properties can be used to verify identity through wireless earbuds. Their system, called EarID, shows that ear canal scanning could one day become a practical security method for mobile devices. Illustration of ear canal scanning/sensing. The user inserts the earbuds to … More → The post Can your earbuds recognize you? Researchers are working on it appeared first on Help Net Security.
http://news.poseidon-us.com/TNvW5P

Dependency-Track: Open-source component analysis platform

Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge. The open-source platform Dependency-Track tackles that problem head-on. Rather than treating software composition as a one-time scan, it continuously monitors every version of every application, giving organizations a live view of risk across their entire portfolio. By leaning on the power of Software Bills of Materials (SBOMs), it delivers insight and precision. Built with developers … More → The post Dependency-Track: Open-source component analysis platform appeared first on Help Net Security.
http://news.poseidon-us.com/TNvW3k

DDoS, data theft, and malware are storming the gaming industry

When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More players meant more logins, payments, and personal data. That created a target larger than the industry had ever faced. A growing industry with new responsibilities The global games market is expected to reach $188.8 billion in 2025, a 3.4% rise from the previous … More → The post DDoS, data theft, and malware are storming the gaming industry appeared first on Help Net Security.
http://news.poseidon-us.com/TNvRgB

AI writes code like a junior dev, and security is feeling it

The industry is entering a phase where code is being deployed faster than it can be secured, according to OX Security. Findings from the Army of Juniors: The AI Code Security Crisis report show that AI-generated code often appears clean and functional but hides structural flaws that can grow into systemic security risks. Security teams are overwhelmed OX analyzed more than 300 software repositories, including 50 that used AI coding tools such as GitHub Copilot, … More → The post AI writes code like a junior dev, and security is feeling it appeared first on Help Net Security.
http://news.poseidon-us.com/TNvRg2