433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Energy sector orgs targeted with AiTM phishing campaign

Organizations in the energy sector are being targeted with phishing emails aimed at compromising enterprise accounts, Microsoft warns. The attack campaign The attacks started with phishing emails with “NEW PROPOSAL – NDA” in the subject line, coming from a compromised email address belonging to a trusted organization. The subject line and the SharePoint link URL included in the email are unlikely to raise suspicion with users, and will often dodge traditional email‑centric detection mechanisms. Users … More → The post Energy sector orgs targeted with AiTM phishing campaign appeared first on Help Net Security.
http://news.poseidon-us.com/TQVZPY

Claroty raises $150 million to advance global CPS protection platform

Claroty has secured $150 million in Series F funding led by Golub Growth, an affiliate of Golub Capital, with additional confirmed participation from existing investors up to $50 million. This investment will support global expansion through organic and inorganic growth as the company continues to pursue its vision of building a comprehensive CPS protection platform. Per Gartner, “With the emergence of CPS, ransomware and other cyber attacks originating in the cyber world now affect physical … More → The post Claroty raises $150 million to advance global CPS protection platform appeared first on Help Net Security.
http://news.poseidon-us.com/TQVWXx

OpenWrt One gains support for running Debian

Debian now runs on the OpenWrt One hardware platform following recent engineering work by Collabora. OpenWrt One is a developer focused router designed to support embedded Linux work on standardized hardware. The platform serves as a reference device for the OpenWrt community and includes open hardware documentation intended to support system bring up and software development. The work required enabling Debian to boot and operate on the device’s hardware. Engineers addressed low level platform support, … More → The post OpenWrt One gains support for running Debian appeared first on Help Net Security.
http://news.poseidon-us.com/TQVTkr

TeraWave space-based network aims for 6 Tbps connectivity worldwide

Blue Origin announced TerraWave, a satellite communications network designed to support enterprise, data center, and government users that rely on reliable connectivity for mission-critical operations. The network will provide symmetrical data speeds of up to 6 Tbps worldwide. The TerraWave architecture consists of 5,408 optically interconnected satellites in low Earth orbit (LEO) and medium Earth orbit (MEO), enabling ultra-high-throughput links between global hubs and multigigabit user connections in regions where diverse fiber paths are costly, … More → The post TeraWave space-based network aims for 6 Tbps connectivity worldwide appeared first on Help Net Security.
http://news.poseidon-us.com/TQVLs7

EaseUS Disk Copy 7.0.0 enables backup, restore, and migration without multiple drives connected

EaseUS announced EaseUS Disk Copy 7.0.0, representing a shift in how disk cloning and backup workflows are handled on Windows. The update introduces disk imaging–based backup and restore capabilities, allowing users to create disk image and restore them to physical storage without being constrained by simultaneous hardware connections. Developed based on extensive user feedback and EaseUS’s long-term experience in data management technologies, the release reflects a strategic shift toward more flexible and scalable system protection … More → The post EaseUS Disk Copy 7.0.0 enables backup, restore, and migration without multiple drives connected appeared first on Help Net Security.
http://news.poseidon-us.com/TQVLXk

Exposed training apps are showing up in active cloud attacks

Security teams often spin up vulnerable applications for demos, training, or internal testing. A recent Pentera research report documents how those environments are being left exposed on the public internet and actively exploited. The research focuses on intentionally vulnerable apps such as OWASP Juice Shop, Damn Vulnerable Web Application, Hackazon, and similar projects. These tools are commonly deployed to teach secure coding, support product demonstrations, or give red and blue teams hands-on practice. According to … More → The post Exposed training apps are showing up in active cloud attacks appeared first on Help Net Security.
http://news.poseidon-us.com/TQV9lb

The internet’s oldest trust mechanism is still one of its weakest links

Attackers continue to rely on domain names as an entry point into enterprise systems. A CSC domain security study finds that large organizations leave this part of their attack surface underprotected, even as attacks become more frequent. The research examined the Forbes Global 2000 and compared them with the world’s top 100 privately held unicorn companies. Domain security adoption: 100 unicorns vs Global 2000 (Source: CSC) Domains sit outside standard security controls Domains operate outside … More → The post The internet’s oldest trust mechanism is still one of its weakest links appeared first on Help Net Security.
http://news.poseidon-us.com/TQV8j8

A new framework helps banks sort urgent post-quantum crypto work from the rest

Financial institutions now have a concrete method for deciding where post-quantum cryptography belongs on their security roadmaps. New research coordinated by Europol sets out a scoring framework that helps banks rank systems and business use cases based on quantum risk and the time required to migrate them. The goal is practical prioritization, and the paper is aimed at security teams that need to move from planning into execution. The research responds to a growing operational … More → The post A new framework helps banks sort urgent post-quantum crypto work from the rest appeared first on Help Net Security.
http://news.poseidon-us.com/TQV4B0

macOS Tahoe improves privacy and communication safety

macOS Tahoe privacy and security features focus on screening unwanted contact, limiting tracking, and keeping more decisions on the device. Most updates run quietly in the background and require little setup. Built-in filtering for calls and messages Apple reduced exposure to social engineering attempts. The native Phone, Messages, and FaceTime apps include system-level screening and unknown contact controls. Incoming calls from unknown numbers can be screened before the Mac rings, prompting callers to provide a … More → The post macOS Tahoe improves privacy and communication safety appeared first on Help Net Security.
http://news.poseidon-us.com/TQV2vZ