433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Official Xubuntu website compromised to serve malware

The official website for Xubuntu, a community-maintained “flavour” of Ubuntu that ships with the Xfce desktop environment, has been compromised to serve Windows malware instead of the Linux distro. The malicious download Reports about a potential compromise began popping up on Reddit on Sunday, with users saying that instead of pointing to .torrent files, the download page served Xubuntu-Safe-Download.zip, containing a suspicious executable (TestCompany.SafeDownloader.exe) and a text file (tos.txt). “The TOS starts with Copyright (c) … More → The post Official Xubuntu website compromised to serve malware appeared first on Help Net Security.
http://news.poseidon-us.com/TNpB4c

New military age demands new C2 comms

As purposely scattered forces replace massing, all units need access to rich and latency-free crucial situational data regardless of from where they operate. The post New military age demands new C2 comms first appeared on Federal News Network.
http://news.poseidon-us.com/TNp9YT

What time is it? Accuracy of pool.ntp.org., (Tue, Oct 21st)

Yesterday, Chinese security services published a story alleging a multi-year attack against the systems operating the Chinese standard time (CST), sometimes called Beijing Standard Time. China uses only one time zone across the country, and has not used daylight saving time since 1991. Most operating systems use UTC internally and display local time zones for user convenience. Modern operating systems use NTP to synchronize time. Popular implementations are ntpd and chrony. The client will poll several servers, disregard outliers, and usually sync with the “best” time server based on latency and jitter detected.
http://news.poseidon-us.com/TNp7FJ

New military age demands new C2 comms

As purposely scattered forces replace massing, all units need access to rich and latency-free crucial situational data regardless of from where they operate. The post New military age demands new C2 comms first appeared on Federal News Network.
http://news.poseidon-us.com/TNp53m

Sophos ITDR enhances identity security with dark web monitoring and automated response

Sophos has launched Sophos Identity Threat Detection and Response (ITDR), a new solution for Sophos XDR and Sophos MDR that continuously monitors customer environments for identity risks and misconfigurations while scanning the dark web for compromised credentials. It enables organizations to detect and respond to identity-based attacks and identify risky user behavior that could threaten their business. Sophos ITDR addresses identity-based attacks, one of the fastest-growing threat vectors globally. Sophos X-Ops observed a 106% increase … More → The post Sophos ITDR enhances identity security with dark web monitoring and automated response appeared first on Help Net Security.
http://news.poseidon-us.com/TNp0bh

Agentic AI security: Building the next generation of access controls

As artificial intelligence (AI) solutions continue to evolve, the rise of agentic AI—intelligent systems that can act autonomously on behalf of an organization—presents new security challenges. Research from Delinea’s 2025 AI in Identity Security Demands a New Playbook report reveals that 66% of organizations actively use agentic AI in IT operations, and 56% run into shadow AI issues at least monthly. The lack of transparency and visibility in many agentic AI deployments exacerbates these risks, … More → The post Agentic AI security: Building the next generation of access controls appeared first on Help Net Security.
http://news.poseidon-us.com/TNns5c

When everything’s connected, everything’s at risk

In this Help Net Security interview, Ken Deitz, CISO at Brown & Brown, discusses how the definition of cyber risk has expanded beyond IT to include IoT, OT, and broader supply chain ecosystems. As organizations connect these assets through cloud and networked systems, the attack surface and dependencies have multiplied. Deitz also shares strategies for managing risk through visibility, segmentation, and resilient recovery planning. From your perspective, how have the boundaries of “cyber risk” expanded … More → The post When everything’s connected, everything’s at risk appeared first on Help Net Security.
http://news.poseidon-us.com/TNnm1B

Your smart building isn’t so smart without security

The lights switch on as you walk in. The air adjusts to your presence. Somewhere in the background, a server notes your arrival. It’s the comfort of a smart building, but that comfort might come with a cost. Smart buildings use digital systems that collect information about how people move and work. These networks make life easier but also create openings for misuse or attack. Cybercriminals can take control of heating systems, security cameras, or … More → The post Your smart building isn’t so smart without security appeared first on Help Net Security.
http://news.poseidon-us.com/TNnm08

AI’s split personality: Solving crimes while helping conceal them

What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace attacks while also being tested for its ability to conceal them. A new study from the University of Cagliari digs into this double-edged role of AI, mapping out how it’s transforming cybercrime detection and digital forensics, and why that’s exciting and a little alarming. AI system for cybercrime detection based on two models The shift … More → The post AI’s split personality: Solving crimes while helping conceal them appeared first on Help Net Security.
http://news.poseidon-us.com/TNnj5C