433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Commonly Probed Webshell URLs, (Sun, Mar 9th)

Looking over some weblogs on my way back from class in Baltimore, I feel a reminder is appropriate that (a) weblogs are still a thing and (b) what some of the common webshells are that attackers are looking for.
http://news.poseidon-us.com/TJQT0r

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work and how to protect yourself While QR codes are convenient, they also present significant risks. In the past few years, cybercriminals have increasingly turned to these codes as a tool to carry out scams. The CISO’s bookshelf: 10 must-reads for security leaders Discover essential reads for CISOs in this curated list of books covering cybersecurity … More → The post Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs appeared first on Help Net Security.
http://news.poseidon-us.com/TJQD71

AI reveals new way to strengthen titanium alloys and speed up manufacturing

Producing high-performance titanium alloy parts — whether for spacecraft, submarines or medical devices — has long been a slow, resource-intensive process. Even with advanced metal 3D-printing techniques, finding the right manufacturing conditions has required extensive testing and fine-tuning. What if these parts could be built more quickly, stronger and with near-perfect precision? A team is leveraging artificial intelligence to make that a reality. They’ve identified processing techniques that improve both the speed of production and the strength of these advanced materials — an advance with implications from the deep sea to outer space.
http://news.poseidon-us.com/TJPw1r

Key takeaways, trends from GAO’s 2024 bid protest report

Scott Flesch, a member at Miller & Chevalier Chartered, explains what contractors and agencies need to understand about the annual protest data. The post Key takeaways, trends from GAO’s 2024 bid protest report first appeared on Federal News Network.
http://news.poseidon-us.com/TJPtjL

New method significantly reduces AI energy consumption

The enormous computing resources needed to train neural networks for artificial intelligence (AI) result in massive power consumption. Researchers have developed a method that is 100 times faster and therefore much more energy efficient. Instead of taking an iterative approach, the parameters are computed directly based on probabilities. The results so far are comparable in quality to existing iterative methods.
http://news.poseidon-us.com/TJPtHw

Smart, energy-efficient robot grippers cut production costs

Energy remains a significant factor in industrial production processes. High levels of energy consumption make production more expensive and exacerbate the climate crisis. A new type of robot technology needs 90% less electricity than conventional systems. The technology uses lightweight, shape memory materials to construct novel, non-pneumatic, industrial gripper systems that function without the need for additional sensors.
http://news.poseidon-us.com/TJPtHq

AI has ‘great potential’ for detecting wildfires, new study of the Amazon rainforest suggests

A type of Artificial Intelligence that mimics the functioning of the human brain could represent a powerful solution in automatically detecting wildfires, plummeting the time needed to mitigate their devastating effects, a new study finds.
http://news.poseidon-us.com/TJPtGv

Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. These vulnerabilities exist because the web-based management interface does not validate user input adequately. An attacker could exploit these vulnerabilities by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit these vulnerabilities, an attacker would need Administrator-level privileges. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2024-20471,CVE-2024-20472,CVE-2024-20473
http://news.poseidon-us.com/TJPqWX