433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

GSA’s Allen eyes fall rollout for FAR rulemaking

The FAR overhaul has been coming out in chunks, but officials plan to being a formal rulemaking this fall, and one GSA leader is encouraging feedback. The post GSA’s Allen eyes fall rollout for FAR rulemaking first appeared on Federal News Network.
http://news.poseidon-us.com/TMsDQ0

Data security gaps stymy enterprise AI plans

Nearly three-quarters of CIOs and CISOs see information complexity as an adoption roadblock, according to a Ponemon Institute study commissioned by OpenText.
http://news.poseidon-us.com/TMsBBm

Cloud optimization, cybersecurity and mission readiness in action at CISA, Coast Guard and ICE

Federal agencies are past the early cloud adoption stage by this point. Their focus has shifted heavily to optimization, integration and mission alignment. Register to read more! The post Cloud optimization, cybersecurity and mission readiness in action at CISA, Coast Guard and ICE first appeared on Federal News Network.
http://news.poseidon-us.com/TMs7tY

Cloud optimization, cybersecurity and mission readiness in action at CISA, Coast Guard and ICE

Federal agencies are past the early cloud adoption stage by this point. Their focus has shifted heavily to optimization, integration and mission alignment. Register to read more! The post Cloud optimization, cybersecurity and mission readiness in action at CISA, Coast Guard and ICE first appeared on Federal News Network.
http://news.poseidon-us.com/TMs7Mv

Why cyber risks lurk in legacy technology

No matter why older IT systems are still around, companies need to protect stacks and devices before they become a vector for attacks.
http://news.poseidon-us.com/TMs6DZ

Production Monitoring: Production Monitoring Systems Explained

Manufacturers compete on speed, quality and reliability, which makes production monitoring a core discipline for keeping lines moving and customers happy. With the right practices, teams get instant visibility into throughput, downtime, scrap and labor so they can correct issues… Read More The post Production Monitoring: Production Monitoring Systems Explained appeared first on ProjectManager.
http://news.poseidon-us.com/TMs0jF

Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) Software and Cisco Unified CM Session Management Edition (SME) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-csrf-w762pRYd Security Impact Rating: Medium CVE: CVE-2025-20326
http://news.poseidon-us.com/TMryBp

Cisco Webex Meetings Cross-Site Scripting Vulnerability

A vulnerability in the user profile component of Cisco Webex Meetings could have allowed an authenticated, remote attacker with low privileges to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed. This vulnerability existed because of insufficient validation of user-supplied input to the user profile component of Cisco Webex Meetings. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could have allowed the attacker to conduct an XSS attack against the targeted user.  As mentioned, Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is necessary to update on-premises software or devices. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-55bv8hhm Security Impact Rating: Medium CVE: CVE-2025-20328
http://news.poseidon-us.com/TMryBn

Cisco Webex Meetings URL Redirection Vulnerability

A vulnerability in Cisco Webex Meetings could have allowed an unauthenticated, remote attacker to redirect a targeted Webex Meetings user to an untrusted website. Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed. This vulnerability existed because of insufficient validation of URLs that were included in a meeting-join URL. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by including a URL to a website of their choosing in a specific value of a Cisco Webex Meetings join URL. A successful exploit could have allowed the attacker to redirect a targeted user to a website that was controlled by the attacker, possibly making the user more likely to believe the website was trusted by Webex and perform additional actions as part of phishing attacks. As mentioned, Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is necessary to update on-premises software or devices. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-urlredirect-uK8dDJSZ Security Impact Rating: Medium CVE: CVE-2025-20291
http://news.poseidon-us.com/TMryBl