433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Reading Location Position Value in Microsoft Word Documents, (Mon, Aug 25th)

While studying for the GX-FE [1], I started exploring the “Position” value in the registry that helps to tell Microsoft Word where you “left off”. It's a feature many people that use Word have seen on numerous occasions and is explored in FOR500: Windows Forensic Analysis [2].
http://news.poseidon-us.com/TMgFD1

The end of an era: Properly formated IP addresses in all of our data., (Sun, Aug 24th)

The Internet Storm Center and DShield websites are about 25 years old. Back in the day, I made some questionable decisions that I have never quite cleaned up later. One of these decisions was to use a “15 character 0-padded” format for IP addresses. This format padded each byte in the IP address with leading 0's, ensuring that they were all 15 characters long (including the '.').
http://news.poseidon-us.com/TMg5JZ

Why tiny bee brains could hold the key to smarter AI

Researchers discovered that bees use flight movements to sharpen brain signals, enabling them to recognize patterns with remarkable accuracy. A digital model of their brain shows that this movement-based perception could revolutionize AI and robotics by emphasizing efficiency over massive computing power.
http://news.poseidon-us.com/TMfpFJ

Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by millions are covertly connected AND insecure Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300) Apple has fixed yet another vulnerability (CVE-2025-43300) that has … More → The post Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day appeared first on Help Net Security.
http://news.poseidon-us.com/TMfnJL

Microsoft’s open source journey: From 20,000 lines of Linux code to AI at global scale

From Linux kernel code to AI at scale, discover Microsoft’s open source evolution and impact. The post Microsoft’s open source journey: From 20,000 lines of Linux code to AI at global scale appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TMfYFn