433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Outdated encryption leaves crypto wide open

The cryptocurrency sector faces an existential threat on two fronts: none of the 2,138 web applications and 146 mobile apps tested by ImmuniWeb support post-quantum encryption, and more than 7.8 million user records are already circulating on the dark web. As adversaries hoard encrypted data for future “Harvest Now, Decrypt Later” exploits, the industry’s failure to adopt NIST’s Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) standard signals a looming crisis. Without action, encrypted transactions could be laid bare … More → The post Outdated encryption leaves crypto wide open appeared first on Help Net Security.
http://news.poseidon-us.com/TNZCJ8

Researchers develop AI system to detect scam websites in search results

Scam websites tied to online shopping, pet sales, and other e-commerce schemes continue to cause millions in losses each year. Security tools can accurately detect fraudulent sites once they are found, but identifying new ones remains difficult. To close that gap, researchers from Boston University created LOKI, a system that ranks search queries by how likely they are to reveal scams. Using a small seed set of 1,663 confirmed scam domains, LOKI discovered 52,493 previously … More → The post Researchers develop AI system to detect scam websites in search results appeared first on Help Net Security.
http://news.poseidon-us.com/TNZ2SD

Behind the screens: Building security customers appreciate

In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and its commitment to protecting customer trust. Vachon explains how PRA Group balances identity verification with a seamless customer experience. Vachon also reflects on how AI is changing both the fight against fraud and the way security teams adapt to threats. Identity verification is a core challenge in debt collection and loan servicing. How do you … More → The post Behind the screens: Building security customers appreciate appeared first on Help Net Security.
http://news.poseidon-us.com/TNZ2RR

Turning the human factor into your strongest cybersecurity defense

In this Help Net Security video, Jacob Martens, Field CISO at Upwind Security, explores one of cybersecurity’s most enduring challenges: the human factor behind breaches. Despite advances in technology, most attacks still begin with people, not code. He explains how tactics like phishing and social engineering continue to succeed by exploiting human emotions such as urgency, fear, and even friendliness. Martens highlights how burnout, complex controls, and lack of engagement make organizations more vulnerable, and … More → The post Turning the human factor into your strongest cybersecurity defense appeared first on Help Net Security.
http://news.poseidon-us.com/TNYyL4

Six metrics policymakers need to track cyber resilience

Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to give governments a forward-looking picture of resilience. A new report from Zurich Insurance Group argues that this gap leaves economies exposed and slows the ability to respond to systemic threats. Why metrics matter Cybersecurity is measured mostly through compliance or incident counts. While useful, this data does not show … More → The post Six metrics policymakers need to track cyber resilience appeared first on Help Net Security.
http://news.poseidon-us.com/TNYyK9

[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)

[This is a Guest Diary by Jin Quan Low, an ISC intern as part of the SANS.edu Bachelor's Degree in Applied Cybersecurity (BACS) program [1].]
http://news.poseidon-us.com/TNYwZn