433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Juniper enterprise routers backdoored via “magic packet” malware

A stealthy attack campaign turned Juniper enterprise-grade routers into entry points to corporate networks via the “J-magic” backdoor, which is loaded into the devices’ memory and spawns a reverse shell when instructed to do so. “Our telemetry indicates the J-magic campaign was active from mid-2023 until at least mid-2024; in that time, we observed targets in the semiconductor, energy, manufacturing, and IT verticals among others,” Lumen’s Black Lotus Labs team researchers shared. The J-magic malware … More → The post Juniper enterprise routers backdoored via “magic packet” malware appeared first on Help Net Security.
http://news.poseidon-us.com/THXbSh

How the return-to-office order affects people with disabilities

With President Donald Trump ordering the revocation of telework for federal employees, how ready are federal offices to accommodate people with disabilities? The post How the return-to-office order affects people with disabilities first appeared on Federal News Network.
http://news.poseidon-us.com/THXWCx

XSS Attempts via E-Mail, (Thu, Jan 23rd)

One of the hardest applications to create securely is webmail. E-mail is a complex standard, and almost all e-mail sent today uses HTML. Displaying complex HTML received in an e-mail within a web application is dangerous and often leads to XSS vulnerabilities. Typical solutions include the use of iframe sandboxes and HTML sanitizers. But still, XSS vulnerabilities sneak into applications even if they try hard to get it right. One of my “favorite” examples of how subtle mistakes can cause vulnerabilities was a recent Protonmail vulnerability [1]. Even if you are not using webmail to read email, you may still be exploited as some native email clients have allowed HTML content to leak credentials or have been subject to other HTML-related problems, often related to including content from third-party websites dynamically.
http://news.poseidon-us.com/THXSft

Dell Expands Telecom Self-Certification on PowerEdge R7615 with AMD EPYC™

Unlock telecom innovation with self-certification on Dell PowerEdge R7615, powered by AMD EPYC™, to elevate your software today!
http://news.poseidon-us.com/THXQLj

“Crazy Evil” Cryptoscam Gang: Unmasking a Global Threat in 2024

Explore how the “Crazy Evil” cryptoscam gang operates, infecting thousands worldwide with infostealer malware. Learn how its tactics pose a threat to the Web3 ecosystem and digital asset security.
http://news.poseidon-us.com/THXPlz

Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw

Cisco has released patches for a critical privilege escalation vulnerability in Meeting Management (CVE-2025-20156) and a heap-based buffer overflow flaw (CVE-2025-20128) that, when triggered, could terminate the ClamAV scanning process on endpoints running a Cisco Secure Endpoint Connector. Proof-of-concept (PoC) exploit code for CVE-2025-20128 is available, Cisco said, but the company is not aware of the vulnerability being exploited in the wild. Credit for reporting the flaw has been given to OSS-Fuzz, Google’s continuous fuzzing … More → The post Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw appeared first on Help Net Security.
http://news.poseidon-us.com/THXMWR

Google Cloud links poor credentials to nearly half of cloud-based attacks

Cloud services with weak credentials were prime target for attackers, often resulting in lateral movement attempts, a Google Cloud report found.
http://news.poseidon-us.com/THXD1M

Appdome Threat Dynamics analyzes and ranks mobile threats

Appdome announced that a new AI-Native threat-management module called Threat Dynamics will be offered inside Appdome’s ThreatScope Mobile XDR. Threat Dynamics uses AI deep learning to continuously evaluate the likelihood of a successful exploit from more than 400+ attack vectors and calculate a Mobile Risk Index for each business and mobile application. This allows businesses to see how threats move across the production environment, empowering them to quickly prioritize and focus on the attack vectors … More → The post Appdome Threat Dynamics analyzes and ranks mobile threats appeared first on Help Net Security.
http://news.poseidon-us.com/THX4xT

SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)

A critical zero-day vulnerability (CVE-2025-23006) affecting SonicWall Secure Mobile Access (SMA) 1000 Series appliances is being exploited by attackers. “We strongly advises users of the SMA1000 product to upgrade to the hotfix release version to address the vulnerability,” the company said on Wednesday. About CVE-2025-23006 SonicWall Secure Mobile Access (SMA) is a unified secure access gateway used by organizations to provide employees access to applications from anywhere. The SMA 1000 series of appliances is aimed … More → The post SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006) appeared first on Help Net Security.
http://news.poseidon-us.com/THX4wQ

DigitalOcean Per-Bucket Access Keys boosts object storage security

DigitalOcean announced Per-Bucket Access Keys for DigitalOcean Spaces, its S3-compatible object storage service. This feature provides customers with identity-based, bucket-level control over access permissions, helping to enhance their data security and simplifying management. Prior to the introduction of Per-Bucket Access Keys, many customers chose to limit the types of applications they ran on DigitalOcean infrastructure to those without object storage requirements or with minimal access management requirements in order to better control access to their … More → The post DigitalOcean Per-Bucket Access Keys boosts object storage security appeared first on Help Net Security.
http://news.poseidon-us.com/THX1Wt