433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Feds With Benefits: Making Medicare decisions at 65

Question: If someone is on Federal Health Benefits, what happens when they turn 65 and become eligible for Medicare? The post Feds With Benefits: Making Medicare decisions at 65 first appeared on Federal News Network.
http://news.poseidon-us.com/THFCsX

Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have at least a low-privileged account on an affected device. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH Security Impact Rating: Medium CVE: CVE-2025-20166,CVE-2025-20167,CVE-2025-20168
http://news.poseidon-us.com/THFCKq

Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Crosswork Network Controller could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users of the interface of an affected system. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by inserting malicious data into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU Security Impact Rating: Medium CVE: CVE-2025-20123
http://news.poseidon-us.com/THFCKb

Cisco ThousandEyes Agent Certificate Validation Vulnerability

A vulnerability in certification validation routines of Cisco ThousandEyes Endpoint Agent for macOS and RoomOS could allow an unauthenticated, remote attacker to intercept or manipulate metrics information. This vulnerability exists because the affected software does not properly validate certificates for hosted metrics services. An on-path attacker could exploit this vulnerability by intercepting network traffic using a crafted certificate. A successful exploit could allow the attacker to masquerade as a trusted host and monitor or change communications between the remote metrics service and the vulnerable client. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N Security Impact Rating: Medium CVE: CVE-2025-20126
http://news.poseidon-us.com/THFCK9

Swimlane Hero helps solve complex security operations problems

Swimlane unveiled Hero, a private agentic AI security operations (SecOps) companion. Built on the foundation of Swimlane’s Hero AI innovations, Hero empowers security teams to work smarter and faster by suggesting next steps and answering complex questions privately to speed mean-time-to-remediate (MTTR). Fully integrated into the Swimlane Turbine hyperautomation platform and its ecosystem of integrated data points, Hero is contextually aware of all data in a customer’s Turbine environment, their processes and past decisions made, … More → The post Swimlane Hero helps solve complex security operations problems appeared first on Help Net Security.
http://news.poseidon-us.com/THF8lK

The U.S. Cyber Trust Mark set to launch

The White House has announced the launch of the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program for consumer-grade internet-connected devices. “The White House launched this bipartisan effort to educate American consumers and give them an easy way to assess the cybersecurity of such products, as well as incentivize companies to produce more cybersecure devices, much as EnergyStar labels did for energy efficiency,” the White House said. “The U.S. Cyber Trust Mark program allows … More → The post The U.S. Cyber Trust Mark set to launch appeared first on Help Net Security.
http://news.poseidon-us.com/THF8l3

BioConnect unveils biometric devices for secure access control

BioConnect introduced its Arc Series biometric devices. Designed to address the evolving security, compliance, and scalability needs of enterprises and data centers, the Arc Series sets a new standard in modern access control. The launch includes three innovative devices: Arc Vision, a facial authentication device; Arc Touch, a fingerprint authentication device; and the upcoming Arc Rex, a simple multi-modal facial authentication device, available in September 2025. Together with the Privacy by Design BioConnect Trust Platform, … More → The post BioConnect unveils biometric devices for secure access control appeared first on Help Net Security.
http://news.poseidon-us.com/THF2Sv

Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers

CISA has added Mitel MiCollab (CVE-2024-41713, CVE-2024-55550) and Oracle WebLogic Server (CVE-2020-2883) vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The Mitel MiCollab vulnerabilities exploited Mitel MiCollab is a popular enterprise collaboration suite. CVE-2024-41713 and CVE-2024-55550 are both path traversal vulnerabilities. The former is exploitable without authentication, and may allow an attacker to gain access “to provisioning information including non-sensitive user and network information and perform unauthorized administrative actions on the MiCollab Server.” The latter … More → The post Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers appeared first on Help Net Security.
http://news.poseidon-us.com/THF2Q8

Security, data challenges hinder agentic AI adoption

Tech pros said the most common use case for the technology is IT service desk automation, according to a Tray.ai report. 
http://news.poseidon-us.com/THDxjb

Transcend Migration Accelerator improves privacy strategies for organizations

Transcend announced its white-glove Migration Accelerator for businesses leaving behind legacy privacy platforms. Transcend’s dedicated switching solution removes the traditional headaches of migration and empowers organizations to unlock the full potential of Transcend’s automated platform. In a landscape where legacy solutions were once the appropriate default choice for many companies at GDPR’s inception, forward-looking organizations are now in the process of rethinking their privacy strategies. This includes seeking next-generation solutions like Transcend that don’t just … More → The post Transcend Migration Accelerator improves privacy strategies for organizations appeared first on Help Net Security.
http://news.poseidon-us.com/THDr37