433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Government shutdown puts SBA loans on hold

The Small Business Administration paid out more than $45 billion in loans to 85,000 small businesses in fiscal 2025. The post Government shutdown puts SBA loans on hold first appeared on Federal News Network.
http://news.poseidon-us.com/TNx07H

Space and Cyber: The Race Above and the Battle Below

Summary “Space Race 2.0ˮ is gaining momentum, fueled by the extraordinary value of resources located on Earthʼs moon, asteroids in our solar system, and other planetary bodies. Cyber threat actors are increasingly targeting organizations operating in the space domain. Many of these state-sponsored cyber threat actors are believed to have ties to military units, in part due to the rapid expansion of space commands/forces within militaries. Space Race 2.0 will become increasingly polarized, with US-led and Chinese-led confederations. This competition will supercharge the 21st-century space race. Cybersecurity is playing a pivotal role in this race and will continue to do so. Espionage focused on intellectual property theft is expected to help nations gain competitive advantages. The risk of destructive attacks will increase. As a result, the supply chain, in particular, needs to be closely monitored. Analysis A new version of the Space Race that began in the twentieth century has emerged as the Fourth Industrial Revolution gains momentum. The demand for minerals, energy, and other resources is a major driving factor. Today, the race is playing out in Earth’s orbit, with a growing number of countries launching both commercial and military satellites. Earth’s moon is the next target for space powers. It is believed to hold water ice, valuable minerals, and critically, helium-3, an isotope with potential to be used as fuel for future nuclear fusion reactors, offering a clean, efficient, and transformative energy source. Companies are already planning to harvest it, and lunar bases are being designed to secure and protect the moon’s resources. Asteroids are also incredibly rich in minerals vital for electronics and space infrastructure. At current market prices, these minerals’ potential value is astronomical. Companies are preparing to survey nearby asteroids, deploy robotic mining systems, and transport the extracted materials back to Earth or space-based facilities. Other planets and moons are already being explored. Many nations have landed robotic systems on Mars and are scanning the solar system for habitable planets, some of which have been identified. In the 2020s and beyond, space operations will only be as secure as the cybersecurity programs that defend them. Cyber threat actors can disrupt operations in three key ways: by targeting the ground stations, the communication links, or the space assets themselves. Figure 1: Criminals directly and indirectly engage with the media to promote their brand and make extortion more impactful (Source: Recorded Future) Countries are increasingly militarizing space operations. The primary objective at this stage appears to be protecting satellites and ground stations. The US Space Force contains Space Delta 6, which “conducts Cyberspace Operations to defend United States Space Force space systems from adversarial attack through the cyber domain…”. The Chinese military has also recognized that space operations heavily rely on network systems and that cybersecurity is critical to ambitions in space. As a result, in 2024, the People’s Liberation Army created the PLA Cyberspace Force (CSF), Information Support Force (ISF), and Aerospace Force (ASF). Figure 2: Timeline of countries that have been investing in space commands and forces (list not exhaustive)(Source: Recorded Future) As indicated in Figure 3, there has also been a continued trend in cyber threat actors — many of whom are believed to be affiliated with military units — targeting aerospace companies developing space technologies. Insikt Group has observed these threat actors targeting contractors or using fraudulent identities to gain access to organizations. Figure 3: Timeline of Recorded Future Insikt Research Leads, showing some key State-sponsored targeting of the aerospace sector from September 2021 to July 2025 (Source: Recorded Future) Governments are rightly focused on securing ground stations by patching vulnerabilities, blocking phishing attacks, resetting leaked credentials, and monitoring for insider threats. While these defensive measures are essential, outsourcing the production of space equipment to private suppliers makes those companies an attractive target for cyber threat actors seeking to exploit weaker links in the supply chain. Figure 4: Screenshot of Third Party Intelligence risk rules from a major supplier to a military operating its equipment in space (Source: Recorded Future) Organizational Impact Scenario: “Space Systems Inc.”, operating assets in the space domain, has not implemented a robust cybersecurity program or third-party supplier monitoring program. First-order Implications Development 1 Unhardened ground‐station networks become low‐effort targets Effect Default passwords, unpatched systems, and exposed ports allow intrusion within days Risks Operational disruption Brand impairment Development 2 Unvetted suppliers insert counterfeit or back‐doored components Effect “Need‐it‐now” procurement bypasses rigorous parts checks; malicious firmware is hidden inside components Risks Operational disruption Legal/compliance failure Second-order Implications Development 1 Supply‐chain compromise manifests on‐orbit Effect Anomalous satellite behavior, unplanned safe‐modes Risks Operational disruption Competitive disadvantage Development 2 Persistent foothold in ground segment enables data exfiltration Effect Attackers move laterally across the network, gaining privileges, then leak proprietary data Risks Brand impairment Legal/compliance failure Third-order Implications Development 1 Satellite hijack or kinetic debris incident Effect Attacker communicates with satellite and starts to issue rogue thrust commands, causing collision or uncontrolled de‐orbit; litigation soon follows Risks Legal/compliance failure Brand impairment Development 2 Investor class‐action or SEC enforcement Effect Material cyber weaknesses were not disclosed; post‐incident stock drop triggers lawsuits and regulatory probes Risks Financial fraud Legal/compliance failure Outlook The second era of the Space Race will almost certainly become polarized: The US-led Artemis Accords are attracting signatories from countries aligned with the US, while China and Russia have declined to sign and are pursuing their own joint ventures, such as plans for a shared lunar base. This signals that Space Race 2.0 will likely be defined by competition between a US-led bloc and a China-led bloc. Control of the Moon and its resources will very likely decide who becomes the dominant superpower: Plans to establish lunar bases are advancing and could become a reality in the 2030s. The race to colonize the Earth’s moon is set to create intense strategic competition between the US and China. The first nation to harvest lunar resources will likely gain a major boost to its industrial capabilities. Cybersecurity will almost certainly be pivotal to the success of space operations: Cyberattacks are already being used to steal sensitive intellectual property from organizations developing space technologies, increasing the risk of competitive disadvantage. While many attacks so far have avoided outright destruction, satellite-related incidents like the 2022 Viasat attack and recent signal hijacking highlight the growing threat of operational disruption. Supply chains are almost certain to be the Achilles’ heel of space operations: As private companies and government agencies rapidly outsource software development and equipment manufacturing, supply-chain risks are often overlooked. Critical aerospace components continue to be produced in adversarial countries, substantially increasing the risk of operational downtime or even the installation of backdoors in delivered systems. Mitigations Cybersecurity basics really matter: If your organization manages any space operations from Earth, review your vulnerability patching program and identity and access management practices. Ensure you are ingesting high-fidelity indicators of compromise (IoCs) related to threat actors known to target the aerospace sector into your SIEM and EDR tools. Recorded Future’s Integrations, Vulnerability, Identity, and SecOps Intelligence can help support these efforts. Conduct an in-depth audit of your supply chain: Maintain a detailed inventory of who manufactures your components and where they are produced. Rank suppliers by criticality and monitor their cybersecurity hygiene. If critical components are linked to suppliers with high Risk Scores, consider restricting their access or replacing them. At a minimum, factor these risks into your business continuity planning. Recorded Future’s Third-Party Intelligence can help support these efforts. Do not underestimate the threat of removable media: Even with air-gapped systems, the risk of “Replication Through Removable Media” (MITRE ATT&CK Technique T1091) remains significant. This technique is increasingly reported as an initial access vector for state-sponsored threat actors. Familiarize your blue teams with the SPARTA Matrix: This is a space-focused adaptation of the MITRE ATT&CK framework. It offers a structured knowledge base of cyber adversary tactics, techniques, and procedures (TTPs) specific to space systems. Further Reading * The Convergence of Space and Cyber: An Evolving Threat Landscape * Near-Space in Chinaʼs Military Strategy: Strategic Reconnaissance, Precision Strike, and Battlefield Advantage ENISA Space Threat Landscape 2025
http://news.poseidon-us.com/TNwzfN

12 Free Project Progress Tracker Templates for Excel & Word

A project progress tracker is an essential tool for monitoring project performance, keeping tasks on schedule and ensuring deliverables are met. Using a project progress tracker helps teams visualize progress, identify bottlenecks and manage deadlines effectively. Whether through software or… Read More The post 12 Free Project Progress Tracker Templates for Excel & Word appeared first on ProjectManager.
http://news.poseidon-us.com/TNwyDq

Italian-made spyware Dante linked to Chrome zero-day exploitation campaign

CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was used by unknown attackers to deliver LeetAgent, suspected commercial spyware. An analysis of the malware’s code and the campaign’s infrastructure led Kaspersky researchers to uncover additional attacks by the same threat actor against organizations and individuals in Russia and Belarus. The researchers also uncovered another spyware tool used in some of these intrusions: Dante, commercial … More → The post Italian-made spyware Dante linked to Chrome zero-day exploitation campaign appeared first on Help Net Security.
http://news.poseidon-us.com/TNwvXV

IRISSCON 2025 to address the human impact on cybersecurity

Recent high-profile cybersecurity breaches affecting global brands share a common link: the human factor. Expert speakers will cover this subject in depth at IRISSCON 2025, which takes place at Dublin’s Aviva Stadium on Wednesday November 5. Now in its 16th year, IRISSCON brings together leading cybersecurity professionals, researchers, and law enforcement experts to discuss the latest challenges and trends in cybersecurity. This year’s conference theme, ‘The Human Factor in Cybersecurity’, reflects growing concern across the … More → The post IRISSCON 2025 to address the human impact on cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TNwrRC

Sublime Security secures $150 million to accelerate AI-driven, automated email protection

Sublime Security has raised $150 million in Series C funding led by Georgian to accelerate its agentic AI capabilities and bring new levels of proactive, automated defense to email security. Other participants include new investors Avenir and 01A, and existing investors Index Ventures, IVP, Citi Ventures, and Slow Ventures. This investment comes at a critical time, as phishing and other email-based attacks grow in speed, scale, and sophistication thanks to generative AI. Unlike legacy vendors … More → The post Sublime Security secures $150 million to accelerate AI-driven, automated email protection appeared first on Help Net Security.
http://news.poseidon-us.com/TNwrRB

New Corero SmartWall ONE capability blocks encrypted DDoS threats without latency

Corero Network Security announced a new SmartWall ONE capability that stops encrypted application-layer attacks in real time without added latency or infrastructure. The enhancement addresses one of the most pressing blind spots in modern cybersecurity. With encryption now standard for internet traffic, attackers are using secure channels to launch high-impact DDoS attacks that evade traditional defenses. Corero closes this gap with AI-assisted detection and real-time intelligence feeds that stop threats instantly. The solution avoids false … More → The post New Corero SmartWall ONE capability blocks encrypted DDoS threats without latency appeared first on Help Net Security.
http://news.poseidon-us.com/TNwrQD

Flex launches program to help federal employees and military members manage rent during shutdown

Eligible federal employees, contractors, and active-duty military members affected by the shutdown can enroll in Flex’s Federal Employee Relief Program. The post Flex launches program to help federal employees and military members manage rent during shutdown first appeared on Federal News Network.
http://news.poseidon-us.com/TNwqDD

Mastercard unveils Threat Intelligence to fight cyber-enabled payment fraud

Mastercard announced Mastercard Threat Intelligence, a threat intelligence offering applied to payments at scale. The solution combines Mastercard’s fraud insights and global network visibility with curated cyber threat intelligence from Recorded Future’s platform to help payment fraud and merchant compliance teams at issuing and acquiring banks detect, prevent, and respond to cyber-enabled fraud. Fraud rarely starts at the point of transaction, it often originates as a cyberattack. 60% of global fraud leaders report that they … More → The post Mastercard unveils Threat Intelligence to fight cyber-enabled payment fraud appeared first on Help Net Security.
http://news.poseidon-us.com/TNwdVP