433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Less than a trillionth of a second: Ultrafast UV light could transform communications and imaging

Researchers have built a new platform that produces ultrashort UV-C laser pulses and detects them at room temperature using atom-thin materials. The light flashes last just femtoseconds and can be used to send encoded messages through open space. The system relies on efficient laser generation and highly responsive sensors that scale well for manufacturing. Together, these advances could accelerate the development of next-generation photonic technologies.
http://news.poseidon-us.com/TQD1Hp

These mesmerizing patterns are secretly solving hard problems

Tessellations aren’t just eye-catching patterns—they can be used to crack complex mathematical problems. By repeatedly reflecting shapes to tile a surface, researchers uncovered a method that links geometry, symmetry, and problem-solving. The technique works in both ordinary flat space and curved hyperbolic worlds used in theoretical physics. Its blend of beauty and precision could influence everything from engineering to digital design.
http://news.poseidon-us.com/TQD1Gf

Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability

A vulnerability in the licensing features of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.  This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability by uploading a malicious file to the application. A successful exploit could allow the attacker to read arbitrary files from the underlying operating system that could include sensitive data that should otherwise be inaccessible even to administrators. To exploit this vulnerability, the attacker must have valid administrative credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt Security Impact Rating: Medium CVE: CVE-2026-20029
http://news.poseidon-us.com/TQCVjg

Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities

Multiple Cisco products are affected by vulnerabilities in the processing of Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, which would result in an interruption of packet inspection. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH Security Impact Rating: Medium CVE: CVE-2026-20026,CVE-2026-20027
http://news.poseidon-us.com/TQCVj5

UK announces grand plan to secure online public services

The UK has announced a new Government Cyber Action Plan aimed at making online public services more secure and resilient, and has allocated £210 million (approximately $283 million) to implement it. Setting up a Government Cyber Unit “Cyber attacks can take vital public services offline in minutes, disrupting lives and undermining confidence,” the UK Department for Science, Innovation and Technology (DSIT) said. “The new plan addresses this challenge head-on.” Part of the plan is the … More → The post UK announces grand plan to secure online public services appeared first on Help Net Security.
http://news.poseidon-us.com/TQCPPL

Debian seeks volunteers to rebuild its data protection team

The Debian Project is asking for volunteers to step in after its Data Protection Team became inactive. All three members of the team stepped down at the same time, leaving no dedicated group to handle privacy and data protection work. The announcement was posted to the Debian development announcements mailing list. Until new volunteers join, the responsibilities of the team sit with the Debian Project Leader, Andreas Tille. The request is aimed at members of … More → The post Debian seeks volunteers to rebuild its data protection team appeared first on Help Net Security.
http://news.poseidon-us.com/TQCGmz

Fake Booking.com emails and BSODs used to infect hospitality staff

Suspected Russian attackers are targeting the hospitality sector with fake Booking.com emails and a fake “Blue Screen of Death” to deliver the DCRat malware. The malware delivery campaign starts with phishing emails that feature room charge details in euros, which means that European organizations are likely targets. But, according to Securonix researchers, the attackers’ are more than capable of adapting the campaign to target other industries. The campaign The attackers are sending out emails impersonating … More → The post Fake Booking.com emails and BSODs used to infect hospitality staff appeared first on Help Net Security.
http://news.poseidon-us.com/TQCGlb