433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates

Kali Linux 2025.1a is now available. This release enhances existing features with improvements designed to streamline your experience. 2025 theme refresh Kali Linux 2025.1a introduces an annual theme refresh, maintaining a modern interface. This year’s update debuts a redesigned theme aimed at enhancing the user experience from startup. Users can expect notable visual updates, including an improved boot menu, a refined login screen, and a selection of new desktop wallpapers for both Kali and Kali … More → The post Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates appeared first on Help Net Security.
http://news.poseidon-us.com/TJdhqW

5 pitfalls that can delay cyber incident response and recovery

The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises and theoretical plans only to find out that when an actual breach strikes the organization is not as prepared as it should be. Every event is unique and can introduce unforeseen complications, and the chaos of the moment can quickly derail even the best laid plans. But CISOs can improve … More → The post 5 pitfalls that can delay cyber incident response and recovery appeared first on Help Net Security.
http://news.poseidon-us.com/TJddpG

How healthcare CISOs can balance security and accessibility without compromising care

In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. He shares insights on vendor management, zero trust, and securing the software supply chain, along with practical steps to tackle legacy system vulnerabilities. His advice helps organizations strengthen security without disrupting patient care. Given the rise in supply chain attacks, how should healthcare organizations approach vendor … More → The post How healthcare CISOs can balance security and accessibility without compromising care appeared first on Help Net Security.
http://news.poseidon-us.com/TJddnv

Chinese military-linked companies dominate US digital supply chain

Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to Bitsight. These organizations, many of which have been designated by the US Department of Defense as “Chinese Military Companies,” continue to provide essential digital infrastructure, exposing US businesses and critical industries to potential cybersecurity threats. ByteDance Group (TikTok’s parent company) alone is connected to 35.4% of the US market, demonstrating how even high-profile … More → The post Chinese military-linked companies dominate US digital supply chain appeared first on Help Net Security.
http://news.poseidon-us.com/TJdbpf

70% of leaked secrets remain active two years later

Long-lived plaintext credentials have been involved in most breaches over the last several years, according to GitGuardian. When valid credentials, such as API keys, passwords, and authentication tokens, leak, attackers at any skill level can gain initial access or perform rapid lateral movement through systems. The 2025 State of Secrets Sprawl report reveals a widespread and persistent security crisis that threatens organizations of all sizes. The report exposes a 25% increase in leaked secrets year-over-year, … More → The post 70% of leaked secrets remain active two years later appeared first on Help Net Security.
http://news.poseidon-us.com/TJdbpY

ISC Stormcast For Thursday, March 20th, 2025 https://isc.sans.edu/podcastdetail/9372, (Thu, Mar 20th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TJdXFj

Coffee-making robot breaks new ground for AI machines

An AI-powered robot that can prepare cups of coffee in a busy kitchen could usher in the next generation of intelligent machines, a study suggests.
http://news.poseidon-us.com/TJdWfk

In Pictures: Digital As Usual Cyber Security 2025 in Sydney

A selection of photos from a recent Digital As Usual Cyber Security event, at the Establishment Ballroom in the heart of Sydney.
http://news.poseidon-us.com/TJdVbQ