433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cybersecurity as a global, multi-sector activity with Mihoko Matsubara

Like many leaders in the cybersecurity space, the professional journey of Mihoko Matsubara did not necessarily begin with securing devices or technology. However, once she discovered it, she was hooked. Discussing her career path with the Left to Our Own Devices podcast and how it opened her eyes to a world of security, Mihoko explained how she went from curiosity to university in Washington, D.C., became a Senior Security Analyst at Hitachi, then VP Public … More → The post Cybersecurity as a global, multi-sector activity with Mihoko Matsubara appeared first on Help Net Security.
http://news.poseidon-us.com/StV863

ISC Stormcast For Friday, August 11th, 2023 https://isc.sans.edu/podcastdetail/8612, (Fri, Aug 11th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/StV5qt

37% of third-party applications have high-risk permissions

Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a massive increase in third-party applications (apps) integrated with email, underscoring the proliferation of an emerging threat vector that cybercriminals are exploiting as they continue to shift their tactics. Third-party applications risk The number of integrated third-party apps continued to rise in the first half of 2023 (between January and … More → The post 37% of third-party applications have high-risk permissions appeared first on Help Net Security.
http://news.poseidon-us.com/StRXWx

GSA’s commercial platforms gaining steam, but data, other concerns persist

New data from GAO found 27 agencies spent more than $40 million through the Commercial Platforms, with 96% going to one of the three providers.
http://news.poseidon-us.com/StR8yL

Maverick* Research: You Will Be Hacked, So Embrace the Breach

Cybersecurity breaches are inevitable. Instead of striving to prevent breaches, focus on resilience and embrace hacks as incidents to learn from.
http://news.poseidon-us.com/StR7G8

Strategic Framework for Ransomware Resilience

In 2022 only 16% of organizations who suffered a ransomware attack were able to recover without paying a ransom. Since it’s not possible to prevent every cyberattack, organizations need to make recovery a priority. This paper outlines the critical capabilities needed to prepare for and recover from a ransomware attack, reducing downtime and minimizing the possibility of data loss.
http://news.poseidon-us.com/StR7Bc

Downfall attacks can gather passwords, encryption keys from Intel processors

A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks made possible by CVE-2022-40982, which enables attackers to access and steal sensitive data such as passwords, encryption keys, and private data from other users on the same personal or cloud computer. CVE-2022-40982 and the Downfall attacks “[CVE-2022-40982] is caused by memory optimization features in Intel processors that unintentionally reveal internal hardware registers to software. This … More → The post Downfall attacks can gather passwords, encryption keys from Intel processors appeared first on Help Net Security.
http://news.poseidon-us.com/StPjcj