433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Abortion bans cause privacy, financial issues for service members, despite DoD’s efforts

Pregnant service members will need permission from commanders to take leave to get medical care.
http://news.poseidon-us.com/ST9k4k

The challenges and advantages of building behavior-based threat detection

In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of malicious actors, organizations must shift their gaze to detect attackers before something bad happens. The post The challenges and advantages of building behavior-based threat detection appeared first on Help Net Security.
http://news.poseidon-us.com/ST8k2c

Leaky Access Tokens Exposed Amazon Photos of Users

Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
http://news.poseidon-us.com/ST6SHK

Cyber Week 2022 video walkthrough

Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. In this Help Net Security video, we take you inside Cyber Week 2022. The featured vendors are: Dig Security, Ermetic, enso, Forescout, Flow, IBM Security, Intuit, Israel Aerospace Industries, Mitiga, and Synopsys. The post Cyber Week 2022 video walkthrough appeared first on Help Net Security.
http://news.poseidon-us.com/ST5qd7

Evolving online habits have paved the way for fraud. What can we do about it?

Information is power, and personally identifiable information (PII) is an extremely powerful asset that is fueling the rapid growth of online fraud (also known as the Digital Identity Crisis). PII is any piece of data that someone could use to figure out who you are. Historical data such as your name, date of birth, or Social Security Number come to mind, but social media sites, e-commerce platforms, credit card companies, government agencies, and employers all … More → The post Evolving online habits have paved the way for fraud. What can we do about it? appeared first on Help Net Security.
http://news.poseidon-us.com/ST5NVC

How and why threat actors target Microsoft Active Directory

Microsoft Active Directory debuted 22 years ago. In computer age, that’s old technology. Threat actors like old technology because it often has legacy code or processes that are not secured to modern standards or organizations have not kept up with patches and recommended settings. Derek Melber, chief technology and security strategist for Tenable, discussed Active Directory risks at this year’s RSA conference. Attackers target domains. If they see a device joined to Active Directory, they will continue with the attack. If they don’t see a domain-joined machine, they will go on to another workstation. Below are some examples of how attackers can exploit legacy Active Directory vulnerabilities To read this article in full, please click here
http://news.poseidon-us.com/ST2YvS

Photos: Cyber Week 2022

Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. Cyber Week 2022 is held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), The Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Directorate under the Prime Minister’s Office and the Ministry of Foreign Affairs. Our Editor-in-Chief Zeljka Zorz is at the conference this week, and here’s a closer look … More → The post Photos: Cyber Week 2022 appeared first on Help Net Security.
http://news.poseidon-us.com/ST2Rhq