433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Vishing attacks: What they are and how organizations can protect themselves

Vishing (voice phishing) involves defrauding people over the phone. Vishing cases have increased almost 550 percent during 2021, and vishing attacks have overtaken business email compromise (BEC) as the second most reported response-based email threat since Q3 2021. In this video for Help Net Security, Eric George, Director of Solutions Engineering, PhishLabs, talks about this constantly evolving threat. The post Vishing attacks: What they are and how organizations can protect themselves appeared first on Help Net Security.
http://news.poseidon-us.com/SRXNdc

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted at cybersecurity and IT professionals in both the U.S. and UK. The problem with monitoring of business-critical systems The poll revealed the extent of insecure and unmonitored business-critical systems, with 40 per cent noting that they do not include business-critical systems such as SAP in their cybersecurity monitoring. In … More → The post 40% of enterprises don’t include business-critical systems in their cybersecurity monitoring appeared first on Help Net Security.
http://news.poseidon-us.com/SRXKvq

Scalability and security with industry-leading Government cloud – Part 2

In the never-ending work of information technology modernization, federal agencies have been working on three tracks when it comes to cloud computing. They’ve moved at least some legacy applications to the cloud in what’s commonly called lift-and-shift.
http://news.poseidon-us.com/SRWVvh

Language-based BEC attacks rising

Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in remote work has made critical business workflows even more vulnerable to new forms of email-based attacks, often resulting in financial fraud or credential theft. The report is based on data gathered across 58,000+ customer tenants, end-user feedback, and threat research. It documents both the rise in targeted attacks and the … More → The post Language-based BEC attacks rising appeared first on Help Net Security.
http://news.poseidon-us.com/SRT5PX

Autonomous vehicles can be tricked into erratic driving behavior

When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have identified another possible risk: Autonomous vehicles can be tricked into an abrupt halt or other undesired driving behavior by the placement of an ordinary object on the side of the road. “A box, bicycle or traffic cone may be all that is necessary to scare a driverless vehicle … More → The post Autonomous vehicles can be tricked into erratic driving behavior appeared first on Help Net Security.
http://news.poseidon-us.com/SRT3CC

Protected: A former fed’s perspective on 3 capabilities that help businesses succeed as government contractors

There is no excerpt because this is a protected post.
http://news.poseidon-us.com/SRSQLQ