433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

A closer look at LATMA, the open-source lateral movement detection tool

In this Help Net Security video, Gal Sadeh, Head of Data and Security Research at Silverfort, discusses LATMA, a free, open-source tool. It’s engineered with advanced algorithms to track and report any unusual activity within an environment. The tool consists of two modules: Logs collector – This module collects authentication traffic from the Active Directory environment. It gathers the logs from the domain controllers and endpoints, focusing only on interactive Kerberos and NTLM authentications. Analyzer … More → The post A closer look at LATMA, the open-source lateral movement detection tool appeared first on Help Net Security.
http://news.poseidon-us.com/T043Jh

ThreatNG open-source datasets aim to improve cybersecurity practices

The ThreatNG Governance and Compliance Dataset is an open-source initiative that aims to democratize access to critical data, fostering transparency, collaboration, and improvement of cybersecurity practices globally. Datasets for organizational insight The open-source datasets offered by ThreatNG provide an understanding of organizational practices, promoting informed decision-making and accountability within the corporate landscape. These datasets include: ESG (Environmental, Social, Governance) filings – A dataset highlighting a company’s dedication to sustainability, ethical behavior, and good governance, offering … More → The post ThreatNG open-source datasets aim to improve cybersecurity practices appeared first on Help Net Security.
http://news.poseidon-us.com/T043GY

Five things contractors need to know about the Defense authorization bill

It looks like Congress has managed to get the National Defense Authorization law done before December 31. As always, the bill is chock full of items federal contractors should pay attention to.
http://news.poseidon-us.com/T03G98

Five things contractors need to know about the Defense authorization bill

It looks like Congress has managed to get the National Defense Authorization law done before December 31. As always, the bill is chock full of items federal contractors should pay attention to.
http://news.poseidon-us.com/T03Ffr

Nemesis: Open-source offensive data enrichment and analytic pipeline

Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data collected during penetration tests and red team engagements).​​ Nemesis was created by Lee Chagolla-Christensen and Will Schroeder, both security researchers at SpecterOps. Analyzing the details of an individual file Centralized data processing with Nemesis The solution attempts to address three main issues: Knowledge about offensive tradecraft is difficult to scale due to the rapid pace … More → The post Nemesis: Open-source offensive data enrichment and analytic pipeline appeared first on Help Net Security.
http://news.poseidon-us.com/T01SRR

WhatsApp, Slack, Teams, and other messaging platforms face constant security risks

42% of businesses report employees with BYOD devices in business settings that use tools like WhatsApp have led to new security incidents, according to SafeGuard Cyber. Messaging platforms like WhatsApp, Telegram, Slack, and Teams face constant threats, emphasizing the need for robust protection. 66% of threat indicators are found in transient messages associated with these cloud-based collaboration tools. WhatsApp is gaining popularity for enterprise communication, but not without risk. Of the messages flagged for security … More → The post WhatsApp, Slack, Teams, and other messaging platforms face constant security risks appeared first on Help Net Security.
http://news.poseidon-us.com/T01SQk

ISC Stormcast For Tuesday, December 12th, 2023 https://isc.sans.edu/podcastdetail/8774, (Tue, Dec 12th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/T01M2J

A leading research group takes on the artificial intelligence cyber threat question

As the artificial intelligence phenomenon rolls on, the question emerges: What are the cybersecurity-attack implications of AI? Now Carnegie Mellon University’s Software Engineering Institute has formed a team called the Artificial Intelligence Security Incident Response Team. It’s working with sponsors in the Defense and Homeland Security Departments. For more, the Federal Drive with Tom Temin spoke with the Director of the CERT division of the Software Engineering Institute, Greg Touhill.
http://news.poseidon-us.com/T00jmF

Best ClickUp Alternatives: Free and Paid Options Ranked (2024)

ClickUp is project management software that promotes itself as “the one app to replace them all.” It’s a cloud-based tool that integrates with Zoom, Google Drive and GitHub and offers tools that foster collaboration and provide analytical insights. It’s true… Read More The post Best ClickUp Alternatives: Free and Paid Options Ranked (2024) appeared first on ProjectManager.
http://news.poseidon-us.com/T00gjv