433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

Breaking the Bank: Weakness in Financial AI Applications

Currently, threat actors possess limited access to the technology required to conduct disruptive operations against financial artificial intelligence (AI) systems and the risk of this targeting type remains low. However, there is a high risk of threat actors leveraging AI as part of disinformation campaigns to cause financial panic. As AI financial tools become more […]

WIBU SYSTEMS AG WibuKey Digital Rights Management (Update B)

1. EXECUTIVE SUMMARY CVSS v3 10.0 ——— Begin Update B Part 1 of 4 ——— ATTENTION: Exploitable remotely/low skill level to exploit/public exploits available Vendor: WIBU-SYSTEMS AG Equipment: WibuKey Digital Rights Management (DRM) ——— End Update B Part 1 of 4 ——— Vulnerabilities: Information Exposure, Out-of-bounds Write, Heap-based Buffer Overflow 2. UPDATE INFORMATION This updated […]

Rangers receive awards for valor

1 / 2 Show Caption + Hide Caption – Maj. Gen. Mark Schwartz, deputy commanding general, Joint Special Operations Command presented the Silver Star to Master Sgt. Phillip Paquette, a former 1st Sgt. with 1st Battalion, 75th Ranger Regiment, for his heroic actions April 25, 2018. As the ground force commander during combat operations, Master […]

45 – Plasma Satellite Propulsion, Extended Satellite Life, and the Fourth State of Matter

Satellite propulsion has been receiving much deserved attention. Not to be confused with chemical launch propulsion, satellite propulsion is primarily electrical propulsion that optimizes the satellite’s orbit once launched, maintains that orbit despite gravitational pulls and, finally, helps to assure a safe de-orbit. Electric propulsion uses an electric or a magnetic reaction or magnetic fields […]

APT40: Examining a China-Nexus Espionage Actor

FireEye is highlighting a cyber espionage operation targeting crucial technologies and traditional intelligence targets from a China-nexus state sponsored actor we call APT40. The actor has conducted operations since at least 2013 in support of China’s naval modernization effort. The group has specifically targeted engineering, transportation, and the defense industry, especially where these sectors overlap […]

FLARE Script Series: Recovering Stackstrings Using Emulation with ironstrings

This blog post continues our Script Series where the FireEye Labs Advanced Reverse Engineering (FLARE) team shares tools to aid the malware analysis community. Today, we release ironstrings: a new IDAPython script to recover stackstrings from malware. The script leverages code emulation to overcome this common string obfuscation technique. More precisely, it makes use of our flare-emu tool, […]

44 – Space Telcos, the Spectrum Crunch and Flying Dragons

Satellite operators are facing a real problem concerning how they establish and maintain real-time connectivity for commercial spacecraft. As more and more commercial satellites are set to launch this problem is becoming increasingly important. Ralph Ewig, CEO of Audacy Space shares his expertise about how real-time connectivity, addressing the spectrum crunch and building a communications […]

Siemens SIMATIC S7-1500 CPU

1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Siemens Equipment: SIMATIC S7-1500 CPU Vulnerabilities: Improper Input Validation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a denial of service condition of the device. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of SIMATIC S7-1500 CPU are affected: […]