433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Sen. Peters believes the time is right for SAMOSA

Sen. Gary Peters wants to strengthen agency oversight and management of software that could lead to billions of dollars in savings. The post Sen. Peters believes the time is right for SAMOSA first appeared on Federal News Network.
http://news.poseidon-us.com/TL9QW2

Sen. Peters believes the time is right for SAMOSA

Sen. Gary Peters wants to strengthen agency oversight and management of software that could lead to billions of dollars in savings. The post Sen. Peters believes the time is right for SAMOSA first appeared on Federal News Network.
http://news.poseidon-us.com/TL9QJy

IRS close to getting new leader

The Senate Finance Committee advanced the nomination of former Rep. Billy Long (R-Mo.). The post IRS close to getting new leader first appeared on Federal News Network.
http://news.poseidon-us.com/TL9QC5

IRS close to getting new leader

The Senate Finance Committee advanced the nomination of former Rep. Billy Long (R-Mo.). The post IRS close to getting new leader first appeared on Federal News Network.
http://news.poseidon-us.com/TL9Q9h

Forward Under Pressure: Practical paths to modern federal acquisition

Discover how prioritizing employee experience can unlock better performance, stronger morale, and improved outcomes across government. The post Forward Under Pressure: Practical paths to modern federal acquisition first appeared on Federal News Network.
http://news.poseidon-us.com/TL9LbS

Forward Under Pressure: Practical paths to modern federal acquisition

Discover how prioritizing employee experience can unlock better performance, stronger morale, and improved outcomes across government. The post Forward Under Pressure: Practical paths to modern federal acquisition first appeared on Federal News Network.
http://news.poseidon-us.com/TL9LNL

Cisco Customer Collaboration Platform Information Disclosure Vulnerability

A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data. This vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd Security Impact Rating: Medium CVE: CVE-2025-20129
http://news.poseidon-us.com/TL9JVk

Cisco Unified Communications Products Command Injection Vulnerability

A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vos-command-inject-65s2UCYy Security Impact Rating: Medium CVE: CVE-2025-20278
http://news.poseidon-us.com/TL9JVf

Cisco Integrated Management Controller Privilege Escalation Vulnerability

A vulnerability in the SSH connection handling of Cisco Integrated Management Controller (IMC) for Cisco UCS B-Series, UCS C-Series, UCS S-Series, and UCS X-Series Servers could allow an authenticated, remote attacker to access internal services with elevated privileges. This vulnerability is due to insufficient restrictions on access to internal services. An attacker with a valid user account could exploit this vulnerability by using crafted syntax when connecting to the Cisco IMC of an affected device through SSH. A successful exploit could allow the attacker to access internal services with elevated privileges, which may allow unauthorized modifications to the system, including the possibility of creating new administrator accounts on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability, but a mitigation is available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM Security Impact Rating: High CVE: CVE-2025-20261
http://news.poseidon-us.com/TL9JVY