433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Coruna: Spy-grade iOS exploit kit powering financial crime

A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns and, ultimately, ended into the hands of financially motivated hackers, according to new research from Google’s Threat Intelligence Group (GTIG). “The exploit kit, named ‘Coruna’ by its developers, contained five full iOS exploit chains and a total of 23 exploits,” the analysts noted. The exploit list includes both CVE-tracked vulnerabilities … More → The post Coruna: Spy-grade iOS exploit kit powering financial crime appeared first on Help Net Security.
http://news.poseidon-us.com/TRGrbY

9 Free Employee Onboarding Templates for Excel and Word

Bringing someone new into your team is exciting, but without structure, even strong hires can lose momentum fast. The right onboarding templates turn first impressions into clear direction, measurable goals and confident execution. Keep reading to explore practical employee onboarding… Read More The post 9 Free Employee Onboarding Templates for Excel and Word appeared first on ProjectManager.
http://news.poseidon-us.com/TRGjMm

Latin America’s Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence

Latin America’s threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overstretched security teams. Recorded Future provides LATAM-specific intelligence, automation, and seamless integrations to help your team get ahead of threats before they hit.
http://news.poseidon-us.com/TRGj4c

Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

Fig Security, a new platform that finds and fixes broken security flows across your entire SecOps infrastructure, has launched from stealth with $38 million across Seed and Series A rounds. It addresses one of the least visible challenges yet most consequential in enterprise security: the quiet breakdown of security operations as environments grow more complex. The round is backed by Team8 and Ten Eleven Ventures, alongside a group of prominent security leaders. Enterprises pour billions … More → The post Fig Security emerges from stealth with $38 million to resilience-proof enterprise security appeared first on Help Net Security.
http://news.poseidon-us.com/TRGggk

Threat actors weaponize OAuth redirection logic to deliver malware

An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have revealed. The attackers are targeting government and public-sector organizations, and redirecting unsuspecting users from trusted login pages to their own infrastructure, to serve malware or capture login credentials. The attack, from the victim’s perspective The OAuth authentication redirection mechanism is a trusted login feature used by Microsoft, Google and others. It allows users … More → The post Threat actors weaponize OAuth redirection logic to deliver malware appeared first on Help Net Security.
http://news.poseidon-us.com/TRGggb