433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

Critical Palo Alto GlobalProtect Vulnerability Exploited (CVE-2024-3400), (Sat, Apr 13th)

On Friday, Palo Alto Networks released an advisory warning users of Palo Alto's Global Protect product of a vulnerability that has been exploited since March [1].
http://news.poseidon-us.com/T5SP5t

Pentagon looks to standardize its relationship with space companies

A new strategy from the Defense Department outlines how the agency plans to sync up its interests with the commercial space companies, it works with. The post Pentagon looks to standardize its relationship with space companies first appeared on Federal News Network.
http://news.poseidon-us.com/T5RDmx

PowerShell Script Used in Phishing Attack May Be AI-Generated

A PowerShell script being used in a novel malware campaign may have been created by AI, according to security researchers at Proofpoint.
http://news.poseidon-us.com/T5QM6B

Why women struggle in the cybersecurity industry

The workplace experiences of women in cybersecurity are dramatically worse than men across virtually every category, according to a WiCyS and Aleria survey. Previous studies have illustrated that the representation of women in cybersecurity is much lower than it should be, but can’t explain why or how we can improve matters. Women confront exclusion at higher rates Women encounter exclusion at twice the rate of men, signaling a pressing need for industry-wide cultural and procedural … More → The post Why women struggle in the cybersecurity industry appeared first on Help Net Security.
http://news.poseidon-us.com/T5PG2j

New infosec products of the week: April 12, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Akamai, Bitdefender, Siemens, Veriato, and Index Engines. SINEC Security Guard identifies vulnerable production assets The SINEC Security Guard offers automated vulnerability mapping and security management optimized for industrial operators in OT environments. The software can automatically assign known cybersecurity vulnerabilities to the production assets of industrial companies. This allows industrial operators and automation experts who don’t have dedicated cybersecurity expertise … More → The post New infosec products of the week: April 12, 2024 appeared first on Help Net Security.
http://news.poseidon-us.com/T5PG2G

CISA directs agencies to investigate if Russian hackers stole Microsoft account details

CISA’s directive comes after Russian hackers broke into Microsoft’s corporate email accounts and stole messages with customers, including federal agencies. The post CISA directs agencies to investigate if Russian hackers stole Microsoft account details first appeared on Federal News Network.
http://news.poseidon-us.com/T5NqYY

CISA directs agencies to investigate if Russian hackers stole Microsoft account details

CISA’s directive comes after Russian hackers broke into Microsoft’s corporate email accounts and stole messages with customers, including federal agencies. The post CISA directs agencies to investigate if Russian hackers stole Microsoft account details first appeared on Federal News Network.
http://news.poseidon-us.com/T5Nq2J

Generative AI’s ROI is a work in progress

Gartner analysts place the technology’s models and tools near the beginning of its hype cycle, leaving ample room for growth.
http://news.poseidon-us.com/T5MTxm

37% of publicly shared files expose personal information

Many sensitive documents stored on platforms such as Google Drive, Slack, and other collaborative work applications have been left unattended for several months or even years. This has led to data sprawl challenges for companies and significant data security threats for individuals and their employers, according to Metomic’s “State of Data Security in Financial Services” report. 86% of the files had not been updated in 90 days, 70% in over a year, and 48% in … More → The post 37% of publicly shared files expose personal information appeared first on Help Net Security.
http://news.poseidon-us.com/T5LqMH

Stopping security breaches by managing AppSec posture

Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development life cycle, from code to cloud. In this Help Net Security video, Gopi Rebala, CTO at OpsMx, talks about how managing application security posture can help companies identify, prioritize, and fix vulnerabilities and stop security breaches while enforcing policies to block vulnerable deployments to production environments. The post Stopping security breaches by managing AppSec posture appeared first on Help Net Security.
http://news.poseidon-us.com/T5LqJy