433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Record-breaking 12,900 km ultra-secure quantum satellite link

Scientists have successfully established the world’s longest intercontinental ultra-secure quantum satellite link, spanning 12,900 km. Using the Chinese quantum microsatellite Jinan-1, launched into low Earth orbit, this milestone marks the first-ever quantum satellite communication link established in the Southern Hemisphere.
http://news.poseidon-us.com/TJdx1B

RansomHub affiliate leverages multi-function Betruger backdoor

A RansomHub affiliate is leveraging a new multi-function backdoor dubbed Betruger to perform various actions during their attacks, Symantec researchers have discovered. The Betruger backdoor The malware can take screenshots, log keystroke, scan networks, dump credentials, upload files to a command and control (C2) server, as well as be leveraged for privilege escalation. “Betruger was found while investigating an attempted attack. From there we found another case where it was used,” Dick O’Brien, Principal Intelligence … More → The post RansomHub affiliate leverages multi-function Betruger backdoor appeared first on Help Net Security.
http://news.poseidon-us.com/TJdqjX

Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates

Kali Linux 2025.1a is now available. This release enhances existing features with improvements designed to streamline your experience. 2025 theme refresh Kali Linux 2025.1a introduces an annual theme refresh, maintaining a modern interface. This year’s update debuts a redesigned theme aimed at enhancing the user experience from startup. Users can expect notable visual updates, including an improved boot menu, a refined login screen, and a selection of new desktop wallpapers for both Kali and Kali … More → The post Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates appeared first on Help Net Security.
http://news.poseidon-us.com/TJdhqW

5 pitfalls that can delay cyber incident response and recovery

The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises and theoretical plans only to find out that when an actual breach strikes the organization is not as prepared as it should be. Every event is unique and can introduce unforeseen complications, and the chaos of the moment can quickly derail even the best laid plans. But CISOs can improve … More → The post 5 pitfalls that can delay cyber incident response and recovery appeared first on Help Net Security.
http://news.poseidon-us.com/TJddpG

How healthcare CISOs can balance security and accessibility without compromising care

In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. He shares insights on vendor management, zero trust, and securing the software supply chain, along with practical steps to tackle legacy system vulnerabilities. His advice helps organizations strengthen security without disrupting patient care. Given the rise in supply chain attacks, how should healthcare organizations approach vendor … More → The post How healthcare CISOs can balance security and accessibility without compromising care appeared first on Help Net Security.
http://news.poseidon-us.com/TJddnv

Chinese military-linked companies dominate US digital supply chain

Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to Bitsight. These organizations, many of which have been designated by the US Department of Defense as “Chinese Military Companies,” continue to provide essential digital infrastructure, exposing US businesses and critical industries to potential cybersecurity threats. ByteDance Group (TikTok’s parent company) alone is connected to 35.4% of the US market, demonstrating how even high-profile … More → The post Chinese military-linked companies dominate US digital supply chain appeared first on Help Net Security.
http://news.poseidon-us.com/TJdbpf

70% of leaked secrets remain active two years later

Long-lived plaintext credentials have been involved in most breaches over the last several years, according to GitGuardian. When valid credentials, such as API keys, passwords, and authentication tokens, leak, attackers at any skill level can gain initial access or perform rapid lateral movement through systems. The 2025 State of Secrets Sprawl report reveals a widespread and persistent security crisis that threatens organizations of all sizes. The report exposes a 25% increase in leaked secrets year-over-year, … More → The post 70% of leaked secrets remain active two years later appeared first on Help Net Security.
http://news.poseidon-us.com/TJdbpY

ISC Stormcast For Thursday, March 20th, 2025 https://isc.sans.edu/podcastdetail/9372, (Thu, Mar 20th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TJdXFj

Coffee-making robot breaks new ground for AI machines

An AI-powered robot that can prepare cups of coffee in a busy kitchen could usher in the next generation of intelligent machines, a study suggests.
http://news.poseidon-us.com/TJdWfk