433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

web3 phishing via self-customizing landing pages, (Mon, Feb 7th)

You may not quite understand what “web3” is all about (I do not claim to do so), but it appears phishers may already use it. At least a particular web3 platform, “Skynet,” aka “slasky.net,” is already being abused. [FWIW: the page was reported to report@siasky.net] The platform is pretty much a free file hosting platform. You upload an HTML file, which will display at a particular “slasky.net” URL. Like all similar file hosting platforms, it is ready to be abused by phishing scams. Aside from being hosted on this newish platform, the JavaScript used to implement the phishing page is interesting. Not only does it customize the login dialog with the company logo, but it also replaces the entire page with a screenshot of the domain homepage.
http://news.poseidon-us.com/SJXbnW

web3 phishing via self-customizing landing pages, (Mon, Feb 7th)

You may not quite understand what “web3” is all about (I do not claim to do so), but it appears phishers may already use it. At least a particular web3 platform, “Skynet,” aka “slasky.net,” is already being abused. [FWIW: the page was reported to report@siasky.net] The platform is pretty much a free file hosting platform. You upload an HTML file, which will display at a particular “slasky.net” URL. Like all similar file hosting platforms, it is ready to be abused by phishing scams. Aside from being hosted on this newish platform, the JavaScript used to implement the phishing page is interesting. Not only does it customize the login dialog with the company logo, but it also replaces the entire page with a screenshot of the domain homepage.
http://news.poseidon-us.com/SJXbnW

Social engineering: Definition, examples, and techniques

What is social engineering? Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. For example, instead of trying to find a software vulnerability, a social engineer might call an employee and pose as an IT support person, trying to trick the employee into divulging his password. [ Learn what makes these 6 social engineering techniques so effective. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here
http://news.poseidon-us.com/SJWgyg

FinTech Australia appoints new CEO

Following the departure of Rebecca Schot-Guppy.
http://news.poseidon-us.com/SJVkjm