433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

SystemRescue 13 updates its kernel to Linux 6.18 LTS, adds new recovery tools

Bootable Linux recovery environments occupy a specific niche in the systems administration and incident response toolkit. SystemRescue, an Arch-based live distribution built for repairing unbootable systems and recovering data from damaged drives, has shipped version 13.00 with a new long-term supported kernel, updated storage tools, and several additions to its command-line toolset. Kernel and storage updates The release moves to Linux 6.18.20, the current long-term supported kernel series. For a recovery distribution that needs to … More → The post SystemRescue 13 updates its kernel to Linux 6.18 LTS, adds new recovery tools appeared first on Help Net Security.
http://news.poseidon-us.com/TRmhxJ

Why risk alone doesn’t get you to yes

I have been in security rooms for years, from military operations centers to corporate boardrooms. In all those years I can tell you that the hardest mission that most security leaders will face is not identifying a threat, but getting someone to act on it. We’re trained to see exposure before they are identified by others. We continually assess likely threats, evaluate impact, and design controls to prevent disruption long before it reaches operations or … More → The post Why risk alone doesn’t get you to yes appeared first on Help Net Security.
http://news.poseidon-us.com/TRmbFL

ShipSec Studio brings open-source workflow orchestration to security operations

Security teams have long relied on a mix of shell scripts, cron jobs, and loosely connected tools to chain reconnaissance and vulnerability scanning work together. ShipSec Studio, an open-source security workflow automation platform from ShipSec AI, aims to replace that arrangement with a dedicated orchestration layer built specifically for security operations. What the platform does ShipSec Studio provides a visual, no-code workflow builder that lets operators connect security tools into automated pipelines without writing glue … More → The post ShipSec Studio brings open-source workflow orchestration to security operations appeared first on Help Net Security.
http://news.poseidon-us.com/TRmXB0

Breaking out: Can AI agents escape their sandboxes?

Container sandboxes are part of routine AI agent testing and deployment. Agents use them to run code, edit files, and interact with system resources without direct access to the host. The SandboxEscapeBench benchmark, developed by researchers at the University of Oxford and the AI Security Institute, evaluates whether an agent with shell access can escape a container and reach the host system. Evaluation architecture and scenario taxonomy (Source: AI Security Institute) What SandboxEscapeBench measures SandboxEscapeBench … More → The post Breaking out: Can AI agents escape their sandboxes? appeared first on Help Net Security.
http://news.poseidon-us.com/TRmX8L

Don’t count on government guidance after a smart home breach

People are filling their homes with internet-connected cameras, speakers, locks, and routers. When one of those devices is compromised, the next steps are often unclear. Researchers reviewing government cybersecurity advice in 11 countries found that most guidance focuses on prevention, leaving households with limited support after a breach. The analysis covers Australia, Austria, Canada, Finland, France, Germany, Japan, New Zealand, Singapore, the United Kingdom, and the United States. Prevention advice is widely available Government agencies … More → The post Don’t count on government guidance after a smart home breach appeared first on Help Net Security.
http://news.poseidon-us.com/TRmWVZ

DShield (Cowrie) Honeypot Stats and When Sessions Disconnect, (Mon, Mar 30th)

A lot of the information seen on DShield honeypots [1] is repeated bot traffic, especially when looking at the Cowrie [2] telnet and SSH sessions. However, how long a session lasts, how many commands are run per session and what the last commands run before a session disconnects can vary. Some of this information could help indicate whether a session is automated and if a honeypot was fingerprinted. This information can also be used to find more interesting honeypot sessions.
http://news.poseidon-us.com/TRmQQg