433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Coruna: Spy-grade iOS exploit kit powering financial crime

A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns and, ultimately, ended into the hands of financially motivated hackers, according to new research from Google’s Threat Intelligence Group (GTIG). “The exploit kit, named ‘Coruna’ by its developers, contained five full iOS exploit chains and a total of 23 exploits,” the analysts noted. The exploit list includes both CVE-tracked vulnerabilities … More → The post Coruna: Spy-grade iOS exploit kit powering financial crime appeared first on Help Net Security.
http://news.poseidon-us.com/TRGrbY

9 Free Employee Onboarding Templates for Excel and Word

Bringing someone new into your team is exciting, but without structure, even strong hires can lose momentum fast. The right onboarding templates turn first impressions into clear direction, measurable goals and confident execution. Keep reading to explore practical employee onboarding… Read More The post 9 Free Employee Onboarding Templates for Excel and Word appeared first on ProjectManager.
http://news.poseidon-us.com/TRGjMm

Latin America’s Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence

Latin America’s threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overstretched security teams. Recorded Future provides LATAM-specific intelligence, automation, and seamless integrations to help your team get ahead of threats before they hit.
http://news.poseidon-us.com/TRGj4c

Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

Fig Security, a new platform that finds and fixes broken security flows across your entire SecOps infrastructure, has launched from stealth with $38 million across Seed and Series A rounds. It addresses one of the least visible challenges yet most consequential in enterprise security: the quiet breakdown of security operations as environments grow more complex. The round is backed by Team8 and Ten Eleven Ventures, alongside a group of prominent security leaders. Enterprises pour billions … More → The post Fig Security emerges from stealth with $38 million to resilience-proof enterprise security appeared first on Help Net Security.
http://news.poseidon-us.com/TRGggk

Threat actors weaponize OAuth redirection logic to deliver malware

An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have revealed. The attackers are targeting government and public-sector organizations, and redirecting unsuspecting users from trusted login pages to their own infrastructure, to serve malware or capture login credentials. The attack, from the victim’s perspective The OAuth authentication redirection mechanism is a trusted login feature used by Microsoft, Google and others. It allows users … More → The post Threat actors weaponize OAuth redirection logic to deliver malware appeared first on Help Net Security.
http://news.poseidon-us.com/TRGggb

Cloudflare tracked 230 billion daily threats and here is what it found

Cloudflare’s network blocks over 230 billion threats per day. The volume indicates how routine and automated the attack cycle has become, and the patterns behind that volume point to a shift in how breaches begin and progress. Cloudflare’s threat research unit, Cloudforce One, published its inaugural cyber threat report 2026, covering activity observed through 2025 and projecting into the year ahead. The report draws on telemetry from Cloudflare’s network, which handles roughly 20% of global … More → The post Cloudflare tracked 230 billion daily threats and here is what it found appeared first on Help Net Security.
http://news.poseidon-us.com/TRGgfw

TSP funds mostly positive in February

The C Fund was the only account that came in negative, losing 0.76% as compared to January. For the year, all funds are in the black.
http://news.poseidon-us.com/TRGfyc

Josys centralizes identity data to replace manual IT oversight with automated governance

Josys has transitioned into an autonomous identity governance platform, expanding beyond traditional SaaS management. The enhanced platform empowers IT leaders and managed service providers (MSPs) to scale governance and compliance efforts by centralizing identity data within a single, AI-driven system. With Verizon reporting that 80% of hacking breaches stem from compromised credentials, identity is the ultimate attack surface. As threats and costly non-compliance penalties surge, organizations can no longer rely on manual IT oversight. Autonomous … More → The post Josys centralizes identity data to replace manual IT oversight with automated governance appeared first on Help Net Security.
http://news.poseidon-us.com/TRGbt1

$100 radio equipment can track cars through their tire sensors

When people consider what might track their movements, they think of smartphone apps, GPS services, or roadside cameras. The tires of a new car rarely enter that equation. Researchers at IMDEA Networks Institute, together with European partners, found that Tire Pressure Monitoring System (TPMS) sensors inside each wheel broadcast unencrypted wireless signals containing persistent identifiers. Each sensor sends out a unique ID that does not change, allowing the same car to be recognized again and … More → The post $100 radio equipment can track cars through their tire sensors appeared first on Help Net Security.
http://news.poseidon-us.com/TRGbt0