433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Aegis Authenticator: Free, open-source 2FA app for Android

Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to back up your data. It supports both HOTP and TOTP, so it works with thousands of services. It also allows the export or import from a wide variety of 2FA apps, with support for automatic backups. Aegis Authenticator is available for free on GitHub. Must read: 35 … More → The post Aegis Authenticator: Free, open-source 2FA app for Android appeared first on Help Net Security.
http://news.poseidon-us.com/TLmdDN

New technique detects tampering or forgery of a PDF document

Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s page objects. The technique employs a prototype that can detect changes to a PDF document, such as changes made to the text, images, or metadata. Prototype flow With the PDF format being used as a formal means of communication in multiple industries, it has become a good target for criminals who wish to affect contracts … More → The post New technique detects tampering or forgery of a PDF document appeared first on Help Net Security.
http://news.poseidon-us.com/TLmc0P

Cloud security maintains its position as top spending priority

While most enterprises have integrated cloud resources into their operations, many need to improve their ability to secure these environments and the data they contain, according to Thales. Cloud security challenges go beyond technology The variability of controls across cloud providers, combined with the distinct mindset required for cloud security, continues to challenge security teams. This pressure is only increasing as AI initiatives drive more sensitive data into cloud environments. 64% of respondents ranked cloud … More → The post Cloud security maintains its position as top spending priority appeared first on Help Net Security.
http://news.poseidon-us.com/TLmYtF

ISC Stormcast For Monday, July 7th, 2025 https://isc.sans.edu/podcastdetail/9514, (Mon, Jul 7th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TLmWfF

A few interesting and notable ssh/telnet usernames, (Sun, Jul 6th)

Just looked at our telnet/ssh honeypot data, and found some interesting new usernames that attackers attempted to use:
http://news.poseidon-us.com/TLmGfB