433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

OPM sees increase in federal retirement claims processing time

OPM reported that during July, it took the agency 59 days, on average, to process a federal employee’s retirement package from start to finish. The post OPM sees increase in federal retirement claims processing time first appeared on Federal News Network.
http://news.poseidon-us.com/TMMJvY

Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)

“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace,” Microsoft has announced on Wednesday. The privilege escalation can be performed by exploiting CVE-2025-53786, a newly disclosed vulnerability that stems from Exchange Server and Exchange Online sharing the same service principal – i.e., the Office 365 Exchange Online application – in … More → The post Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786) appeared first on Help Net Security.
http://news.poseidon-us.com/TMMFMq

How to Create a Project Timeline Step by Step

Knowing how to create a project timeline is essential to keeping your project on schedule and delivering results. A timeline helps visualize how work is organized over time, identify key deadlines and ensure every task is completed in the right… Read More The post How to Create a Project Timeline Step by Step appeared first on ProjectManager.
http://news.poseidon-us.com/TMMF9Z

SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls

Akira ransomware affiliates are not leveraging an unknown, zero-day vulnerability in SonicWall Gen 7 firewalls to breach corporate networks, the security vendor shared today. “Instead, there is a significant correlation with threat activity related to CVE-2024-40766, which was previously disclosed and documented in our public advisory.” What happened? Since July 15, 2025, researchers have observed a notable surge in ransomware activity targeting SonicWall firewalls, specifically via their SSL VPN functionality, and posited that the attackers … More → The post SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls appeared first on Help Net Security.
http://news.poseidon-us.com/TMM3f9

The humble printer highlights overlooked security flaws

“You cannot ignore the print infrastructure and expect that malicious bad actors are going to ignore it as well,” HP Chief Technologist for Security Research and Innovation Boris Balacheff said.
http://news.poseidon-us.com/TMLzS2

Top solutions to watch after Black Hat USA 2025

Black Hat USA 2025 was packed with innovation, with companies showing off tools built to get ahead of what’s coming next. From smarter offensive security to new ways of spotting attacks faster, the conference had no shortage of exciting developments. Here are some of the products that stood out and could play a big role in where cybersecurity goes from here. Darwinium launches AI tools to detect and disrupt adversarial threats Darwinium launched Beagle and … More → The post Top solutions to watch after Black Hat USA 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TMLqpJ

Photos: Black Hat USA 2025

Here’s a look inside Black Hat USA 2025. The featured vendors are: Stellar Cyber, Vonahi Security, Gurucul, Check Point, HackerOne, EasyDMARC, Elastic, Google, Tines, Veracode, VioletX, Pentera, Keep Aware, Oleria, SpyCloud, Trend Micro and Picus Security. The post Photos: Black Hat USA 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TMLqm7

Cisco Event Response: Vishing Attack Impacting Third-Party CRM System

On July 24, 2025 (GMT+9), Cisco was made aware of an incident involving a bad actor targeting a Cisco representative through a voice phishing attack, also known as vishing. As a result, the actor was able to access and export a subset of basic profile information from one instance of a third-party, cloud-based Customer Relationship Management (CRM) system that Cisco uses. Security Impact Rating: Critical CVE: CVE
http://news.poseidon-us.com/TMLnPl

Beyond PQC: Building adaptive security programs for the unknown

In this Help Net Security interview, Jordan Avnaim, CISO at Entrust, discusses how to communicate the quantum computing threat to executive teams using a risk-based approach. He explains why post-quantum cryptography (PQC) is an urgent and long-term priority. Avnaim also outlines practical steps CISOs can take to build crypto agility and maintain digital trust. From your perspective as a CISO, how do you frame the quantum computing threat to executives and the board? Complexity can … More → The post Beyond PQC: Building adaptive security programs for the unknown appeared first on Help Net Security.
http://news.poseidon-us.com/TMLjry

Cybercriminals are getting personal, and it’s working

Cybercriminals are deploying unidentifiable phishing kits (58% of phishing sites) to propagate malicious campaigns at scale, indicating a trend towards custom-made or obfuscated deployments, according to VIPRE Security. These phishing kits can’t easily be reverse-engineered, tracked, or caught. AI makes them affordable, too. Among the most prevalent are Evilginx (20%), Tycoon 2FA (10%), 16shop (7%), with another 5% attributed to other generic kits. Manufacturing is the top target sector For the sixth quarter in a … More → The post Cybercriminals are getting personal, and it’s working appeared first on Help Net Security.
http://news.poseidon-us.com/TMLjqz