433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’

The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor’s high-speed Internet connection in the United States. This post examines the history and provenance of DSLRoot, one of the oldest “residential proxy” networks with origins in Russia and Eastern Europe.
http://news.poseidon-us.com/TMhq5k

TAG-144’s Persistent Grip on South American Organizations

Persistent cyber operations by TAG-144 (Blind Eagle) continue to target South American, primarily Colombian, government entities through advanced spearphishing and RAT-based malware campaigns. Explore the latest threat clusters, TTPs, and mitigation strategies.
http://news.poseidon-us.com/TMhpRf

Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)

CVE-2025-48384, a recently patched vulnerability in the popular distributed revision control system Git, is being exploited by attackers. Details about the attacks are not public, but the confirmation of exploitation comes from the US Cybersecurity and Infrastructure Security Agency (CISA), which added the flaw to its Known Exploited Vulnerabilities catalog on Monday. About CVE-2025-48384 “[CVE-2025-48384] stems from a mismatch in how Git reads versus writes configuration values containing control characters,” DataDog researchers explained. “The vulnerability … More → The post Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384) appeared first on Help Net Security.
http://news.poseidon-us.com/TMhj59

CISA’s new SBOM update reflects steady rise in adoption

CISA’s draft SBOM minimum elements guide provides agencies with an updated outline for how to use the software ingredients lists. The post CISA’s new SBOM update reflects steady rise in adoption first appeared on Federal News Network.
http://news.poseidon-us.com/TMhgWM

CISA’s new SBOM update reflects steady rise in adoption

CISA’s draft SBOM minimum elements guide provides agencies with an updated outline for how to use the software ingredients lists. The post CISA’s new SBOM update reflects steady rise in adoption first appeared on Federal News Network.
http://news.poseidon-us.com/TMhgTh

Federal Executive Forum 5G Strategies in Government Progress and Best Practices 2025

5G continues to reshape how agencies fulfill their missions—introducing new efficiencies, tactical edge capabilities, and resilience. How are government leaders utilizing emerging capabilities—like 5G—to transform the federal IT landscape? During this webinar, you will gain… The post Federal Executive Forum 5G Strategies in Government Progress and Best Practices 2025 first appeared on Federal News Network.
http://news.poseidon-us.com/TMhg1R

Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO

Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in smart fleets to defending against advanced persistent threats, protecting the agricultural supply chain requires a layered, collaborative approach. In this Help Net Security interview, Carl Kubalsky, Director and Deputy CISO at John Deere discusses the most pressing security challenges in agriculture, how his team is working with partners and ethical hackers to stay ahead of … More → The post Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO appeared first on Help Net Security.
http://news.poseidon-us.com/TMhRLT

The energy sector has no time to wait for the next cyberattack

The energy sector remains a major target for cybercriminals. Beyond disrupting daily routines, a power outage can undermine economic stability and public safety. Rising demand for electricity, fueled by technology and digital growth, only adds to the sector’s vulnerability. A major driver of that demand is artificial intelligence: Goldman Sachs predicts that data center power consumption could rise by 160% by 2030, as AI’s enormous energy appetite strains already fragile grids. From blackouts to breaches … More → The post The energy sector has no time to wait for the next cyberattack appeared first on Help Net Security.
http://news.poseidon-us.com/TMhNPL

LLMs at the edge: Rethinking how IoT devices talk and act

Anyone who has set up a smart home knows the routine: one app to dim the lights, another to adjust the thermostat, and a voice assistant that only understands exact phrasing. These systems call themselves smart, but in practice they are often rigid and frustrating. A new paper by Alakesh Kalita, IEEE Senior Member, suggests a different path. By combining LLMs with IoT networks at the edge, devices could respond to natural language commands in … More → The post LLMs at the edge: Rethinking how IoT devices talk and act appeared first on Help Net Security.
http://news.poseidon-us.com/TMhNPG