433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Maltrail: Open-source malicious traffic detection system

Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available blacklists, as well as static lists compiled from antivirus reports and user-defined sources. These “trails” can include domain names, URLs, IP addresses, or even HTTP User-Agent values. On top of that, Maltrail can use optional heuristic methods to identify new or unknown threats, such as emerging malware. Maltrail follows a Traffic -> … More → The post Maltrail: Open-source malicious traffic detection system appeared first on Help Net Security.
http://news.poseidon-us.com/TNh2dQ

Building trust in AI-powered security operations

In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He explains how AI’s ability to process vast amounts of data and detect anomalies faster than humans is reshaping how organizations identify and respond to threats. Hodge highlights the explosive growth of machine data, which is projected to drive 55% of all data expansion by 2028, and discusses the need for … More → The post Building trust in AI-powered security operations appeared first on Help Net Security.
http://news.poseidon-us.com/TNh2c0

Clipboard Pictures Exfiltration in Python Infostealer, (Wed, Oct 15th)

For a while, clipboard content has been monitored by many infostealers. Purposes can be multiple, like simply searching and exfiltrating juicy data or on-the-fly modification like crypto-wallet swapping[1]. Note that the clipboard is a major risk when you don't disable clipboard sharing between your virtual machines and hosts. A malware running in a sandbox will access your (host) clipboard without problem!
http://news.poseidon-us.com/TNgzzB

The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components. Study design showing data collection, static security analysis (MobSF, RiskInDroid, OWASP), and sentiment-based review analysis How the study worked The methodology followed three phases: data collection, security and privacy testing, and user experience analysis. To gather the sample, the team used twenty targeted search terms on … More → The post The diagnosis is in: Mobile health apps are bad for your privacy appeared first on Help Net Security.
http://news.poseidon-us.com/TNgy3p

The power grid is getting old, and so is the cybersecurity protecting it

Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, water, and transport are reaching the end of their design life. Old systems, new risks Much of the world’s infrastructure was built between the 1950s and 1970s. In the United States, nearly 70% of the power grid is over 25 years old, and about one third … More → The post The power grid is getting old, and so is the cybersecurity protecting it appeared first on Help Net Security.
http://news.poseidon-us.com/TNgy3M

Case challenging Trump administration’s shutdown layoffs faces a judge

The administration sent RIF notices to more than 4,000 federal employees last week. The post Case challenging Trump administration’s shutdown layoffs faces a judge first appeared on Federal News Network.
http://news.poseidon-us.com/TNgp85

Case challenging Trump administration’s shutdown layoffs faces a judge

The administration sent RIF notices to more than 4,000 federal employees last week. The post Case challenging Trump administration’s shutdown layoffs faces a judge first appeared on Federal News Network.
http://news.poseidon-us.com/TNgnvj

Is it legal to use R&D money to pay troops during shutdown?

“A calculation could have been made that no one’s going to dare object to paying the troops, whether it’s kosher or not,” a former defense official said. The post Is it legal to use R&D money to pay troops during shutdown? first appeared on Federal News Network.
http://news.poseidon-us.com/TNgncM

Patch Tuesday, October 2025 ‘End of 10’ Edition

Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least three vulnerabilities that are already being actively exploited. October’s Patch Tuesday also marks the final month that Microsoft will ship security updates for Windows 10 systems. If you’re running a Windows 10 PC and you’re unable or unwilling to migrate to Windows 11, read on for other options.
http://news.poseidon-us.com/TNgncL