433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Fortinet enhances FortiAnalyzer to deliver accelerated threat hunting and incident response

Fortinet announced significant enhancements to FortiAnalyzer, reinforcing its role in driving faster, smarter security operations (SecOps)—all from a single, turnkey hybrid platform tailored for mid-sized enterprises and teams impacted by the cyber skills shortage. FortiAnalyzer offers a powerful, streamlined entry point to scale an organization’s security operations center (SOC), providing broad coverage for both on-premises and cloud environments from a single platform. With ready-to-deploy capabilities that deliver complete control with centralized visibility, advanced threat detection, … More → The post Fortinet enhances FortiAnalyzer to deliver accelerated threat hunting and incident response appeared first on Help Net Security.
http://news.poseidon-us.com/TJ47FF

CardinalOps expands Threat Exposure Management platform

CardinalOps announced new enhancements to its Threat Exposure Management platform. The newly launched platform provides security teams with better visibility, smarter prioritization, and consistent workflows to address exposures and proactively reduce the risk of a breach. With this expansion, CardinalOps is building on their success with optimizing detection rules and controls for SIEM and SOC tools, and is now able to provide unified visibility across the security stack to uncover hidden exposures and gaps and automatically … More → The post CardinalOps expands Threat Exposure Management platform appeared first on Help Net Security.
http://news.poseidon-us.com/TJ44Np

Echoworx launches Manage Your Own Keys feature powered by AWS

Echoworx has unveiled its “Manage Your Own Keys” (MYOK) feature, powered by AWS Key Management Service (AWS KMS), an Amazon Web Services (AWS) service. This solution gives businesses greater control over sensitive data by allowing them to generate, manage, and secure their own encryption keys. The launch addresses growing concerns over data sovereignty and unauthorized access, empowering organizations to protect their information from cyber threats, unauthorized parties, and even service providers. Built on AWS KMS, … More → The post Echoworx launches Manage Your Own Keys feature powered by AWS appeared first on Help Net Security.
http://news.poseidon-us.com/TJ44LN

Where confidential computing fits in the enterprise data strategy

The computing framework shields data privacy while in storage, transit or use – helping businesses reduce the risks involved in data sharing.
http://news.poseidon-us.com/TJ3tyk

Edge Delta Security Data Pipelines mitigates security threats

Edge Delta announced its Security Data Pipelines. This solution empowers security teams to process, analyze, and act on security data faster and more efficiently than ever before. By enabling real-time data processing and enrichment, Edge Delta’s Security Data Pipelines transform how organizations detect, respond to, and mitigate security threats across complex environments. The Security Data Pipelines provide a foundational, scalable framework for standardizing, enriching, and streaming security data from a wide array of data sources … More → The post Edge Delta Security Data Pipelines mitigates security threats appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3pBm

Pangea introduces AI guardrails to secure AI applications

Pangea announced AI Guard and Prompt Guard to secure AI, defending against threats like prompt injection and sensitive information disclosure. Alongside the company’s existing AI Access Control and AI Visibility products, Pangea now offers comprehensive suite of guardrails to secure AI applications. “As companies race to build and deploy AI apps via RAG and agentic frameworks, integrating LLMs with users and sensitive data introduces substantial security risks,” said Oliver Friedrichs, CEO of Pangea. “New attacks … More → The post Pangea introduces AI guardrails to secure AI applications appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3kJP

Attackers are chaining flaws to breach Palo Alto Networks firewalls

Exploitation attempts targeting CVE-2025-0108, a recently disclosed authentication bypass vulnerability affecting the management web interface of Palo Alto Networks’ firewalls, are ramping up. “GreyNoise now sees 25 malicious IPs actively exploiting CVE-2025-0108, up from 2 on February 13,” the threat intelligence company shared on Tuesday. “This high-severity flaw allows unauthenticated attackers to execute specific PHP scripts, potentially leading to unauthorized access to vulnerable systems.” CVE-2025-0108 + CVE-2024-9474 and/or CVE-2025-0111 Palo Alto Networks has updated the … More → The post Attackers are chaining flaws to breach Palo Alto Networks firewalls appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3kHP

Veeam brings recovery orchestrator to Microsoft Hyper-V customers

Veeam Software announced it’s bringing recovery orchestrator to Microsoft Hyper-V customers as part of the Veeam Data Platform. Veeam Recovery Orchestrator simplifies and automates the disaster recovery planning, testing, and execution process. It allows organizations to create, manage, and test disaster recovery plans in a streamlined manner, ensuring quick and effective recovery of their data when an outage or disaster strikes. Building on Veeam Data Platform’s cyber resilience—malware scanning, IoC detection, and proactive threat scanning—enhanced … More → The post Veeam brings recovery orchestrator to Microsoft Hyper-V customers appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3kFM

XWorm Cocktail: A Mix of PE data with PowerShell Code, (Wed, Feb 19th)

While hunting, I spent some time trying to deobfuscate a malicious file discovered on VT. It triggered my PowerShell rule. At the end, I found two files that look close together:
http://news.poseidon-us.com/TJ3gSW