433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)

Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a “very limited” number of customers, Ivanti has confirmed on Tuesday, and urged customers to install a patch as soon as possible. “The investigation is ongoing and Ivanti does not have reliable atomic indicators [of compromise] at this time. Customers should reach out to our Support Team for guidance,” the company said. CVE-2025-4427 and CVE-2025-4428 The exploited vulnerabilities … More → The post Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428) appeared first on Help Net Security.
http://news.poseidon-us.com/TKl8t4

Robotic hand moves objects with human-like grasp

A robotic hand can pick up 24 different objects with human-like movements that emerge spontaneously, thanks to compliant materials and structures rather than programming.
http://news.poseidon-us.com/TKl74l

AI meets the conditions for having free will — we need to give it a moral compass

AI is advancing at such speed that speculative moral questions, once the province of science fiction, are suddenly real and pressing, says a philosopher and psychology researcher Frank Martela. Martela’s latest study finds that generative AI meets all three of the philosophical conditions of free will — the ability to have goal-directed agency, make genuine choices and to have control over its actions. This development brings us to a critical point in human history, as we give AI more power and freedom, potentially in life or death situations.
http://news.poseidon-us.com/TKl73R

When it comes to protecting federal employees, she’s done it all

“Good agency reps know the benefits come from having one unified, legally binding voice,” said Susan Tsui Grundmann. The post When it comes to protecting federal employees, she’s done it all first appeared on Federal News Network.
http://news.poseidon-us.com/TKl6rc

GSA expands efforts to reshape federal consulting contracts

GSA says it already identified as much as $33 billion in savings or avoidance from the first set of consultant contractors. The post GSA expands efforts to reshape federal consulting contracts first appeared on Federal News Network.
http://news.poseidon-us.com/TKl5qR

Tufin TOS Discovery automates device discovery and onboarding

Tufin launched Tufin Orchestration Suite (TOS) Discovery, a new solution that helps security teams ensure their network topology is always accurate and up-to-date. Maintaining up-to-date network topology is a crucial task – one that enables proper enforcement of security policies and access validation – and is critical for mitigating vulnerabilities and troubleshooting issues. Despite its importance in establishing and maintaining a safe and secure enterprise network environment, it is traditionally a manual, time-consuming task that … More → The post Tufin TOS Discovery automates device discovery and onboarding appeared first on Help Net Security.
http://news.poseidon-us.com/TKkwWC

Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources

Lenovo introduced ThinkShield Solutions, security offerings tailored to protect small and medium sized business (SMBs), schools, and other organizations with limited IT resources facing significant risks. The new offering is part of Lenovo ThinkShield’s portfolio of enterprise-grade cybersecurity solutions. Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. The majority of reported cyberattacks are directed towards SMBs, with average costs per incident … More → The post Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources appeared first on Help Net Security.
http://news.poseidon-us.com/TKkwVN

Product showcase: Go beyond VPNs and Tor with NymVPN

If you care about online privacy, you probably already know: Centralized VPNs and even Tor aren’t enough anymore. Traditional VPNs require you to trust a single company with your internet activity. Even if they promise “no logs,” you’re still handing over the keys to your digital life to a third party. If they’re compromised — or forced by authorities — they can expose your information. And decentralized VPNs? While better, they mostly focus on distributing … More → The post Product showcase: Go beyond VPNs and Tor with NymVPN appeared first on Help Net Security.
http://news.poseidon-us.com/TKksJG

The limitations of AI in chip manufacturing

Leaders from Intel, EMD and GlobalFoundries discussed the challenges they see as the semiconductor industry adapts artificial intelligence to get results faster.
http://news.poseidon-us.com/TKkhn7

CISOs must speak business to earn executive trust

In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, communicate risk in business terms, and use automation to support business goals. What do business leaders most often misunderstand about the CISO’s role, and how can security leaders correct those perceptions? Too often, business leaders view cybersecurity solely as a defensive function that can slow innovation when in … More → The post CISOs must speak business to earn executive trust appeared first on Help Net Security.
http://news.poseidon-us.com/TKkXQG