433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Automated Tools to Assist with DShield Honeypot Investigations [Guest Diary], (Wed, Jun 11th)

[This is a Guest Diary by William Constantino, an ISC intern as part of the SANS.edu BACS program]
http://news.poseidon-us.com/TLK0LD

Lemony mitigates privacy and compliance risks associated with cloud-based AI

Lemony announced its on-premise artificial intelligence solution that is redefining how organizations deploy generative AI. Lemony’s secure, hardware-based node offers enterprise-grade ‘AI in a Box,’ empowering companies to run advanced, end-to-end AI workflows privately, instantly, and without cloud dependence. Lemony’s AI nodes are stackable and scalable, creating small, modular AI compute clusters that support seamless expansion across users. Lemony can host the entire technology stack, from foundation models to lightweight, use-case specific adapters and specialized … More → The post Lemony mitigates privacy and compliance risks associated with cloud-based AI appeared first on Help Net Security.
http://news.poseidon-us.com/TLJdgT

Nudge Security’s browser extension monitors real-time SaaS and GenAI activity

Nudge Security announced today a new browser extension for its SaaS and AI security governance solution that detects identity risks and guides employees toward safe, compliant SaaS and AI use in real time. Modern work happens at theWorkforce Edge, where employees make daily, independent decisions about what SaaS and generative AI apps to adopt, what data to share, and who and what gets access—outside the bounds of traditional IT security perimeters and controls. Since 2022, … More → The post Nudge Security’s browser extension monitors real-time SaaS and GenAI activity appeared first on Help Net Security.
http://news.poseidon-us.com/TLJdft

Cybercriminals are turning stolen data into a thriving black market

Cybercriminals are stealing data and running full-scale businesses around it. Europol’s latest Internet Organised Crime Threat Assessment (IOCTA) report reveals how personal data is now a core currency in the underground economy. Data is the product Cybercriminals go after everything from login credentials to credit card numbers, medical records, and social media accounts. The data criminals collect helps them access accounts, impersonate users, or sell that access to others. Europol stresses that access to an … More → The post Cybercriminals are turning stolen data into a thriving black market appeared first on Help Net Security.
http://news.poseidon-us.com/TLJdfh

Want fewer security fires to fight? Start with threat modeling

CISOs understand that threat modeling helps teams identify risks early and build safer systems. But outside the security org, the value isn’t always clear. When competing for budget or board attention, threat modeling often loses out to more visible efforts like new tools or headline-driven response plans. The problem isn’t the practice. It’s the framing. To win support, CISOs need to show how threat modeling connects to bottom-line outcomes: fewer vulnerabilities, faster incident response, and … More → The post Want fewer security fires to fight? Start with threat modeling appeared first on Help Net Security.
http://news.poseidon-us.com/TLJZBB

Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3 XL. It’s called the NetHunter C-deck, and it packs serious functionality into a small, 3D-printed shell. NetHunter C-deck v2.1.0 The phone runs Kali NetHunter using a custom kernel, Magisk, and TWRP. Once set up, it acts like a mobile Linux box, ready for wireless attacks, network scans, or field diagnostics. What it offers: Portable power: … More → The post Build a mobile hacking rig with a Pixel and Kali NetHunter appeared first on Help Net Security.
http://news.poseidon-us.com/TLJZB6

CISOs call for operational threat intelligence integration

98% of CISOs face challenges when using threat intelligence, according to Trellix. The biggest problems are keeping up with changing threats, integration difficulties, and regulatory rules. As a result, threat intelligence defaults to a reactive function within a workstream, rather than an embedded, proactive strategy to build resilience, accelerate response, and stay ahead of threats. “Global threat detection volume from APT actors rose 45% at the beginning of this year, and CISOs are now tasked … More → The post CISOs call for operational threat intelligence integration appeared first on Help Net Security.
http://news.poseidon-us.com/TLJZ9H

Email security risks healthcare IT can’t afford to ignore

92% of healthcare IT leaders say they’re confident in their ability to prevent email-based data breaches, but according to Paubox, they’re not. Healthcare compliance confidence gap Email remains one of the biggest security risks in healthcare. Outdated systems and frustrating tools often lead staff to bypass security measures, leaving patient data exposed. Despite their confidence, many healthcare IT leaders admit they’re uncertain about HIPAA compliance. A deeper issue is the gap between security goals and … More → The post Email security risks healthcare IT can’t afford to ignore appeared first on Help Net Security.
http://news.poseidon-us.com/TLJXGh

44% of mobile users encounter scams every day

Nearly half of of mobile users encounter mobile scams daily, with people in the US and UK more likely to be targeted than those in other regions, according to Malwarebytes. Most users say it’s hard to tell a scam from something real, and very few feel confident in spotting one. Younger generations, like Gen Z and Millennials, are the most exposed. They’re more likely to see scams regularly compared to older users. No channel is … More → The post 44% of mobile users encounter scams every day appeared first on Help Net Security.
http://news.poseidon-us.com/TLJXGW

ISC Stormcast For Thursday, June 12th, 2025 https://isc.sans.edu/podcastdetail/9490, (Thu, Jun 12th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TLJVMJ