433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016)

Two Mirai botnets are exploiting a critical remote code execution vulnerability (CVE-2025-24016) in the open-source Wazuh XDR/SIEM platform, Akamai researchers have warned. What is Wazuh? Wazuh is a popular open-source security information and event management (SIEM) and extended detection and response (XDR) solution that’s widely used for host-based intrusion detection, log analysis, file integrity monitoring, and more. It’s core components are: Wazuh Manager (server component), which analyzes data and triggers alerts. Made to be installed … More → The post Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016) appeared first on Help Net Security.
http://news.poseidon-us.com/TLGcH3

Cymulate streamlines threat detection with AI-powered detection engineering assistant

Cymulate releaseed AI-powered detection engineering assistant for security information and event management (SIEM) rule threat coverage validation. Now, the Cymulate Platform automates and streamlines the detection engineering process for blue teams and SecOps, allowing them to build, test and optimize threat detection with AI-assisted live-data attack simulations and customized threat detection. With this launch, Cymulate eliminates the friction of manual detection validation by automating the correlation and testing process, answering the two most important questions … More → The post Cymulate streamlines threat detection with AI-powered detection engineering assistant appeared first on Help Net Security.
http://news.poseidon-us.com/TLGWF4

Thales File Activity Monitoring enhances enterprise control over unstructured data

Thales launched Thales File Activity Monitoring, a new capability within the Thales CipherTrust Data Security Platform that enhances enterprise visibility and control over unstructured data, enabling organizations to monitor file activity in real time, detect misuse, and ensure regulatory compliance across their entire data estate. As the only integrated platform provider that secures structured and unstructured data, Thales provides comprehensive monitoring and auditability for data types that were previously difficult to track. File Activity Monitoring … More → The post Thales File Activity Monitoring enhances enterprise control over unstructured data appeared first on Help Net Security.
http://news.poseidon-us.com/TLGWDn

Patero CryptoQoR mitigates risks associated with quantum attacks

Patero launched CryptoQoR, a new crypto-agile software module that establishes secure communication channels and proactively mitigates security risks using hybrid post-quantum encryption. The solution can be readily deployed into existing infrastructure to improve current cryptographic protection and immediately remediate risks associated with quantum attacks. The post-quantum cryptography (PQC) market is projected to grow from $302.5 million in 2024 to $1,887.9 million by 2029. The approach to “Q-day,” the day when quantum computers can be used … More → The post Patero CryptoQoR mitigates risks associated with quantum attacks appeared first on Help Net Security.
http://news.poseidon-us.com/TLGWC5

Black Kite unveils AI-powered cyber assessments

Black Kite announced AI-powered cyber assessments, an automated solution for streamlining third-party cyber risk assessments. With its automation-led approach, Black Kite is redefining how enterprises assess risk across their vendor ecosystems to make informed decisions and bring cyber resilience to their supply chain. “Managing cyber ecosystem risks is complex, and all too often, enterprises are further challenged by cyber assessment processes that do not work in today’s environment,” said Chuck Schauber, CPO, Black Kite. “In … More → The post Black Kite unveils AI-powered cyber assessments appeared first on Help Net Security.
http://news.poseidon-us.com/TLGW9X

The legal questions to ask when your systems go dark

At Span Cyber Security Arena, I sat down with Iva Mišković, Partner at the ISO-certified Mišković & Mišković law firm, to discuss the role of legal teams during cyber incidents. She shared why lawyers should assume the worst, coordinate quickly, and ask the right questions to support IT. Mišković explained that a legal strategy, built on understanding tech workflows, helps lawyers build trust with CISOs and respond to cyber threats. Every cyber incident should be … More → The post The legal questions to ask when your systems go dark appeared first on Help Net Security.
http://news.poseidon-us.com/TLGNT2

AI threats leave SecOps teams burned out and exposed

Security teams are leaning hard into AI, and fast. A recent survey of 500 senior cybersecurity pros at big U.S. companies found that 86% have ramped up their AI use in the past year. The main reason? They’re trying to keep up with a surge in AI-powered attacks. But even as AI tools help with tasks like threat detection and data analysis, the pressure on security teams is getting worse. Nearly 70% of respondents say … More → The post AI threats leave SecOps teams burned out and exposed appeared first on Help Net Security.
http://news.poseidon-us.com/TLGNRP