433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Submarine Cables Face Increasing Threats Amid Geopolitical Tensions and Limited Repair Capacity

Explore the rising threats to global submarine cable networks amid escalating geopolitical tensions, sabotage incidents, and limited repair capacity. Discover essential resilience strategies and risk mitigation measures.
http://news.poseidon-us.com/TLyt6x

Stellar Cyber enhances identity security with ITDR capabilities

At the upcoming Black Hat USA 2025 in Las Vegas, Stellar Cyber will debut its Identity Threat Detection & Response (ITDR) capabilities, fully embedded into its open, unified, AI-driven SecOps platform. See Identity Threat Detection & Response (ITDR) capabilities in action at Booth 5642, August 2–7, 2025, or book your meeting here. ITDR marks a step forward on the journey to a human-augmented autonomous SOC, empowering security teams with identity-centric visibility and control—without requiring yet … More → The post Stellar Cyber enhances identity security with ITDR capabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TLyrZK

Salt Typhoon hackers compromise a state’s Army National Guard network

The group has been connected to intrusions into U.S. mobile networks and the hacking of dozens of high-profile U.S. officials. The post Salt Typhoon hackers compromise a state’s Army National Guard network first appeared on Federal News Network.
http://news.poseidon-us.com/TLyq8J

Salt Typhoon hackers compromise a state’s Army National Guard network

The group has been connected to intrusions into U.S. mobile networks and the hacking of dozens of high-profile U.S. officials. The post Salt Typhoon hackers compromise a state’s Army National Guard network first appeared on Federal News Network.
http://news.poseidon-us.com/TLypqB

Review: Passwork 7.0, self-hosted password manager for business

Over the years, the number of services we use has exploded, and so has the need to protect our credentials. Back in what I like to call “the age of innocence,” we scribbled passwords on paper or reused “password123” across five different accounts. Let’s be honest: those days are over. Whether we like it or not, password managers have become essential to good cybersecurity hygiene and one of the first lines of defense against unauthorized … More → The post Review: Passwork 7.0, self-hosted password manager for business appeared first on Help Net Security.
http://news.poseidon-us.com/TLykmv

Socure Workforce Verification detects manipulated or fabricated identities

Socure launched Workforce Verification solution to address the growing threat of employee fraud. Socure’s Workforce Verification adapts its enterprise-grade identity verification and fraud prevention specific to hiring workflows, detecting manipulated or fabricated identities before they enter organizations and addressing workforce risk at its source: identity. “Identity fraud is no longer confined to the consumer realm, it’s infiltrating the workforce at an accelerating rate and has become a foundational risk to cybersecurity, compliance, and organizational trust … More → The post Socure Workforce Verification detects manipulated or fabricated identities appeared first on Help Net Security.
http://news.poseidon-us.com/TLydG4

Legit Security delivers automated security reviews for AppSec and development teams

Legit Security announced enhanced capabilities for significant code change and workflow orchestration within its platform. These capabilities provide insight into changes in code, configuration, or infrastructure that can impact an application’s security or compliance posture. With visibility into where everyday code changes are occurring and the appropriate workflows to resolve them, AppSec and development teams can overcome the challenges of disconnected tool sprawl, duplicate alerts, remediation without context, and hidden or unnoticed code. Detecting, documenting, … More → The post Legit Security delivers automated security reviews for AppSec and development teams appeared first on Help Net Security.
http://news.poseidon-us.com/TLydDF

Akeyless SecretlessAI protects machine-to-machine communication

Akeyless has launched Akeyless SecretlessAI, a solution purpose-built to secure AI agents and Model Context Protocol (MCP) servers. As enterprises accelerate AI adoption, these autonomous systems are increasingly entrusted with accessing sensitive data, APIs, and internal tools to fulfill their tasks. This shift demands a new security paradigm — one that protects machine-to-machine communication at scale, without compromising agility or trust. AI agents now operate in dynamic, distributed environments and frequently act on behalf of … More → The post Akeyless SecretlessAI protects machine-to-machine communication appeared first on Help Net Security.
http://news.poseidon-us.com/TLydBj

Hiding Payloads in Linux Extended File Attributes, (Thu, Jul 17th)

This week, it's SANSFIRE[1]! I'm attending the FOR577[2] training (“Linux Incident Response & Threat Hunting”). On day 2, we covered the different filesystems and how data is organized on disk. In the Linux ecosystem, most filesystems (ext3, ext4, xfs, …) support “extended file attributes”, also called “xattr”. It's a file system feature that enables users to add metadata to files. These data is not directly made available to the user and may contain anything related to the file (ex: the author's name, a brief description, …). You may roughly compare this feature to the Alternate Data Stream (ADS) available in the Windows NTFS filesystem.
http://news.poseidon-us.com/TLyd0B