433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

BloodHound 8.0 debuts with major upgrades in attack path management

SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major advancement in identity attack path management that uncovers attack paths across the entire technology stack. It enables users to ingest data from diverse systems such as GitHub, Snowflake, and Microsoft SQL Server and build tailored threat models that reflect their environments. “To date, most of … More → The post BloodHound 8.0 debuts with major upgrades in attack path management appeared first on Help Net Security.
http://news.poseidon-us.com/TMJWCl

Your employees uploaded over a gig of files to GenAI tools last quarter

In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings confirm that sensitive data is being exposed through GenAI tools, something many security leaders fear but find difficult to measure. Distribution of file types uploaded to GenAI tools in Q2 2025 (Source: Harmonic Security) Enterprises use 23 New GenAI tools per quarter on average Of these numbers, 22% of files … More → The post Your employees uploaded over a gig of files to GenAI tools last quarter appeared first on Help Net Security.
http://news.poseidon-us.com/TMJRbT

Back to basics webinar: The ecosystem of CIS Security best practices

Generative AI models, multi-cloud strategies, Internet of Things devices, third-party suppliers, and a growing list of regulatory compliance obligations all require the same security response: come together as a community to prioritize the basics. Watch this on-demand webinar to understand how you can use an ecosystem of security best practices built by the Center for Internet Security (CIS) to support this mission. By the end of the webinar, you’ll learn: How CIS security best practices … More → The post Back to basics webinar: The ecosystem of CIS Security best practices appeared first on Help Net Security.
http://news.poseidon-us.com/TMJRZ8

Ransomware groups shift to quadruple extortion to maximize pressure

Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach, according to Akamai. Ransomware extortion tactics (Source: Akamai) The emerging trend of quadruple extortion includes using DDoS attacks to disrupt business operations and harassing third parties, like customers, partners, and media, to increase the pressure on the victim. It builds on double extortion ransomware in which attackers encrypt a victim’s data and threaten to leak … More → The post Ransomware groups shift to quadruple extortion to maximize pressure appeared first on Help Net Security.
http://news.poseidon-us.com/TMJRWW

Cybersecurity jobs available right now: August 5, 2025

CW – OT Security Officer SSE | United Kingdom | On-site – View job details As a CW – OT Security Officer, you will lead and prioritise a programme of security audits and assurance to identify vulnerabilities within existing controls. You will monitor and audit supply chain to ensure security requirements are included within contracts and that suppliers deliver against these commitments. Cyber Security Architect (Application Security) ASIC | Australia | Hybrid – View job … More → The post Cybersecurity jobs available right now: August 5, 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TMJPwQ

ISC Stormcast For Tuesday, August 5th, 2025 https://isc.sans.edu/podcastdetail/9556, (Tue, Aug 5th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TMJM4V