433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Behind the Curtain: How Lumma Affiliates Operate

Explore a groundbreaking investigation into Lumma affiliates: uncover their tools, tactics, scams, and integration in the cybercriminal ecosystem. Essential reading for defenders.
http://news.poseidon-us.com/TMbGw6

Immature data strategies threaten enterprise AI plans

Executives rate their organization’s data maturity 12% higher than those working in the environment daily, according to an Actian survey.
http://news.poseidon-us.com/TMb5RD

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)

A working exploit concatenating two critical SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) that have been previously exploited in the wild has been made public by VX Underground, Onapsis security researchers have warned. The exploit has allegedly been released on a Telegram channel that claimed to represent a collective of three established cybercrime groups: Scattered Spider, ShinyHunters, and LAPSUS$. Historical exploitation of CVE-2025-31324 Earlier this year, a suspected initial access broker group abused CVE-2025-31324 – a missing … More → The post Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999) appeared first on Help Net Security.
http://news.poseidon-us.com/TMb4xx

Javelin MCP Security protects agentic systems and AI‑enabled applications

Javelin announced MCP Security, a defense-in-depth solution for the Model Context Protocol (MCP), the connective tissue between AI assistants, tools, and enterprise data. The release combines Javelin Ramparts, an MCP scanner, with Javelin MCP Runtime Guardrails for real-time policy enforcement at the tool and data boundary. As enterprises accelerate agentic AI, adversaries are shifting to agent hijacking and indirect prompt injection—malicious instructions hidden in business content or third-party data that drive unintended actions. Recent demonstrations … More → The post Javelin MCP Security protects agentic systems and AI‑enabled applications appeared first on Help Net Security.
http://news.poseidon-us.com/TMZy4G

The 6 challenges your business will face in implementing MLSecOps

Organizations that don’t adapt their security programs as they implement AI run the risk of being exposed to a variety of threats, both old and emerging ones. MLSecOps addresses this critical gap in security perimeters by combining AI and ML development with rigorous security guidelines. Establishing a robust MLSecOps foundation is essential for both proactively mitigating vulnerabilities and simplifying the remediation of previously undiscovered flaws. AI/ML systems must remain trustworthy, resilient, and secure. MLSecOps can … More → The post The 6 challenges your business will face in implementing MLSecOps appeared first on Help Net Security.
http://news.poseidon-us.com/TMZv1Q

LudusHound: Open-source tool brings BloodHound data to life

LudusHound is an open-source tool that takes BloodHound data and uses it to set up a working Ludus Range for safe testing. It creates a copy of an Active Directory environment using previously gathered BloodHound data. Red teams can use this lab to map attack paths and test ways to exploit misconfigurations before trying them on real systems. Blue teams can use it to practice defense strategies and strengthen AD security, testing configuration changes in … More → The post LudusHound: Open-source tool brings BloodHound data to life appeared first on Help Net Security.
http://news.poseidon-us.com/TMZtzg

The AI security crisis no one is preparing for

In this Help Net Security interview, Jacob Ideskog, CTO of Curity, discusses the risks AI agents pose to organizations. As these agents become embedded in enterprise systems, the potential for misuse, data leakage, and unauthorized access grows. Ideskog warns that the industry is “sleepwalking” into a security crisis, drawing parallels to the early days of API and cloud adoption, and outlines steps companies must take to defend against these behavior-driven threats. You’ve warned about the … More → The post The AI security crisis no one is preparing for appeared first on Help Net Security.
http://news.poseidon-us.com/TMZqqS

Why CISOs in business services must close the edge security gap

Cloud adoption is speeding ahead in the business services sector, but security for remote and edge environments is falling behind. At the same time, generative AI is moving into daily workflows faster than most IT teams are prepared for. Those are the key takeaways from a new Aryaka survey of more than 100 North American IT and infrastructure leaders in finance, legal, consulting, and HR services. The report found that most firms have embraced hybrid … More → The post Why CISOs in business services must close the edge security gap appeared first on Help Net Security.
http://news.poseidon-us.com/TMZqnH

iOS security features you should use to protect your privacy

iOS 18 comes with several privacy and security features that many iPhone users overlook. Knowing how to use them can help you protect your personal information and control which apps can access your data. USB Accessories Lock iOS 18 allows you to control whether accessories can connect to your iPhone, iPad, or iPod touch while it’s locked. By default, this setting is off, which helps prevent unauthorized access to your device through USB or other … More → The post iOS security features you should use to protect your privacy appeared first on Help Net Security.
http://news.poseidon-us.com/TMZprJ