433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cisco fixes IOS/IOS XE zero-day exploited by attackers (CVE-2025-20352)

Cisco has fixed 14 vulnerabilities in IOS and IOS XE software, among them CVE-2025-20352, a high-severity vulnerability that has been exploited in zero-day attacks. About CVE-2025-20352 Cisco IOS software can be found on older models of Cisco Catalyst switches, Integrated Services Routers, and small enterprise and branch routers, as well as many legacy platforms. Cisco IOS XE software powers many of the company’s high-performance wireless controllers, routers and switches, including virtual routers and industrial networking … More → The post Cisco fixes IOS/IOS XE zero-day exploited by attackers (CVE-2025-20352) appeared first on Help Net Security.
http://news.poseidon-us.com/TNHMT9

Many material cybersecurity breaches go unreported: VikingCloud

Attacks have escalated in frequency and severity in the past year, with AI serving as a primary driver, according to the firm.
http://news.poseidon-us.com/TNHLYg

North Korean IT workers use fake profiles to steal crypto

ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active in recent years and focuses on stealing cryptocurrency. It targets freelance developers working on Windows, Linux, and macOS systems. A growing threat to developers The group’s campaigns use social engineering tricks, including fake job interviews and a method known as ClickFix, to spread malware and steal cryptocurrency. ESET also reviewed open-source intelligence data about North … More → The post North Korean IT workers use fake profiles to steal crypto appeared first on Help Net Security.
http://news.poseidon-us.com/TNHHGB

Caltech’s massive 6,100-qubit array brings the quantum future closer

Caltech scientists have built a record-breaking array of 6,100 neutral-atom qubits, a critical step toward powerful error-corrected quantum computers. The qubits maintained long-lasting superposition and exceptional accuracy, even while being moved within the array. This balance of scale and stability points toward the next milestone: linking qubits through entanglement to unlock true quantum computation.
http://news.poseidon-us.com/TNHFWB

Secure Code Warrior gives CISOs visibility into developer AI tool usage

Secure Code Warrior has launched a beta program to expand the AI capabilities of its Trust Agent product. The new offering provides CISOs with security traceability, visibility, and governance over developers’ use of AI coding tools. This upgrade, collectively referred to as Trust Agent: AI, leverages a combination of key signals, including AI coding tool usage, vulnerability data, code commit data, and developers’ secure coding skills, to provide visibility into how AI development tools are … More → The post Secure Code Warrior gives CISOs visibility into developer AI tool usage appeared first on Help Net Security.
http://news.poseidon-us.com/TNHD2v

Predicting DDoS attacks: How deep learning could give defenders an early warning

Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on detecting these attacks once they are underway. New research suggests that predicting DDoS attacks in advance may be possible, giving security teams a head start in planning their defenses. A new study outlines an approach to forecasting DDoS activity using deep learning. The researchers from Universiti Malaya and Universiti Teknikal Malaysia Melaka analyzed 192,525 DDoS … More → The post Predicting DDoS attacks: How deep learning could give defenders an early warning appeared first on Help Net Security.
http://news.poseidon-us.com/TNH6PL

$439 million recovered in global financial crime crackdown

Authorities around the world have recovered $439 million from criminals following a months-long operation led by INTERPOL. The effort, called HAECHI VI, ran from April through August 2025 and involved police in 40 countries and territories working together to track and seize stolen funds. Digital devices used to in Portugal to divert social security funds meant to support vulnerable families (Source: INTERPOL) The operation targeted a range of online financial crimes that have become increasingly … More → The post $439 million recovered in global financial crime crackdown appeared first on Help Net Security.
http://news.poseidon-us.com/TNH6Mn

In Pictures: Persistent Systems & Google Cloud BI modernisation Sydney roundtable

A selection of photos from a recent iTnews executive roundtable lunch at Bambini Trust restaurant in Sydney.
http://news.poseidon-us.com/TNH43b

New framework sets baseline for SaaS security controls

Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own settings, permissions, and logs, and most third-party risk processes only look at the vendor’s overall security, not the app itself. That leaves gaps you have to close on your own, often with limited visibility and extra work for both your team and procurement. The Cloud Security Alliance (CSA) wants to change that with a new … More → The post New framework sets baseline for SaaS security controls appeared first on Help Net Security.
http://news.poseidon-us.com/TNH3gH