433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers describe a year in which criminal and state-backed actors blurred the lines between cybercrime, espionage, and disruption, targeting public and private sectors. Identity at the center of attacks The report shows that most breaches begin with stolen or guessed passwords. More than 97% of identity-based attacks rely on password spray or brute-force techniques. While MFA … More → The post What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense appeared first on Help Net Security.
http://news.poseidon-us.com/TNs3Y8

Smart helmet tech points to the future of fighting audio deepfakes

Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate a person’s voice with matching tone, rhythm, and accent. To address that risk, a research team at Texas Tech University tested a method that connects voice verification to the physical act of speaking. The study examines whether jaw and cheek movements can serve as proof of identity. By combining those subtle motions with voice data, … More → The post Smart helmet tech points to the future of fighting audio deepfakes appeared first on Help Net Security.
http://news.poseidon-us.com/TNs0g2

Building trust in AI: How to keep humans in control of cybersecurity

In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype from reality. She explains why AI’s true value lies not in replacing human expertise but in strengthening it. Shenoy outlines how organizations can safely integrate AI into mission-critical environments by focusing on transparency, visibility, and responsible use cases. Viewers will learn why AI should recommend rather than execute, how to build trust through open and … More → The post Building trust in AI: How to keep humans in control of cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TNs0fd

When AI writes code, humans clean up the mess

AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with a price. A new report from Aikido Security shows that most organizations now use AI to write production code, and many have seen new vulnerabilities appear because of it. The study surveyed 450 professionals across the US and Europe, including developers, application security engineers, and security leaders. The results show that AI is moving fast … More → The post When AI writes code, humans clean up the mess appeared first on Help Net Security.
http://news.poseidon-us.com/TNs0fH

New infosec products of the week: October 24, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout and Rubrik. Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team Axoflow has launched its Security Data Layer, extending its pipeline offering with multiple storage solutions. The Security Data Layer addresses challenges in log management, SIEM optimization, pipeline reliability, and data accessibility. Elastic introduces Agent Builder to simplify AI agent development … More → The post New infosec products of the week: October 24, 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TNryjY

Phishing Cloud Account for Information, (Thu, Oct 23rd)

Over the past two months, my outlook account has been receiving phishing email regarding cloud storage payments, mostly in French and some English with the usual warning such as the account is about to be locked, space is full, loss of data, refused payment, expired payment method, etc.
http://news.poseidon-us.com/TNrswv