433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Exium by NETGEAR brings unified SASE and firewall protection to SMEs and MSPs

NETGEAR announced a tailored security solution for small and medium-sized enterprises (SMEs). Building on an acquisition made earlier this year, NETGEAR is delivering Exium, an all-in-one Secure Access Service Edge (SASE) and hybrid firewall solution designed for SMEs and the managed service providers (MSPs) that support them. SMEs face rising cybersecurity threats According to the Verizon Data Breach Investigations Report SMEs faced more than 3,000 cybersecurity incidents, nearly four times as many cybersecurity incidents as … More → The post Exium by NETGEAR brings unified SASE and firewall protection to SMEs and MSPs appeared first on Help Net Security.
http://news.poseidon-us.com/TNPWDc

Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale

TELUS Digital has released its continuous automated red-teaming application, Fuel iX Fortify. The solution helps enterprises test GenAI systems at scale and identify vulnerabilities by simulating real-world attack scenarios using advanced adversarial techniques. Fuel iX Fortify runs thousands of adversarial attacks on AI-powered assistants, copilots and applications in minutes, helping organizations uncover AI risks before they can be exploited. With an ever-evolving database of adversary tactics, techniques and procedures, Fortify stays ahead of emerging attack … More → The post Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale appeared first on Help Net Security.
http://news.poseidon-us.com/TNPRK9

Boards lack AI savvy as adoption advances: PwC

More than one-third of directors say boards haven’t received enough AI education amid widespread deployments of the technology.
http://news.poseidon-us.com/TNPK2f

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts

Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) for months, there are still around 48,000 vulnerable appliances out there. The number is provided by the Shadowser Foundation, which is scanning for internet-facing vulnerable Cisco ASA/FTD instances every day. A majority of those are located in the US, and the rest mostly in the UK, Japan, Russia, Germany, and Canada. Surge in … More → The post Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts appeared first on Help Net Security.
http://news.poseidon-us.com/TNPJmq

Siemens simplifies OT security with virtualized, encrypted connectivity

Siemens launched SINEC Secure Connect, the zero trust security platform designed for operational technology (OT) networks. The software solution virtualizes network structures using overlay networks. It enables Machine-to-Machine, Machine-to-Cloud, and Machine-to-Datacenter connections, plus secure remote access to industrial systems, all without relying on VPNs. Shop floor devices using SINEC Secure Connect remain protected from unauthorized external access while maintaining the necessary operational connectivity. This allows industrial companies to realize secure, flexible, and future-proof OT networking. … More → The post Siemens simplifies OT security with virtualized, encrypted connectivity appeared first on Help Net Security.
http://news.poseidon-us.com/TNPJkd

New 360 Strata platform delivers actionable intelligence to protect sensitive data

360 Privacy launched 360 Strata, an advanced privacy platform designed to transform how organizations understand, manage, and reduce digital exposures. The platform empowers executives, security teams, and family offices with actionable intelligence to identify what personal information is exposed and deliver measurable outcomes. 360 Strata ensures sensitive data is protected while providing clients with actionable insight to assess impact and make informed decisions. “Organizations have lacked the architectural visibility leaders need to demonstrate value,” said … More → The post New 360 Strata platform delivers actionable intelligence to protect sensitive data appeared first on Help Net Security.
http://news.poseidon-us.com/TNPBGC

Akuity unveils AI-powered incident detection and automation for Kubernetes

Akuity has launched new AI capabilities that enable users to detect degraded states across applications, triage incidents, and automate fixes on the Akuity platform within minutes. The platform also provides enterprise-ready continuous delivery and promotion capabilities for Kubernetes, built on the fundamentals of Argo CD. “We’ve been using the Akuity platform for more than three years across thousands of applications deployed within our clusters. With Akuity’s new AI capabilities, we are able to immediately find … More → The post Akuity unveils AI-powered incident detection and automation for Kubernetes appeared first on Help Net Security.
http://news.poseidon-us.com/TNPB2Z

Hackers love LOTL, this approach shuts them down

Every time cyber defenders and companies discover new ways to block intrusions, attackers change their tactics and find a way around the defenses. “Living off the Land” (LOTL) is a prime example: since many detection tools became good at flagging malware, attackers had to find an alternative. They realized that the use of legitimate tools built into operating systems is less likely to raise warning flags, so they leaned heavily into that approach. Recent research … More → The post Hackers love LOTL, this approach shuts them down appeared first on Help Net Security.
http://news.poseidon-us.com/TNP48T

A2AS framework targets prompt injection and agentic AI security risks

AI systems are now deeply embedded in business operations, and this introduces new security risks that traditional controls are not built to handle. The newly released A2AS framework is designed to protect AI agents at runtime and prevent real-world incidents like fraud, data theft, and malware spread. A2AS-protected AI agent with BASIC security controls interacting with users, tools, and other agents Fragmented defenses create gaps Many companies are still figuring out how to secure AI … More → The post A2AS framework targets prompt injection and agentic AI security risks appeared first on Help Net Security.
http://news.poseidon-us.com/TNP1HY

Biometric spoofing isn’t as complex as it sounds

Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t notice. Like any system, biometrics has weaknesses that attackers can exploit. Biometric spoofing isn’t as complex as it sounds. It’s basically when someone imitates your biometric traits to fool a system. This could be a printed photo, a 3D-printed fingerprint, or even a recorded voice. Basic facial recognition systems can be fooled with images from … More → The post Biometric spoofing isn’t as complex as it sounds appeared first on Help Net Security.
http://news.poseidon-us.com/TNP1G0