433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

North Korean hackers stole over $2 billion in cryptocurrency this year

North Korean hackers have stolen more than $2 billion in cryptocurrency in 2025, according to blockchain analytics firm Elliptic, and the year isn’t over yet. Though this year’s record losses are driven largely by the February attack on cryptocurrency exchange Bybit ($1.46 billion stolen), the company has also linked more than thirty additional hacks to North Korea this year. “The actual figure may be even higher,” the company says. “We are aware of many other … More → The post North Korean hackers stole over $2 billion in cryptocurrency this year appeared first on Help Net Security.
http://news.poseidon-us.com/TNYHBG

Netskope UZTNA adds policy control by device posture, risk, and role

Netskope has enhanced its Universal Zero Trust Network Access (UZTNA) solution. Comprised of Netskope One Private Access and Netskope Device Intelligence, Netskope’s UZTNA solution extends beyond the core use case of delivering fast, consistent, secure access to remote and local users and devices to deliver deeper threat inspection of their diverse device ecosystems and private application traffic. Netskope also goes further than other solutions by providing organizations with a scalable framework for retiring or reducing … More → The post Netskope UZTNA adds policy control by device posture, risk, and role appeared first on Help Net Security.
http://news.poseidon-us.com/TNY0qj

CyberArk unveils new capabilities to reduce risk across human and machine identities

CyberArk announced new discovery and context capabilities across its Machine Identity Security portfolio. The enhancements enable security teams to find, understand and secure machine identities, spanning certificates, keys, secrets, workloads and more, reducing risk and simplifying compliance at scale. Machine identities outnumber human identities by an estimated 82 to 1, driven by increased AI adoption and cloud native growth. As a result, machine identity-related security incidents are on the rise, with 72% of security leaders reporting … More → The post CyberArk unveils new capabilities to reduce risk across human and machine identities appeared first on Help Net Security.
http://news.poseidon-us.com/TNXww0

Radiflow360 unifies OT risk, compliance, and response

Radiflow has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers visibility, risk management and streamlined incident response for mid-sized industrial enterprises. Radiflow360 now enables mid-sized industrial operators to gain visibility and control over their OT networks and risks, and is supported by an AI analyst assistant that speeds up assessments and prioritizes threats. This new platform streamlines compliance, accelerates incident response and integrates seamlessly with other Radiflow and third-party tools, delivering … More → The post Radiflow360 unifies OT risk, compliance, and response appeared first on Help Net Security.
http://news.poseidon-us.com/TNXwvw

Rethinking AI security architectures beyond Earth

If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one is a moving endpoint that must stay secure while communicating through long, delay-prone links. A new study explores how AI could automate security for space systems and whether the best approach is to centralize control or spread it out. Space security enters a new era Commercial satellite constellations are changing how the space industry works. … More → The post Rethinking AI security architectures beyond Earth appeared first on Help Net Security.
http://news.poseidon-us.com/TNXwvj

DefectDojo: Open-source DevSecOps platform

DefectDojo is an open-source tool for DevSecOps, application security posture management (ASPM), and vulnerability management. It helps teams manage security testing, track and remove duplicate findings, handle remediation, and generate reports. Whether you’re a solo security practitioner or a CISO managing multiple teams, DefectDojo helps you organize your security work and report your organization’s security posture. At its core, it functions as a bug tracker for security vulnerabilities. It is designed to collect, organize, and … More → The post DefectDojo: Open-source DevSecOps platform appeared first on Help Net Security.
http://news.poseidon-us.com/TNXwv4

Developing economies are falling behind in the fight against cybercrime

Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to have when budgets allow. That means little investment in tools, training, or talent. At the same time, limited job opportunities and high unemployment make cybercrime an appealing alternative for some. When income matters more than how it’s earned, online crime can look like an easy way … More → The post Developing economies are falling behind in the fight against cybercrime appeared first on Help Net Security.
http://news.poseidon-us.com/TNXqHq

New system aims to keep people connected when networks fail

When disaster strikes, communication often fails. Cell towers can go offline, internet connections can disappear, and people are left without a way to share information or ask for help. A new research project looks at how to keep people talking even when regular networks are gone. Researchers from the University of Zürich and the University of St. Gallen have developed a system that combines low-power radios with a smartphone app. It is designed for situations … More → The post New system aims to keep people connected when networks fail appeared first on Help Net Security.
http://news.poseidon-us.com/TNXqHH