433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Latin America’s Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence

Latin America’s threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overstretched security teams. Recorded Future provides LATAM-specific intelligence, automation, and seamless integrations to help your team get ahead of threats before they hit.
http://news.poseidon-us.com/TRGj4c

Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

Fig Security, a new platform that finds and fixes broken security flows across your entire SecOps infrastructure, has launched from stealth with $38 million across Seed and Series A rounds. It addresses one of the least visible challenges yet most consequential in enterprise security: the quiet breakdown of security operations as environments grow more complex. The round is backed by Team8 and Ten Eleven Ventures, alongside a group of prominent security leaders. Enterprises pour billions … More → The post Fig Security emerges from stealth with $38 million to resilience-proof enterprise security appeared first on Help Net Security.
http://news.poseidon-us.com/TRGggk

Threat actors weaponize OAuth redirection logic to deliver malware

An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have revealed. The attackers are targeting government and public-sector organizations, and redirecting unsuspecting users from trusted login pages to their own infrastructure, to serve malware or capture login credentials. The attack, from the victim’s perspective The OAuth authentication redirection mechanism is a trusted login feature used by Microsoft, Google and others. It allows users … More → The post Threat actors weaponize OAuth redirection logic to deliver malware appeared first on Help Net Security.
http://news.poseidon-us.com/TRGggb

Cloudflare tracked 230 billion daily threats and here is what it found

Cloudflare’s network blocks over 230 billion threats per day. The volume indicates how routine and automated the attack cycle has become, and the patterns behind that volume point to a shift in how breaches begin and progress. Cloudflare’s threat research unit, Cloudforce One, published its inaugural cyber threat report 2026, covering activity observed through 2025 and projecting into the year ahead. The report draws on telemetry from Cloudflare’s network, which handles roughly 20% of global … More → The post Cloudflare tracked 230 billion daily threats and here is what it found appeared first on Help Net Security.
http://news.poseidon-us.com/TRGgfw

TSP funds mostly positive in February

The C Fund was the only account that came in negative, losing 0.76% as compared to January. For the year, all funds are in the black.
http://news.poseidon-us.com/TRGfyc

Josys centralizes identity data to replace manual IT oversight with automated governance

Josys has transitioned into an autonomous identity governance platform, expanding beyond traditional SaaS management. The enhanced platform empowers IT leaders and managed service providers (MSPs) to scale governance and compliance efforts by centralizing identity data within a single, AI-driven system. With Verizon reporting that 80% of hacking breaches stem from compromised credentials, identity is the ultimate attack surface. As threats and costly non-compliance penalties surge, organizations can no longer rely on manual IT oversight. Autonomous … More → The post Josys centralizes identity data to replace manual IT oversight with automated governance appeared first on Help Net Security.
http://news.poseidon-us.com/TRGbt1

$100 radio equipment can track cars through their tire sensors

When people consider what might track their movements, they think of smartphone apps, GPS services, or roadside cameras. The tires of a new car rarely enter that equation. Researchers at IMDEA Networks Institute, together with European partners, found that Tire Pressure Monitoring System (TPMS) sensors inside each wheel broadcast unencrypted wireless signals containing persistent identifiers. Each sensor sends out a unique ID that does not change, allowing the same car to be recognized again and … More → The post $100 radio equipment can track cars through their tire sensors appeared first on Help Net Security.
http://news.poseidon-us.com/TRGbt0

RecordPoint MCP Server standardizes and secures AI access to compliant data

RecordPoint has unveiled its model context protocol (MCP) server, giving enterprises a secure, standardized way to expose governed data to external AI agents and platforms. The RecordPoint MCP Server allows any AI system, copilot, agent, or custom LLM app to safely access governed, compliant data from the RecordPoint platform without custom integrations or elevated permissions. By standardizing how AI systems discover and use governed resources, the RecordPoint MCP Server eliminates data fragmentation and accelerates AI … More → The post RecordPoint MCP Server standardizes and secures AI access to compliant data appeared first on Help Net Security.
http://news.poseidon-us.com/TRGbsw

ProcessUnity Risk Index delivers controls-driven vendor risk scoring for TPRM

ProcessUnity has introduced ProcessUnity Risk Index, a risk rating built specifically for third-party risk management programs, combining proprietary control intelligence with external threat and vulnerability data. ProcessUnity Risk Index rates vendors on a 100-point scale to drive faster, more confident risk prioritization. Built for how TPRM teams actually work, ProcessUnity Risk Index blends inside-out, vendor-attested control data with outside-in threat intelligence to produce a single, explainable (and dynamic) risk score that’s consumable by executives and … More → The post ProcessUnity Risk Index delivers controls-driven vendor risk scoring for TPRM appeared first on Help Net Security.
http://news.poseidon-us.com/TRGbsq

Enigma AI enables internal trust governance to asset-to-asset communications

Enigma Networks has announced the general availability of its Internal Trust Governance platform, Enigma AI, which continuously determines and validates which communications are necessary and safe across enterprise networks. Just as identity and access management (IAM) governs trust for users, Enigma AI governs trust between internal systems and assets, introducing a new control plane for zero trust that determines not only what is happening inside the network, but what should be happening. “After decades perfecting … More → The post Enigma AI enables internal trust governance to asset-to-asset communications appeared first on Help Net Security.
http://news.poseidon-us.com/TRGbsk