433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Radio signals could give attackers a foothold inside air-gapped devices

Air-gapped systems are meant to stay quiet. Remove network ports, lock down inputs, and the device should have nothing to hear. A new study shows that this breaks down when software control is lost. Embedded devices with no radios and no sensors can still receive wireless commands through the air. Starting from a familiar threat model Security teams will find the setup familiar. An attacker first gains code execution on an embedded device through means … More → The post Radio signals could give attackers a foothold inside air-gapped devices appeared first on Help Net Security.
http://news.poseidon-us.com/TQ46Cj

Product showcase: RoboForm password manager for iOS

RoboForm is a password manager that helps users store and manage login credentials, identities, and other sensitive information in one place. The app is available on macOS, Windows, Android, and iOS. It uses AES-256-bit encryption and a master password to protect stored data. RoboForm includes tools such as a password generator and form filler that reduce repetitive typing and simplify access to accounts across websites and apps. First time use on iOS RoboForm is available … More → The post Product showcase: RoboForm password manager for iOS appeared first on Help Net Security.
http://news.poseidon-us.com/TQ42hH

Non-human identities push identity security into uncharted territory

Enterprises are grappling with an identity attack surface that keeps expanding and slipping out of reach, according to Veza. Permissions growth outstrips oversight Permissions now grow faster than teams can track them. Enterprises often operate with hundreds of millions of active entitlements, each defining what an identity can do in a system. Veza measured more than 230 billion permissions across its dataset. This volume creates persistent blind spots. Security teams manage access requests, audits, and … More → The post Non-human identities push identity security into uncharted territory appeared first on Help Net Security.
http://news.poseidon-us.com/TQ41mf

Security teams debate how much to trust AI

AI is reshaping how organizations operate, defend systems, and interpret risk. Reports reveal rising AI-driven attacks, hidden usage across enterprises, and widening gaps between innovation and security readiness. As adoption accelerates, companies face pressure to govern AI responsibly while preparing for threats that move faster than current defenses. Attackers keep finding new ways to fool AI Across the AI ecosystem, developers are adopting layered controls throughout the lifecycle. They combine training safeguards, deployment filters, and … More → The post Security teams debate how much to trust AI appeared first on Help Net Security.
http://news.poseidon-us.com/TQ40jw

LLMs are automating the human part of romance scams

Romance scams succeed because they feel human. New research shows that feeling no longer requires a person on the other side of the chat. The three stages of a romance-baiting scam Romance scams depend on scripted conversation Romance baiting scams build emotional bonds over weeks before steering victims toward fake cryptocurrency investments. A recent study shows that most of this work consists of repeatable text exchanges that are already being augmented with language models. Romance … More → The post LLMs are automating the human part of romance scams appeared first on Help Net Security.
http://news.poseidon-us.com/TQ3B3R

Superagent: Open-source framework for guardrails around agentic AI

Superagent is an open-source framework for building, running, and controlling AI agents with safety built into the workflow. The project focuses on giving developers and security teams tools to manage what agents can do, what they can access, and how they behave during execution. Superagent targets environments where autonomous or semi autonomous agents interact with APIs, data sources, and external services. A framework built around agent control Superagent lets developers define agents with specific roles … More → The post Superagent: Open-source framework for guardrails around agentic AI appeared first on Help Net Security.
http://news.poseidon-us.com/TQ3B3Q

Security chaos engineering matters when nothing is broken

In this Help Net Security video, Brian Blakley, CISO at Bellini Capital, explains why security chaos engineering matters beyond theory. He shares lessons from real organizations where systems did not fail outright, but uncertainty slowed the business. Login delays, certificate issues, and missed alerts caused confusion, stalled work, and weakened trust between teams and leaders. Blakley argues that many security problems show up as ambiguity rather than outages. Tools may work as designed, yet coordination, … More → The post Security chaos engineering matters when nothing is broken appeared first on Help Net Security.
http://news.poseidon-us.com/TQ3B1L

Automation forces a reset in security strategy

Enterprise security teams are working under the assumption that disruption is constant. A global study by Trellix shows that resilience has moved from a long term goal to a structural requirement for CISOs. Infrastructure design, operational integration, and the use of AI shape how organizations prepare for ongoing pressure from threats and regulation. Hybrid infrastructure settles in as standard practice Hybrid infrastructure, which combines cloud, on premises, and isolated systems, has become the standard approach … More → The post Automation forces a reset in security strategy appeared first on Help Net Security.
http://news.poseidon-us.com/TQ38SM

CISOs are managing risk in survival mode

CISOs carry expanding responsibility as cybersecurity budgets rise, AI adoption spreads, and board expectations grow. Risk management now depends on faster decisions, stronger coordination, and better communication across leadership teams. This article shows how CISOs are responding to growing pressure, ongoing threats, and organizational gaps, while trying to turn rising investment into risk reduction and resilience. CISOs are spending big and still losing ground Budgets keep rising, cloud programs keep expanding, and AI is reshaping … More → The post CISOs are managing risk in survival mode appeared first on Help Net Security.
http://news.poseidon-us.com/TQ38Ql