433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

August 2025 CVE Landscape

Recorded Future’s Insikt Group identified 18 high-impact vulnerabilities in August 2025, including RCE flaws in Citrix, WinRAR, and Fortinet products. Several were actively exploited by threat actors like RomCom. Read the full analysis, PoCs, and patch guidance.
http://news.poseidon-us.com/TN543P

Proofpoint launches agentic AI to detect risks in communication channels

Proofpoint launched agentic AI solution for Human Communications Intelligence (HCI), marking a leap forward in how organizations detect, understand, and mitigate conduct and compliance risks in real time. Designed for enterprises in regulated and highly litigious industries, it transforms digital communications governance (DCG) from post-incident compliance to real-time, AI-powered risk reasoning, detection, and prevention, empowering organizations to act on human behavior before it becomes a compliance, security, or legal event. A recent study of 1,600 … More → The post Proofpoint launches agentic AI to detect risks in communication channels appeared first on Help Net Security.
http://news.poseidon-us.com/TN4sXr

Why CIOs can’t afford another modernization failure in 2026

Broken delivery models cost enterprises billions. If you’re in 2026 budget cycles, here’s a must-read framework for 50–70% faster, de-risked legacy systems modernization.
http://news.poseidon-us.com/TN4lHt

Most enterprise AI use is invisible to security teams

Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data privacy, compliance, and governance. This blind spot is growing as AI features are built directly into business tools. Employees often connect personal AI accounts to work devices or use unsanctioned services, making it difficult for security teams to monitor usage. Lanai says this lack of visibility … More → The post Most enterprise AI use is invisible to security teams appeared first on Help Net Security.
http://news.poseidon-us.com/TN4dZd

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to store and index network traffic in standard PCAP format, making it easy to search and access. The solution includes a simple web interface for browsing, searching, and exporting PCAP files. Arkime also provides APIs for downloading PCAP data and session data in JSON format. Because Arkime uses standard PCAP files, you can analyze the data … More → The post Arkime: Open-source network analysis and packet capture system appeared first on Help Net Security.
http://news.poseidon-us.com/TN4bYh

What could a secure 6G network look like?

The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised and make sure to build it with a secure-by-design approach. Telecom industry leaders need to anticipate novel vulnerabilities and attacks specific for 6G. Unlike the previous generation of wireless, 6G will expand to even more … More → The post What could a secure 6G network look like? appeared first on Help Net Security.
http://news.poseidon-us.com/TN4bSw