433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Attackers turn trusted OAuth apps into cloud backdoors

Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often remain unnoticed for quite some time and allow attackers to maintain access to high-privileged accounts even after passwords are reset or multifactor authentication (MFA) is enforced. What is OAuth and how do attackers exploit it? OAuth is an authorization protocol that lets apps connect to your account (e.g., M365) safely by using special access tokens … More → The post Attackers turn trusted OAuth apps into cloud backdoors appeared first on Help Net Security.
http://news.poseidon-us.com/TNqF5n

Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails

Rubrik announced the launch of the Rubrik Agent Cloud to accelerate enterprise AI agent adoption while managing risk of AI deployments. AI transformation is now mandatory for most organizations. However, IT leaders are constrained because agentic AI has significant risks including hallucination as well as compromise by threat actors. Rubrik Agent Cloud is designed to monitor and audit agentic actions, enforce real-time guardrails for agentic changes, fine-tune agents for accuracy and, undo agent mistakes. Built … More → The post Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails appeared first on Help Net Security.
http://news.poseidon-us.com/TNqF5N

Government shutdown takes toll on air traffic controllers

The longer the shutdown goes, the more air traffic controllers feel their anxiety and stress levels rise. The post Government shutdown takes toll on air traffic controllers first appeared on Federal News Network.
http://news.poseidon-us.com/TNqDsL

Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team

Axoflow has launched its Security Data Layer, extending its pipeline offering with multiple storage solutions. The Security Data Layer addresses challenges in log management, SIEM optimization, pipeline reliability, and data accessibility. In addition to a full-fledged security data pipeline that classifies, reduces, normalizes, and enriches data, now security teams gain access to flexible, cost-effective, and high-performance storage options. They can store, query, and process security data in diverse deployment scenarios, from storing temporal data right … More → The post Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team appeared first on Help Net Security.
http://news.poseidon-us.com/TNq6dQ

Elastic introduces Agent Builder to simplify AI agent development

Elastic released Agent Builder, a complete set of capabilities powered by Elasticsearch, that makes it easy for developers to build custom AI agents on company data—all within minutes. Agent Builder also provides an out-of-the-box conversational experience for exploring, analyzing, and optimizing any data in Elasticsearch. As AI agents evolve to take on more complex and data-driven enterprise tasks, reliability and accuracy depend on delivering accurate context. In most enterprises, this context is scattered across various … More → The post Elastic introduces Agent Builder to simplify AI agent development appeared first on Help Net Security.
http://news.poseidon-us.com/TNq6c4

Keycard emerges from stealth with identity and access solution for AI agents

Keycard emerged from stealth with its identity and access platform for AI agents that integrates with organizations’ existing user identity solutions. Keycard’s platform identifies AI agents, lets users assign task-based permissions and dynamically enforces policy while tracking all activity. With Keycard, organizations can deploy AI agents into production with complete trust, knowing they are only capable of performing the intended actions of their users and builders. “AI agents represent a once-in-a-generation shift, greater than the … More → The post Keycard emerges from stealth with identity and access solution for AI agents appeared first on Help Net Security.
http://news.poseidon-us.com/TNq0z3

Life, death, and online identity: What happens to your online accounts after death?

The rapid technological advances of recent decades have transformed nearly every aspect of our lives. One major shift is that many of us now maintain extensive digital footprints, spanning countless online accounts, from email and social media to banking, investments, cloud storage, utility payments, and more. In life, we work hard to protect these accounts from others, particularly cybercriminals. Yet when death or incapacity strikes, ensuring that our loved ones have legal access to them … More → The post Life, death, and online identity: What happens to your online accounts after death? appeared first on Help Net Security.
http://news.poseidon-us.com/TNpsZY