433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

July 2025 Patch Tuesday forecast: Take a break from the grind

There was a barrage of updates released the week of June 2025 Patch Tuesday. This included security updates from Adobe, Google, Microsoft, Mozilla, and others. But it has been ‘calm’ the past couple of weeks. The news and message boards were covering the continuing update issues from the past couple of months but there wasn’t a lot of new or exciting information. If this lull in activity continues, maybe we’ll be able to get a … More → The post July 2025 Patch Tuesday forecast: Take a break from the grind appeared first on Help Net Security.
http://news.poseidon-us.com/TLmhXt

AI built it, but can you trust it?

In this Help Net Security interview, John Morello, CTO at Minimus, discusses the security risks in AI-driven development, where many dependencies are pulled in quickly. He explains why it’s hard to secure software stacks that no one fully understands. He also shares what needs to change to keep development secure as AI becomes more common. We’re seeing AI-assisted development pull in hundreds of dependencies from diverse sources at speed. From your perspective, what’s the most … More → The post AI built it, but can you trust it? appeared first on Help Net Security.
http://news.poseidon-us.com/TLmhWm

Aegis Authenticator: Free, open-source 2FA app for Android

Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to back up your data. It supports both HOTP and TOTP, so it works with thousands of services. It also allows the export or import from a wide variety of 2FA apps, with support for automatic backups. Aegis Authenticator is available for free on GitHub. Must read: 35 … More → The post Aegis Authenticator: Free, open-source 2FA app for Android appeared first on Help Net Security.
http://news.poseidon-us.com/TLmdDN

New technique detects tampering or forgery of a PDF document

Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s page objects. The technique employs a prototype that can detect changes to a PDF document, such as changes made to the text, images, or metadata. Prototype flow With the PDF format being used as a formal means of communication in multiple industries, it has become a good target for criminals who wish to affect contracts … More → The post New technique detects tampering or forgery of a PDF document appeared first on Help Net Security.
http://news.poseidon-us.com/TLmc0P

Cloud security maintains its position as top spending priority

While most enterprises have integrated cloud resources into their operations, many need to improve their ability to secure these environments and the data they contain, according to Thales. Cloud security challenges go beyond technology The variability of controls across cloud providers, combined with the distinct mindset required for cloud security, continues to challenge security teams. This pressure is only increasing as AI initiatives drive more sensitive data into cloud environments. 64% of respondents ranked cloud … More → The post Cloud security maintains its position as top spending priority appeared first on Help Net Security.
http://news.poseidon-us.com/TLmYtF

ISC Stormcast For Monday, July 7th, 2025 https://isc.sans.edu/podcastdetail/9514, (Mon, Jul 7th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TLmWfF