433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Brush shell 0.4.0 tightens script safety, widens platform support

Rust-based alternatives to traditional Unix shells continue to attract users who want bash compatibility alongside built-in features like syntax highlighting and history-based suggestions. Brush, a bash- and POSIX-compatible shell written in Rust, sits in that group, and version 0.4.0 brings more than 200 merged pull requests representing several months of development. Bash features filled in The release closes several long-standing gaps in bash compatibility. Brush now implements set -e (errexit) and pipefail with the same … More → The post Brush shell 0.4.0 tightens script safety, widens platform support appeared first on Help Net Security.
http://news.poseidon-us.com/TSM5xT

Pipelock: Open-source AI agent firewall

AI coding agents run with shell access, environment variables containing API keys, and unrestricted internet connectivity, creating a single point of failure where one compromised tool call can leak credentials to an attacker-controlled domain. Pipelock, an open-source security harness developed by Joshua Waldrep under the PipeLab project, addresses this exposure by inserting an enforcement layer between agents and the network. Version 2.3.0 shipped with class-preserving request redaction and generic SSE streaming response scanning. Architecture and … More → The post Pipelock: Open-source AI agent firewall appeared first on Help Net Security.
http://news.poseidon-us.com/TSM5xK

Spotting third-party cyber risk before attackers do

In this Help Net Security video, Jeffrey Wheatman, SVP and Cyber Strategist at Black Kite, discusses how organizations can identify and manage third-party cyber exposures before attackers exploit them. He argues that businesses should move beyond a data-loss mindset toward one centered on resilience, meaning keeping operations running when vendors or partners get hit. Wheatman walks through practical steps: engaging business stakeholders early, scoping which third parties are business critical, retiring outdated questionnaire-based assessments, and … More → The post Spotting third-party cyber risk before attackers do appeared first on Help Net Security.
http://news.poseidon-us.com/TSM4H7

What researchers learned about building an LLM security workflow

Security operations centers are running into the same wall everywhere. Detection tools generate more alerts than analysts can work through, and the early stages of any investigation involve pulling together logs from several sources to decide whether something is worth escalating. Vendors have spent the past two years pitching LLMs as the answer, with a steady stream of copilots and AI assistants aimed at alert triage. A new paper from researchers at the University of … More → The post What researchers learned about building an LLM security workflow appeared first on Help Net Security.
http://news.poseidon-us.com/TSM4H3

Your work apps are quietly handing 19 data points to someone

Office work in 2026 runs through a stack of mobile apps that sit on the same phones people use for banking, messaging family, and tracking their location. Ten of the most common workplace apps in use across U.S. companies, including Gmail, Microsoft Teams, Zoom Workplace, Slack, and Notion, account for more than 12.5 billion downloads on Google Play. New research from Incogni, based on data pulled from the Google Play Store on March 20, 2026, … More → The post Your work apps are quietly handing 19 data points to someone appeared first on Help Net Security.
http://news.poseidon-us.com/TSM4Gf

ChatGPT advanced account security adds passkeys and hardware keys

Journalists, elected officials, researchers, and political dissidents have spent years adapting their accounts to phishing-resistant authentication on consumer platforms. ChatGPT now joins that list. OpenAI has introduced Advanced Account Security, an opt-in setting that strips password-based sign-in from ChatGPT and Codex accounts and replaces it with passkeys or physical security keys. What enrollment changes Enrolled accounts use passkeys or hardware security keys for sign-in, with password login disabled. Email and SMS account recovery are removed, … More → The post ChatGPT advanced account security adds passkeys and hardware keys appeared first on Help Net Security.
http://news.poseidon-us.com/TSLxQl

Scientists built a memory chip that breaks the rules of miniaturization

A new kind of memory device may finally solve the problem of overheating and battery drain in electronics. By shrinking components to an extreme scale and redesigning their structure, researchers found a way to reduce energy loss instead of increasing it. The result is a tiny memory unit that improves as it gets smaller—something once thought impossible. This could pave the way for ultra-efficient smartphones, wearables, and AI systems.
http://news.poseidon-us.com/TSLg4G

Powerful AI finds 100+ hidden planets in NASA data including rare and extreme worlds

Astronomers have unleashed a powerful new AI tool called RAVEN to comb through data from NASA’s TESS mission—and it’s paying off in a big way. By analyzing millions of stars, the system has confirmed over 100 exoplanets, including 31 brand-new worlds, and identified thousands more promising candidates. What makes this especially exciting is the discovery of rare and extreme planets, like those that whip around their stars in less than a day and others lurking in the mysterious “Neptunian desert,” where planets are thought to be scarce.
http://news.poseidon-us.com/TSLg3z

Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The AI criminal mastermind is already hiring on gig platforms Labor-hire platforms let anyone with a credit card post a task and pay a stranger to complete it. The RentAHuman platform extends that model to AI agents through a Model Context Protocol server, allowing an agent to post gigs directly. Listed tasks include attending in-person meetings, photographing locations, delivering items, … More → The post Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months appeared first on Help Net Security.
http://news.poseidon-us.com/TSLVtf