433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Manifest AI Risk turns weeks of model vetting into two clicks

Manifest Cyber introduced Manifest AI Risk, the latest module part of the Manifest Platform, designed to help security and compliance teams secure their AI supply chains. The Manifest Platform is already used by Fortune 500 companies and critical government agencies. With the launch of AI Risk, Manifest delivers a solution designed specifically for AI transparency at enterprise scale, addressing the gap left by traditional security vendors and AI startups who either treat AI as separate … More → The post Manifest AI Risk turns weeks of model vetting into two clicks appeared first on Help Net Security.
http://news.poseidon-us.com/TMK0tF

Riverbed rolls out AI-powered tools to find and fix network issues faster

Riverbed launched its new AI-powered intelligent network observability solutions, enhancing network visibility for enterprise IT teams and enabling them to proactively identify and resolve problems in real-time before they escalate into business challenges. The new solutions will deliver even greater value for the Riverbed Platform, and build on strong market momentum –with Riverbed observability bookings growth of 92% year-over-year (YoY) in the first half of 2025. With this launch, Riverbed is ushering in a new … More → The post Riverbed rolls out AI-powered tools to find and fix network issues faster appeared first on Help Net Security.
http://news.poseidon-us.com/TMK0pX

New Reveal platform shines a light on post-login identity behavior

Reveal Security released the Reveal Platform, a solution to deliver preemptive identity security across SaaS, cloud, and custom applications. Designed for modern hybrid enterprises, the platform provides end-to-end visibility into both human and non-human identity behaviors. “Credentials are compromised all the time; it’s a reality in how we have to defend, and now we’re seeing insider and non-human identity threats increasing,” said Kevin Hanes, CEO, Reveal Security. “The problem is once the identity is authenticated … More → The post New Reveal platform shines a light on post-login identity behavior appeared first on Help Net Security.
http://news.poseidon-us.com/TMK0cF

Stealing Machine Keys for fun and profit (or riding the SharePoint wave), (Tue, Aug 5th)

About 10 days ago exploits for Microsoft SharePoint (CVE-2025-53770, CVE-2025-53771) started being publicly abused – we wrote about that at here and here .
http://news.poseidon-us.com/TMJgTJ

Security tooling pitfalls for small teams: Cost, complexity, and low ROI

In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, cloud-native teams. He explains how simplicity, integration, and automation are key for SMBs with limited resources. Choudhry also shares how AI is beginning to make a difference for mid-market companies in managing risk and compliance. What are some specific examples of security tooling or vendor approaches that simply don’t … More → The post Security tooling pitfalls for small teams: Cost, complexity, and low ROI appeared first on Help Net Security.
http://news.poseidon-us.com/TMJWGY

BloodHound 8.0 debuts with major upgrades in attack path management

SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major advancement in identity attack path management that uncovers attack paths across the entire technology stack. It enables users to ingest data from diverse systems such as GitHub, Snowflake, and Microsoft SQL Server and build tailored threat models that reflect their environments. “To date, most of … More → The post BloodHound 8.0 debuts with major upgrades in attack path management appeared first on Help Net Security.
http://news.poseidon-us.com/TMJWCl

Your employees uploaded over a gig of files to GenAI tools last quarter

In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings confirm that sensitive data is being exposed through GenAI tools, something many security leaders fear but find difficult to measure. Distribution of file types uploaded to GenAI tools in Q2 2025 (Source: Harmonic Security) Enterprises use 23 New GenAI tools per quarter on average Of these numbers, 22% of files … More → The post Your employees uploaded over a gig of files to GenAI tools last quarter appeared first on Help Net Security.
http://news.poseidon-us.com/TMJRbT

Back to basics webinar: The ecosystem of CIS Security best practices

Generative AI models, multi-cloud strategies, Internet of Things devices, third-party suppliers, and a growing list of regulatory compliance obligations all require the same security response: come together as a community to prioritize the basics. Watch this on-demand webinar to understand how you can use an ecosystem of security best practices built by the Center for Internet Security (CIS) to support this mission. By the end of the webinar, you’ll learn: How CIS security best practices … More → The post Back to basics webinar: The ecosystem of CIS Security best practices appeared first on Help Net Security.
http://news.poseidon-us.com/TMJRZ8