433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Firefox is getting a free built-in VPN

Mozilla is adding a free built-in VPN to Firefox, with the feature arriving in Firefox 149 on March 24. Privacy concerns often follow free VPN services, especially when unclear data practices put user information at risk. Mozilla says its version is grounded in its data principles and focus on trust, aiming to avoid the kinds of arrangements that have raised questions in the past. The feature routes browser traffic through a proxy to mask a … More → The post Firefox is getting a free built-in VPN appeared first on Help Net Security.
http://news.poseidon-us.com/TRYnWD

Corelight’s Agentic Triage turns SOC alerts into evidence-backed investigations

Corelight has introduced a new set of agentic AI capabilities aimed at helping security operations centers (SOCs) cut down on repetitive, time-consuming tasks. The updates are designed to boost analyst efficiency, speed up response times, and build trust through greater transparency. The release includes Agentic Triage to streamline SOC workflows, a new suite of machine learning models that turn encrypted traffic blind spots into actionable evidence, and expanded integrations “By pairing the industry’s highest-fidelity network … More → The post Corelight’s Agentic Triage turns SOC alerts into evidence-backed investigations appeared first on Help Net Security.
http://news.poseidon-us.com/TRYnWB

TrojAI unveils new capabilities to secure agentic AI beyond the prompt layer

TrojAI has announced major new capabilities designed to secure the growing deployment of agentic AI in the enterprise going beyond the prompt layer. “The innovations we are unveiling this week address some of the most significant and rapid changes to the AI security ecosystem. Enterprise deployment of agents is accelerating quickly, and these new TrojAI capabilities enable a new level of visibility and protection needed for the Agentic enterprise,” said Lee Weiner, CEO of TrojAI. … More → The post TrojAI unveils new capabilities to secure agentic AI beyond the prompt layer appeared first on Help Net Security.
http://news.poseidon-us.com/TRYnW8

Veracode Fix for SCA automates open-source vulnerability fixes

Veracode has unveiled Veracode Fix for Software Composition Analysis (SCA), an AI-powered solution to address software supply chain risk. The enhanced automated remediation engine, the next evolution of Veracode’s Fix solution, enables organizations to detect and remediate open-source vulnerabilities easily, before code reaches production. Designed to integrate seamlessly into existing developer workflows, it delivers third-party updates and first-party code refactoring without breaking builds or disrupting development. In 2025, software supply chain breaches accounted for 30% … More → The post Veracode Fix for SCA automates open-source vulnerability fixes appeared first on Help Net Security.
http://news.poseidon-us.com/TRYnW1

Polygraf AI launches Desktop Overlay for real-time AI behavior control in enterprise operations

Polygraf AI has announced the launch of its Desktop Overlay, a new product designed to provide continuous, real-time guidance for compliance operations and data protection directly at the user interface level, as a personal compliance assistant. Built for highly regulated and government agencies, the Desktop Overlay runs at the edge and preemptively warns users of sensitive data exposure while they are writing, before the data is sent to third-party models, external systems, or leaves device … More → The post Polygraf AI launches Desktop Overlay for real-time AI behavior control in enterprise operations appeared first on Help Net Security.
http://news.poseidon-us.com/TRYnTQ

Apple starts issuing lightweight security updates between software releases

Apple is delivering small security updates, called Background Security Improvements, starting with iOS 26.1, iPadOS 26.1, and macOS 26.1. Apple describes Background Security Improvements as lightweight security releases for components such as Safari, the WebKit framework, and other system libraries, delivered through ongoing patches between software updates. “In rare instances of compatibility issues, Background Security Improvements may be temporarily removed and then enhanced in a subsequent software update,” the company noted. Users can manage Background … More → The post Apple starts issuing lightweight security updates between software releases appeared first on Help Net Security.
http://news.poseidon-us.com/TRYh6w

VIAVI advances NetSecOps with unified threat forensics and retrospective analysis

VIAVI Solutions has announced its Observer Threat Forensics solution with an advanced retrospective analysis capability. The industry is shifting away from siloed network and security operations teams to a converged NetSecOps structure to close critical gaps in incident responses and strengthen resilience. Designed to increase visibility across operational teams, Observer Threat Forensics helps organizations identify potential vulnerabilities including post-detection analyses of a breach, the intrusion point and the exposed data. Observer Threat Forensics is built … More → The post VIAVI advances NetSecOps with unified threat forensics and retrospective analysis appeared first on Help Net Security.
http://news.poseidon-us.com/TRYh6p

Druva connects identity data and behavior to restore access after attacks

Druva has revealed Druva Identity Resilience, adding support for Okta and Microsoft Active Directory alongside Microsoft Entra ID. Druva Identity Resilience delivers unified protection, cyber recovery, and threat detection and response in a single SaaS platform, bringing disparate identity providers together so security and IT teams can restore trusted access through one coordinated process. Identity-driven attacks have reached a tipping point, with nearly 90% of incident response investigations now tracing back to identity compromise. In … More → The post Druva connects identity data and behavior to restore access after attacks appeared first on Help Net Security.
http://news.poseidon-us.com/TRYh6L