433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Google to penalize sites that hijack the back button

Google is broadening its spam policies to crack down on “back button hijacking,” a deceptive practice where websites interfere with browser navigation, blocking users from returning to the page they came from. Instead, users are usually redirected to pages they have not visited or are shown unsolicited recommendations or ads. “Back button hijacking interferes with the browser’s functionality, breaks the expected user journey, and results in user frustration. People report feeling manipulated and less willing … More → The post Google to penalize sites that hijack the back button appeared first on Help Net Security.
http://news.poseidon-us.com/TS1yck

AI adoption is outpacing the safeguards around it

AI is becoming part of professional and private life, reaching mainstream adoption faster than the personal computer or the internet. These systems are tested in reasoning, safety, and real-world tasks, but the reliability of those measurements remains uncertain. The 2026 AI Index from Stanford’s Institute for Human-Centered Artificial Intelligence outlines the broader environment around this growth, including economic value, labor market effects, and the role of AI sovereignty. It also examines developments in science and … More → The post AI adoption is outpacing the safeguards around it appeared first on Help Net Security.
http://news.poseidon-us.com/TS1ycC

Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready

In this Help Net Security interview, Idan Habler, AI Security Researcher at Cisco, breaks down a threat most security teams haven’t named yet: agentic memory as an attack surface. Habler walks through MemoryTrap, a disclosed and remediated method to compromise Claude Code’s memory, showing how a single poisoned memory object can spread across sessions, users, and subagents. He explains why AI memory needs the same governance as secrets and identities, and what organizations must rebuild … More → The post Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready appeared first on Help Net Security.
http://news.poseidon-us.com/TS1rCr

Review: The Psychology of Information Security

Security controls fail when they are designed without regard for the people who must use them. That is the central argument of Leron Zinatullin’s second edition, and it is an argument he builds methodically across 17 chapters that draw from organizational psychology, change management, and usability research. About the author Leron Zinatullin is the CISO of Constantinople, a provider of AI-native banking. He’s also a speaker and advisor to startups. He has led large scale, … More → The post Review: The Psychology of Information Security appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lMF

29 million leaked secrets in 2025: Why AI agents credentials are out of control

AI agents need credentials to work. They authenticate with LLM platforms, connect to databases, call SaaS APIs, access cloud resources, and orchestrate across dozens of external services. Every integration point requires an identity. Most organizations are handling this badly, and the evidence is in the code. GitGuardian’s State of Secrets Sprawl Report found 28,649,024 new secrets exposed in public GitHub commits across 2025, a 34% year-over-year increase and the largest annual jump in the report’s … More → The post 29 million leaked secrets in 2025: Why AI agents credentials are out of control appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lMD

Zero trust at year two: What nobody planned for

In this Help Net Security video, Jim Alkove, CEO of Oleria, walks through where zero trust programs typically stand one to two years in. Most organizations have made gains in endpoint security and network segmentation, but identity remains the stubborn problem. Identity sprawl, legacy system exceptions, and workforce friction each contribute to stalls that few programs anticipated. Alkove then turns to a challenge most teams are not prepared for: AI agents operating at scale. A … More → The post Zero trust at year two: What nobody planned for appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lMC

Cybersecurity jobs available right now: April 14, 2026

Cyber Security Engineer/Application Security Specialist Tecnots | India | On-site – View job details As a Cyber Security Engineer/Application Security Specialist, you will integrate security into the SDLC, perform application security reviews, and support secure APIs, authentication, and data protection. You will embed security into CI/CD pipelines using SAST and DAST, enforce secure coding practices, and support remediation. You will secure cloud and on-prem environments, including Microsoft Azure, manage IAM and access controls, and handle … More → The post Cybersecurity jobs available right now: April 14, 2026 appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lLY