433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Pro-Russian hacktivist campaigns continue against UK organizations

The UK’s National Cyber Security Centre reports ongoing cyber operations by Russian-aligned hacktivist groups targeting organizations in the UK and abroad. NoName057(16) remains active In December 2025, the NCSC co signed an advisory warning that pro-Russian hacktivist groups were conducting cyber operations worldwide against organizations and critical infrastructure sectors. One group highlighted by the NCSC is NoName057(16), which has been active since March 2022. The group has targeted government and private sector entities across NATO … More → The post Pro-Russian hacktivist campaigns continue against UK organizations appeared first on Help Net Security.
http://news.poseidon-us.com/TQTDWl

cside targets hidden website privacy violations with Privacy Watch

cside announced the launch of Privacy Watch. The platform prevents website privacy violations on the client-side, a risk surface that is traditionally unmonitored. To help organizations automate compliance with regulations like GDPR, CPRA, and HIPAA, Privacy Watch deploys AI for continuous website risk monitoring, evidence logs, and regulation-specific reports. Privacy violations from third-party scripts on websites go unnoticed until there is an incident or audit. 94% of modern websites use third party scripts but privacy … More → The post cside targets hidden website privacy violations with Privacy Watch appeared first on Help Net Security.
http://news.poseidon-us.com/TQTDWb

Cybercriminals speak the language young people trust

Criminal groups actively recruit, train, and retain people in structured ways. They move fast, pay in crypto, and place no weight on age. Young people are dealing with a new kind of addiction. It isn’t drugs, alcohol, or gambling. It’s screens. Constant time online chips away at attention, confidence, and judgment, and pushes young people toward views and choices that don’t always work in their favour. Children are drawn into organized crime for many reasons, … More → The post Cybercriminals speak the language young people trust appeared first on Help Net Security.
http://news.poseidon-us.com/TQT3ZP

Bandit: Open-source tool designed to find security issues in Python code

Bandit is an open-source tool that scans Python source code for security issues that show up in everyday development. Many security teams and developers use it as a quick way to spot risky coding patterns early in the lifecycle, especially in projects that already rely on automated linting and testing. The tool works by examining Python code structure and matching it against a set of security-focused rules. Each finding points to a specific line of … More → The post Bandit: Open-source tool designed to find security issues in Python code appeared first on Help Net Security.
http://news.poseidon-us.com/TQT3Z7

Security leaders push for continuous controls as audits stay manual

Security teams say they want real-time insight into controls, but still rely on periodic checks that trail daily operations. New RegScale research shows how wide that gap remains and where organizations are directing time, staff, and budget to manage it. How organizations measure the ROI of AI tools in their GRC programs (Source: RegScale) Manual work still shapes compliance programs Manual processes continue to drive how organizations handle compliance. Security and risk teams spend thousands … More → The post Security leaders push for continuous controls as audits stay manual appeared first on Help Net Security.
http://news.poseidon-us.com/TQT1Mx

Unbreakable? Researchers warn quantum computers have serious security flaws

Quantum computers could revolutionize everything from drug discovery to business analytics—but their incredible power also makes them surprisingly vulnerable. New research from Penn State warns that today’s quantum machines are not just futuristic tools, but potential gold mines for hackers. The study reveals that weaknesses can exist not only in software, but deep within the physical hardware itself, where valuable algorithms and sensitive data may be exposed.
http://news.poseidon-us.com/TQSRR1

HackerOne extends Safe Harbor protections to AI testing

HackerOne has unveiled the Good Faith AI Research Safe Harbor, a new industry framework that establishes authorisation and legal protections for researchers testing AI systems in good faith. As AI systems scale rapidly across critical products and services, legal ambiguity around testing can slow responsible research and increase risk. The new safe harbor removes that friction by giving organisations and AI researchers a shared standard to find and fix AI risks faster and with greater … More → The post HackerOne extends Safe Harbor protections to AI testing appeared first on Help Net Security.
http://news.poseidon-us.com/TQSPNg

Ping Identity launches Universal Services for ongoing identity assurance

Ping Identity announced its Universal Services, a set of identity services that enable organizations to move beyond authentication and continuously establish, validate, and protect trust across every digital interaction. As impersonation attacks, synthetic identities, and AI-driven social engineering accelerate, enterprises can no longer rely on authentication alone. Trust established at login quickly erodes across onboarding, account recovery, help desks, and high-risk actions. These are exactly the moments where modern attackers target. At the same time, … More → The post Ping Identity launches Universal Services for ongoing identity assurance appeared first on Help Net Security.
http://news.poseidon-us.com/TQSPN0