433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group

The Dutch intelligence and security services have identified a new Russia-affiliated threat group that has been breaching government organizations and commercial entities in Europe and North America, and they dubbed it Laundry Bear. “Compared to some other Russian threat actors under investigation by the services, Laundry Bear has a high success rate,” the Netherlands’ General Intelligence and Security Service (AIVD) and the Defence Intelligence and Security Service (MIVD) shared today. They attribute the group’s success … More → The post Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group appeared first on Help Net Security.
http://news.poseidon-us.com/TL15GJ

New MCP server from groundcover redefines LLM observability

A new MCP server, faster than any other on the market, is launching today from groundcover, the eBPF-driven observability platform. Developers can now enhance their AI-driven workflows with deep system context, powered by groundcover’s granular access to logs, metrics, and traces via eBPF. “AI is transforming software development and enabling teams to move faster than ever – but to ensure accuracy and reliability, AI needs the same deep context developers rely on,” said Orr Benjamin, … More → The post New MCP server from groundcover redefines LLM observability appeared first on Help Net Security.
http://news.poseidon-us.com/TL12ct

Vulnerabilities found in NASA’s open source software

Vulnerabilities in open source software developed and used in-house by NASA could be exploited to breach their systems, claims Leon Juranić, security researcher and founder of cybersecurity startup ThreatLeap. The vulnerabilities Juranić, whose AppSec credentials include founding and leading DefenseCode, is no stranger NASA: in 2009, he discovered and reported a number of serious vulnerabilities in NASA’s Common Data Format (CDF) software library, which ended up getting fixed by the developers. His latest probing of … More → The post Vulnerabilities found in NASA’s open source software appeared first on Help Net Security.
http://news.poseidon-us.com/TL12Yb

Metrology for Digital Twins: Connecting CHIPS Metrology and SMART USA

This is a two-part CHIPS Metrology + SMART USA workshop series, focused on building meaningful connections between SMART USA members and CHIPS Metrology-funded research teams. The first event will be a virtual on June 17, 2025 that will set the
http://news.poseidon-us.com/TL0wRt

Why app modernization can leave you less secure

Enterprises typically “modernize” access patterns for an application by enabling industry standard protocols like OIDC or SAML to provide single sign-on (SSO) for legacy apps via a cloud identity provider (IDP). That’s a major step towards better user experience, improved credential hygiene, and centralized authentication, but it is not enough. Most modernization projects stop at the authentication layer, believing that identity transformation is complete once SAML or OIDC is wired up. What’s often overlooked is … More → The post Why app modernization can leave you less secure appeared first on Help Net Security.
http://news.poseidon-us.com/TL0fFX

How AI agents reshape industrial automation and risk management

In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the cybersecurity implications of deploying AI agents in industrial environments. He talks about the risks that come with AI agents making semi-autonomous decisions, and why a layered security approach like Defense-in-Depth is key to keeping industrial systems safe. What are the implications of an AI agent being compromised in a critical infrastructure environment, such as an … More → The post How AI agents reshape industrial automation and risk management appeared first on Help Net Security.
http://news.poseidon-us.com/TL0fCs

How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data. Recently, more of these schemes have been linked to North Korea. They don’t just steal crypto or deliver malware. Now, they log into your systems as employees. This is no longer just a cybersecurity issue, it’s a growing geopolitical threat. There may be hundreds of thousands … More → The post How well do you know your remote IT worker? appeared first on Help Net Security.
http://news.poseidon-us.com/TL0f9k

4.5% of breaches now extend to fourth parties

Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk assessments, conducted annually or quarterly, are too slow to detect active threats. 35.5% of all breaches in 2024 were third-party related, a 6.5% increase from 2023. This figure is likely conservative due to underreporting and misclassification. So while you’re updating your firewall rules, somewhere in your supply chain a vendor might be inadvertently letting in … More → The post 4.5% of breaches now extend to fourth parties appeared first on Help Net Security.
http://news.poseidon-us.com/TL0bwF