433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Why stolen credentials remain cybercriminals’ tool of choice

It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household classic that wasn’t invented to be elegant or high tech. It was made to work whether dealing with a leaky tent or an inconvenient puncture – a reliable way to just get the job done in a sticky situation. Stolen credentials play a similar role in … More → The post Why stolen credentials remain cybercriminals’ tool of choice appeared first on Help Net Security.
http://news.poseidon-us.com/TMCfCL

Palo Alto Networks to acquire CyberArk in $25 billion deal

Palo Alto Networks and CyberArk announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the agreement, CyberArk shareholders will receive $45.00 in cash and 2.2005 shares of Palo Alto Networks common stock for each CyberArk share. This represents an equity value of approximately $25 billion for CyberArk and a 26% premium to the unaffected 10-day average of the daily VWAPs of CyberArk as … More → The post Palo Alto Networks to acquire CyberArk in $25 billion deal appeared first on Help Net Security.
http://news.poseidon-us.com/TMCf9S

New AI model offers faster, greener way for vulnerability detection

A team of researchers has developed a new AI model, called White-Basilisk, that detects software vulnerabilities more efficiently than much larger systems. The model’s release comes at a time when developers and security teams face mounting pressure to secure complex codebases, often without the resources to deploy large-scale AI tools. A compact model with big results Unlike LLMs, which can require billions of parameters and heavy computational power, White-Basilisk is compact, with just 200 million … More → The post New AI model offers faster, greener way for vulnerability detection appeared first on Help Net Security.
http://news.poseidon-us.com/TMCf84

AI is changing the vCISO game

Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and MSSPs now offer vCISO services, up from just 21% in 2024. This sharp increase aligns with the previous year’s predictions, when nearly three-quarters of non-adopters stated they planned to launch these services by the end … More → The post AI is changing the vCISO game appeared first on Help Net Security.
http://news.poseidon-us.com/TMCb9Y

Secrets are leaking everywhere, and bots are to blame

Secrets like API keys, tokens, and credentials are scattered across messaging apps, spreadsheets, CI/CD logs, and even support tickets. According to Entro Security’s NHI & Secrets Risk Report H1 2025, non-human identities (NHIs), including bots, service accounts, and automation tools, are now the fastest-growing source of security risk in enterprise environments. Non-human identity risk fuels rising secret exposures Between January and June 2025, Entro saw a 44% year-over-year increase in NHIs. These machine identities now … More → The post Secrets are leaking everywhere, and bots are to blame appeared first on Help Net Security.
http://news.poseidon-us.com/TMCb8Z

Why rural hospitals are losing the cybersecurity battle

Cyber threats are becoming more frequent and sophisticated, and rural hospitals and clinics are feeling the pressure from all sides: tight budgets, small teams, limited training, complex technology, and vendors that do not always offer much help. Often, they are left juggling security tools without the IT support to use them effectively, according to Paubox. Compared to their urban counterparts, rural healthcare organizations are hitting more cybersecurity roadblocks, and not just in one or two … More → The post Why rural hospitals are losing the cybersecurity battle appeared first on Help Net Security.
http://news.poseidon-us.com/TMCb7T

ISC Stormcast For Thursday, July 31st, 2025 https://isc.sans.edu/podcastdetail/9550, (Thu, Jul 31st)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TMCX4B

Congress presses DoD to accelerate adoption of phishing-resistant authentication

“Seeing both the House and Senate weigh in should make clear that this should be a bigger priority than it has been,” Jeremy Grant said. The post Congress presses DoD to accelerate adoption of phishing-resistant authentication first appeared on Federal News Network.
http://news.poseidon-us.com/TMCQCk

Congress presses DoD to accelerate adoption of phishing-resistant authentication

“Seeing both the House and Senate weigh in should make clear that this should be a bigger priority than it has been,” Jeremy Grant said. The post Congress presses DoD to accelerate adoption of phishing-resistant authentication first appeared on Federal News Network.
http://news.poseidon-us.com/TMCQ5M

Congress presses DoD to accelerate adoption of phishing-resistant authentication

“Seeing both the House and Senate weigh in should make clear that this should be a bigger priority than it has been,” Jeremy Grant said. The post Congress presses DoD to accelerate adoption of phishing-resistant authentication first appeared on Federal News Network.
http://news.poseidon-us.com/TMCQ4x