433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

What shadow AI means for SaaS security and integrations

In this Help Net Security video, Jaime Blasco, CTO at Nudge Security, discusses why shadow AI matters to security teams. He describes how AI adoption happens in two ways, through company led programs and through employees choosing tools on their own. That second path often happens without oversight, which creates risk when data, systems, or production environments are involved. Blasco walks through why security teams need visibility into AI tools, SaaS platforms, and the integrations … More → The post What shadow AI means for SaaS security and integrations appeared first on Help Net Security.
http://news.poseidon-us.com/TQ6PjB

From experiment to production, AI settles into embedded software development

AI-generated code is already running inside devices that control power grids, medical equipment, vehicles, and industrial plants. AI moves from experiment to production AI tools have become standard in embedded development workflows. More than 80% of respondents to a new RunSafe Security survey say they currently use AI to assist with tasks such as code generation, testing, or documentation. Another 20% say they are actively evaluating AI. No respondents report avoiding AI entirely. The study … More → The post From experiment to production, AI settles into embedded software development appeared first on Help Net Security.
http://news.poseidon-us.com/TQ6PhW

What if AI becomes conscious and we never know

A philosopher at the University of Cambridge says there’s no reliable way to know whether AI is conscious—and that may remain true for the foreseeable future. According to Dr. Tom McClelland, consciousness alone isn’t the ethical tipping point anyway; sentience, the capacity to feel good or bad, is what truly matters. He argues that claims of conscious AI are often more marketing than science, and that believing in machine minds too easily could cause real harm. The safest stance for now, he says, is honest uncertainty.
http://news.poseidon-us.com/TQ5cbl

Duplicati: Free, open-source backup client

Duplicati is an open source backup client that creates encrypted, incremental, compressed backup sets and sends them to cloud storage services or remote file servers. What the project is and where it runs Duplicati operates as a client side application designed to back up files and folders from endpoints and servers. It runs locally, collects selected data, packages it into backup volumes, and transfers those volumes to a configured destination. Restore operations support individual files, … More → The post Duplicati: Free, open-source backup client appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4xDB

What consumers expect from data security

Security teams spend years building controls around data protection, then a survey asks consumers a simple question about responsibility and the answer lands close to home. Most people believe they are in charge of their own data privacy, and they want systems that support that belief, according to the 2025 Data Privacy Research from the Software & Information Industry Association. The study examines how people view responsibility, cost, and acceptable data use. Personal agency shapes … More → The post What consumers expect from data security appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4xD3

Illegal streaming grew into an organized, profitable, and dangerous industry

Rising streaming prices are pushing more viewers toward illegal options. Movies, TV shows, and live sports are now spread across multiple platforms, and keeping up with all of them is expensive. When something is easy to access, works smoothly, and feels low risk, people adopt it. Over time, it stops feeling like an exception and starts feeling normal. Understanding the risks Research shows that one in ten people believe there is no risk in using … More → The post Illegal streaming grew into an organized, profitable, and dangerous industry appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4xC6

Security coverage is falling behind the way attackers behave

Cybercriminals keep tweaking their procedures, trying out new techniques, and shifting tactics across campaigns. Coverage that worked yesterday may miss how those behaviors appear today. The 2025 Threat-Led Defense Report from Tidal Cyber draws on tens of thousands of observed techniques and procedures collected through its threat intelligence platform. The study tracks adversary activity across campaigns, sectors, and regions, then maps that activity to MITRE ATT&CK behaviors. TTP evolution shows groups adapting in place Attacker … More → The post Security coverage is falling behind the way attackers behave appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4tWx

Ransomware’s new playbook is chaos

Ransomware threats are accelerating in scale, sophistication, and impact. Data reveals how evolving techniques, shifting payment trends, and AI-driven capabilities are reshaping the threat landscape, and raising the stakes for every organization. The weekend is prime time for ransomware Over half of organizations that experienced a ransomware event in the past year were hit during a weekend or holiday, according to a Semperis reportion, and fewer eyes on identity systems. Intruders know that reduced attention … More → The post Ransomware’s new playbook is chaos appeared first on Help Net Security.
http://news.poseidon-us.com/TQ4tW0