433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Google races to secure encryption before quantum threats arrive

Google is preparing for the quantum era, a turning point in digital security, with a 2029 timeline for post-quantum cryptography (PQC) migration. Security professionals warn that current encryption could be broken by large-scale quantum computers in the coming years. This risk is already relevant due to store-now-decrypt-later attacks. Google says organizations should adopt NIST-developed PQC standards before large-scale, fault-tolerant quantum computers become a reality. “That’s why we’ve adjusted our threat model to prioritize PQC migration … More → The post Google races to secure encryption before quantum threats arrive appeared first on Help Net Security.
http://news.poseidon-us.com/TRjNTZ

DataBahn brings AI-driven intelligence into the security pipeline

DataBahn.ai has announced Autonomous In-Stream Data Intelligence (AIDI), a new operating model for security data pipelines in which data is continuously interpreted, validated, and acted on in real time as it flows. Building on its AI-native foundation, DataBahn advances the pipeline from intelligent data preparation to an active system of in-stream decision-making, enabling organizations to detect issues earlier, adapt dynamically and ensure data is trusted before it reaches downstream systems. DataBahn is also introducing the … More → The post DataBahn brings AI-driven intelligence into the security pipeline appeared first on Help Net Security.
http://news.poseidon-us.com/TRjHjG

AI SOC vendors are selling a future that production deployments haven’t reached yet

Vendors selling AI-powered security operations platforms have built their pitches around a consistent set of promises: autonomous threat investigation, dramatic reductions in analyst workload, and an accelerating path toward humanless operations. Practitioners buying and deploying those platforms describe something different. A report by Anton Chuvakin, Security Advisor at Google Cloud’s Office of the CISO, and Oliver Rochford, co-founder of Aunoo AI, draws on more than 30 vendor briefings, public practitioner commentary from Reddit and Discord, … More → The post AI SOC vendors are selling a future that production deployments haven’t reached yet appeared first on Help Net Security.
http://news.poseidon-us.com/TRjDxz

A nearly undetectable LLM attack needs only a handful of poisoned samples

Prompt engineering has become a standard part of how large language models are deployed in production, and it introduces an attack surface most organizations have not yet addressed. Researchers have developed and tested a prompt-based backdoor attack method, called ProAttack, that achieves attack success rates approaching 100% on multiple text classification benchmarks without altering sample labels or injecting external trigger words. A defense paradigm for mitigating backdoor attacks through LoRA-based fine-tuning of language models (Source: … More → The post A nearly undetectable LLM attack needs only a handful of poisoned samples appeared first on Help Net Security.
http://news.poseidon-us.com/TRjDxj

Your facilities run on fragile supply chains and nobody wants to admit it

In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building systems. She explains how sourcing, localized redundancy, and flexible infrastructure design are being integrated into resilience planning. Dodoo also shares practical approaches such as regional vendor networks, alternative contracts, and strategic inventory to maintain continuity during disruptions. Supply chains for critical building systems, HVAC components, fire suppression materials, access control hardware, … More → The post Your facilities run on fragile supply chains and nobody wants to admit it appeared first on Help Net Security.
http://news.poseidon-us.com/TRjDxW

Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair

Many enterprise Linux deployments rely on hardware-level memory isolation to protect sensitive workloads from co-tenants and compromised hypervisors. Oracle’s Unbreakable Enterprise Kernel 8.2 (UEK 8.2) extends that capability on Oracle Linux with support for Intel Trust Domain Extensions, along with a set of file system and memory management changes intended to reduce downtime and improve diagnostic visibility. UEK 8.2 is based on the mainline long-term stable Linux 6.12 kernel and carries the release number 6.12.0-200. … More → The post Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair appeared first on Help Net Security.
http://news.poseidon-us.com/TRjDwq

Who owns AI agent access? At most companies, nobody knows

AI agents are operating across production enterprise environments at scale, and the identity infrastructure managing their access has not kept up with their deployment. A January 2026 survey of 228 IT and security professionals, conducted by the Cloud Security Alliance, finds that the majority of organizations have AI agents active in core systems, with fragmented ownership of how those agents authenticate and what they can access. Agents are embedded in production systems Task-automation agents are … More → The post Who owns AI agent access? At most companies, nobody knows appeared first on Help Net Security.
http://news.poseidon-us.com/TRj8yW

New mission: turn regulatory “big ideas” into real-world results

“How do you be very creative and clever, i.e., ingenious, in both how you design and apply environmental regulations?” Hannah Safford said.
http://news.poseidon-us.com/TRj43h

As Marines head toward Iran, boots on ground still TBD

“It’s not a cakewalk, but if I was the Iranian military, I would be afraid that the Marines are coming,” Col. William Dunn said.
http://news.poseidon-us.com/TRj43c

New mission: turn regulatory “big ideas” into real-world results

“How do you be very creative and clever, i.e., ingenious, in both how you design and apply environmental regulations?” Hannah Safford said.
http://news.poseidon-us.com/TRj43Q