433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Protectt.ai enhances AppProtectt with advanced RASP and AI-driven mobile threat protection

Protectt.ai has launched the latest version of AppProtectt, its mobile application security solution featuring advanced Runtime Application Self-Protection (RASP) and AI-led behavioral monitoring. Protectt.ai works with leading banking, financial services, insurance, and digital-first enterprises to secure high-risk mobile applications against fraud, tampering, and emerging cyber threats. The latest release introduces enhanced runtime protection capabilities and intelligent, policy-driven controls designed to help organizations across the Middle East deliver secure, compliant, and resilient mobile app experiences. As … More → The post Protectt.ai enhances AppProtectt with advanced RASP and AI-driven mobile threat protection appeared first on Help Net Security.
http://news.poseidon-us.com/TR2mDc

Virtana expands MCP Server to bring full-stack enterprise context to AI agents

Virtana announced the latest version of its Model Context Protocol (MCP) Server, bringing full-stack enterprise visibility directly to AI agents and LLMs so machines can understand enterprise operations as complete systems rather than isolated signals. Opening the Virtana platform to a broad ecosystem of AI agents, automation systems, and large language models (LLMs), such as OpenAI’s ChatGPT, Anthropic’s Claude, Google Gemini, and Microsoft Copilot, enables AI to execute full-stack decisions across end-to-end enterprise environments, advancing … More → The post Virtana expands MCP Server to bring full-stack enterprise context to AI agents appeared first on Help Net Security.
http://news.poseidon-us.com/TR2mDZ

Compliance Scorecard v10 delivers context-driven AI for explainable compliance decisions

Compliance Scorecard announced the release of v10, introducing governed, audit-ready AI designed to support defensible compliance decision-making for managed service providers (MSPs). Compliance Scorecard v10 applies AI only within a structured system of validated context and controls. The platform is built on a simple premise: AI can only be trusted in compliance if the required context already exists. As a result, v10 treats AI as a governed system of decision support, not a conversational interface. … More → The post Compliance Scorecard v10 delivers context-driven AI for explainable compliance decisions appeared first on Help Net Security.
http://news.poseidon-us.com/TR2mCG

Public mobile networks are being weaponized for combat drone operations

On June 1, 2025, Ukraine launched a coordinated drone strike on five airfields inside Russia, disabling or destroying aircrafts. The attack involved more than 100 drones carrying explosive payloads and targeting aircraft on the ground. The drones used mobile networks to transmit telemetry, receive instructions, and send back images during the operation, highlighting the integration of civilian mobile networks into combat drone operations. Types of UAV Communication Systems (Source: Enea) Enea researchers examined the progression … More → The post Public mobile networks are being weaponized for combat drone operations appeared first on Help Net Security.
http://news.poseidon-us.com/TR2jCH

AI breakthrough could replace rare earth magnets in electric vehicles

Scientists at the University of New Hampshire have unleashed artificial intelligence to dramatically speed up the hunt for next-generation magnetic materials. By building a massive, searchable database of 67,573 magnetic compounds — including 25 newly recognized materials that stay magnetic even at high temperatures — the team is opening the door to cheaper, more sustainable technologies.
http://news.poseidon-us.com/TR2f7f

From Acceleration to Exposure: Why AI Demands Mature AppSec

Snyk explores how Implementing mature AppSec with enforceable policies, continuous monitoring, and integrated security tooling is critical to maintain control in high-velocity environments AI-driven development is increasing release velocity, but immature AppSec programs struggle to keep pace, allowing vulnerabilities, insecure dependencies, and misconfigurations to propagate at machine speed. Autonomous AI decisions across the SDLC expand the blast radius of small mistakes and create visibility gaps for security teams.
http://news.poseidon-us.com/TR2dxf

Consumers feel less judged by AI debt collectors

Debt collection agencies are starting to use automated voice systems and AI-driven messaging to handle consumer calls. These systems help scale outreach, reduce call center staffing demands, and offer 24/7 service. A new study covering 11 European countries found that this shift changes how consumers emotionally experience debt collection, especially around stigma and empathy. The research evaluated consumer reactions to scripted debt collection phone calls involving either a human representative or an AI voice assistant. … More → The post Consumers feel less judged by AI debt collectors appeared first on Help Net Security.
http://news.poseidon-us.com/TR2dRC

Attackers keep finding the same gaps in security programs

Attackers keep getting in, often through the same predictable weak spots: identity systems, third-party access, and poorly secured perimeter devices. A new threat report from Barracuda based on Managed XDR telemetry from 2025 shows that many successful incidents still start with basic access and configuration failures, not advanced malware. The report draws on more than two trillion IT events, nearly 600,000 security alerts, and more than 300,000 protected assets monitored over the year. Barracuda’s SOC … More → The post Attackers keep finding the same gaps in security programs appeared first on Help Net Security.
http://news.poseidon-us.com/TR2dQz

China’s Zero-Day Pipeline: From Discovery to Deployment

China is consolidating cyber power through zero-days. Explore how state control of vulnerabilities enables long-term strategic advantage.
http://news.poseidon-us.com/TR2c1L

Cyber on the Geopolitical, Battlefield: Beyond the, “Big Fourˮ

Offensive cyber operations are spreading beyond the Big Four. Discover how regional conflicts are driving new state-linked cyber threats.
http://news.poseidon-us.com/TR2bxz