433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode

Binarly released the Binarly Transparency Platform 3.5 with Java ecosystem support, enterprise-grade YARA integration, and operational upgrades. With this update, Binarly’s cryptographic algorithm identification engine now supports Java archives (JARs) and JVM bytecode, scanning both standalone and embedded files inside Docker containers or firmware. This means organizations can finally see what cryptographic primitives their Java-based products depend on, without needing access to source code. Built on Code Property Graph (CPG) analysis, the new engine tracks … More → The post Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode appeared first on Help Net Security.
http://news.poseidon-us.com/TP62SX

OpenGuardrails: A new open-source model aims to make AI safer for real-world use

When you ask a large language model to summarize a policy or write code, you probably assume it will behave safely. But what happens when someone tries to trick it into leaking data or generating harmful content? That question is driving a wave of research into AI guardrails, and a new open-source project called OpenGuardrails is taking a bold step in that direction. Created by Thomas Wang of OpenGuardrails.com and Haowen Li of The Hong … More → The post OpenGuardrails: A new open-source model aims to make AI safer for real-world use appeared first on Help Net Security.
http://news.poseidon-us.com/TP605q

Bitdefender GravityZone Security Data Lake unifies telemetry from multiple tools

Bitdefender announced Bitdefender GravityZone Security Data Lake and Data Lake for Managed Detection and Response (MDR), solutions that help organizations cut through alert overload and complexity by unifying security telemetry from multiple tools into a single, intelligent platform. The new offering simplifies security operations with advanced analytics and expert-driven response, delivering the visibility of a modern Security Information and Event Management (SIEM) while reducing investigation time and total cost of ownership. Organizations face challenges with … More → The post Bitdefender GravityZone Security Data Lake unifies telemetry from multiple tools appeared first on Help Net Security.
http://news.poseidon-us.com/TP6056

Prismatic gives AI agents the guardrails and structure they need to operate reliably in production

Prismatic announced its MCP flow server for production-ready AI integrations. The new offering enables companies to transform fragile AI toolchains into reliable, deterministic workflows that can securely power mission-critical applications. AI agents are now embedded in every workflow — from customer support to writing code to data analysis — but connecting them to real-world systems remains unreliable. Product teams expose individual API endpoints as MCP tools, leaving large language models (LLMs) to make dozens of … More → The post Prismatic gives AI agents the guardrails and structure they need to operate reliably in production appeared first on Help Net Security.
http://news.poseidon-us.com/TP5xg1

Enterprises are losing track of the devices inside their networks

Security teams are often surprised when they discover the range and number of devices connected to their networks. The total goes far beyond what appears in agent-based telemetry or old manual asset inventories. Enterprise networks face broader exposure from xIoT expansion Forescout analyzed 10 million devices across more than 700 organizations active in October 2025. About two-thirds of those devices weren’t traditional IT like workstations, laptops, servers, or hypervisors. Instead, they included network gear such … More → The post Enterprises are losing track of the devices inside their networks appeared first on Help Net Security.
http://news.poseidon-us.com/TP5xdt

Humans built the problem, AI just scaled it

Information moves across cloud platforms, personal devices, and AI tools, often faster than security teams can track it. Proofpoint’s 2025 Data Security Landscape report shows that most organizations faced data loss last year, usually caused by their own people. With AI agents part of daily operations, security leaders are confronting risks that come from users and from the systems acting on their behalf. A familiar problem that keeps getting worse 85% of the companies experienced … More → The post Humans built the problem, AI just scaled it appeared first on Help Net Security.
http://news.poseidon-us.com/TP5w7Y

What shadow AI means for your company’s security

In this Help Net Security video, Peled Eldan‏, Head of Research at XM Cyber, explains the hidden risks of shadow AI. He describes how employees often use unapproved AI tools at work to save time or solve problems, even when approved tools are available. This behavior, though common, can lead to serious issues such as data leaks, compliance violations, and security blind spots. Eldan outlines how sensitive company or client data can leave the organization’s … More → The post What shadow AI means for your company’s security appeared first on Help Net Security.
http://news.poseidon-us.com/TP5w7V

Retailers are learning to say no to ransom demands

Ransomware remains one of the biggest operational risks for retailers, but the latest data shows a shift in how these attacks unfold. Fewer incidents now lead to data encryption, recovery costs have dropped, and businesses are bouncing back faster. Yet attackers are demanding more money, and security teams are feeling the strain. These findings come from the State of Ransomware in Retail 2025 report by Sophos, based on a global survey of 361 retail IT … More → The post Retailers are learning to say no to ransom demands appeared first on Help Net Security.
http://news.poseidon-us.com/TP5w63

Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)

[This is a Guest Diary by David Hammond, an ISC intern as part of the SANS.edu BACS program]
http://news.poseidon-us.com/TP5q5h

Cloudflare Scrubs Aisuru Botnet from Top Domains List

For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru’s overlords are using the botnet to boost their malicious domain rankings, while simultaneously attacking the company’s domain name system (DNS) service.
http://news.poseidon-us.com/TP5q5K