433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Codenotary AgentMon monitors agentic AI activity and behavior

Codenotary launched AgentMon, an enterprise-grade monitoring designed specifically for agentic networks, providing organizations with real-time visibility into the security, performance and cost of AI-driven agents operating across the enterprise. As adoption of AI accelerates, agentic systems, semi-autonomous software agents that act on behalf of users and applications, are becoming embedded across business operations. The market for AI agents expected to grow at a 45% CAGR over the next five years, reports consulting firm BCG. AgentMon … More → The post Codenotary AgentMon monitors agentic AI activity and behavior appeared first on Help Net Security.
http://news.poseidon-us.com/TRp6DY

DoControl provides security coverage for Google Gemini Gems

DoControl announced new capabilities that provide visibility, monitoring, and automated control for Google Gemini Gems, a newly introduced feature within Google Gemini that enables teams to create customizable AI GPTs. With this launch, DoControl is the first platform to provide comprehensive security coverage for Google Gemini Gems, ensuring organizations can safely adopt this new technology without compromising control over their data. Addressing the next wave of AI security risk Google Gemini Gems are customizable GPTs … More → The post DoControl provides security coverage for Google Gemini Gems appeared first on Help Net Security.
http://news.poseidon-us.com/TRp6DX

EvilTokens ramps up device code phishing targeting Microsoft 365 users

Security researchers report a notable increase in device code phishing activity aimed at Microsoft 365 users, and have attributed this rise to the availability of EvilTokens, a new, specialized phishing toolkit that’s being offered as-a-service via Telegram. What is device code phishing? Device code phishing is a type of attack where attackers trick users into logging into their account by using a real authentication flow, then steal their access and refresh tokens. Microsoft provides the … More → The post EvilTokens ramps up device code phishing targeting Microsoft 365 users appeared first on Help Net Security.
http://news.poseidon-us.com/TRp6DV

Foxit flags hidden security risks in PDFs with new tool

Foxit Software introduced a new capability designed to uncover hidden security risks inside PDFs as part of its latest PDF Editor 2026.1 release for Windows and macOS. The update is led by PDF Action Inspector, a new tool that proactively scans documents for embedded JavaScript and self-modifying behaviors — threats that can bypass redaction, expose sensitive data, or alter document output without detection. As organizations rely on PDFs to share critical infrastructure, these risks have … More → The post Foxit flags hidden security risks in PDFs with new tool appeared first on Help Net Security.
http://news.poseidon-us.com/TRp6DR

Hacker stripped more than $50 million from Uranium crypto exchange, spent it on trading cards

US prosecutors have charged a Maryland man in connection with two hacks of the Uranium Finance cryptocurrency exchange that led to losses exceeding $50 million. Jonathan Spalletta, also known as “Cthulhon” and “Jspalletta,” is accused of abusing vulnerabilities in Uranium Finance smart contracts to siphon assets from the platform. If convicted, he could face up to 10 years in prison for computer fraud and 20 years for money laundering. “As alleged, Jonathan Spalletta repeatedly hacked … More → The post Hacker stripped more than $50 million from Uranium crypto exchange, spent it on trading cards appeared first on Help Net Security.
http://news.poseidon-us.com/TRp6DM

New Bitdefender assessment helps organizations identify and eliminate hidden internal attack paths

Bitdefender has announced the Bitdefender Internal Attack Surface Assessment, a complimentary evaluation that helps organizations identify and reduce hidden internal cyber risks caused by unnecessary user access to applications, tools, and operating system utilities commonly exploited in attacks. The assessment provides organizations with a data-driven view of their internal attack surface and offers actionable guidance to help prioritize and remediate exposure. Businesses face growing challenges defending against Living-Off-the-Land (LOTL), fileless, and other non-malware attack techniques, … More → The post New Bitdefender assessment helps organizations identify and eliminate hidden internal attack paths appeared first on Help Net Security.
http://news.poseidon-us.com/TRp6DF

Download: 2026 SANS Identity Threats & Defenses Survey

New research from the 2026 SANS Identity Threats & Defenses Survey shows that 55% of organizations experienced an identity-related compromise last year, while 26% reported MFA fatigue as a factor in identity attacks. Download the report to learn: Why identity compromises remain common How attackers abuse authentication systems using valid credentials Where organizations struggle to detect and contain identity threats Download the full report to see how identity attacks are evolving. The post Download: 2026 SANS Identity Threats & Defenses Survey appeared first on Help Net Security.
http://news.poseidon-us.com/TRp6C6

Windows 11 gets a rebuilt console engine with regex search, Sixel images and a 10x speed boost

Microsoft released Windows 11 Insider Preview Build 29558.1000 to the Canary Channel, part of the optional 29500 build series. The build carries a set of changes focused on the Windows Console, a handful of bug fixes, and small improvements to Settings and disk utilities. A rebuilt console The bulk of this build centers on the Windows Console, which is part of the open-source Windows Terminal project on GitHub. Microsoft is pulling accumulated contributions from that … More → The post Windows 11 gets a rebuilt console engine with regex search, Sixel images and a 10x speed boost appeared first on Help Net Security.
http://news.poseidon-us.com/TRnwV9

Apple counters ClickFix attacks with macOS Terminal warning

Apple has added a new security feature in macOS Tahoe 26.4 that warns users before they enter commands in Terminal that could cause harm. The goal is to stop ClickFix attacks, a social engineering trick that gets users to run malicious commands themselves. According to ESET, ClickFix activity jumped by more than 500% in the first half of 2025, making it the second-most common attack vector after phishing. The ClickFix tactic takes its name from … More → The post Apple counters ClickFix attacks with macOS Terminal warning appeared first on Help Net Security.
http://news.poseidon-us.com/TRnwV5