433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cyber fraud network behind €5,93 million in losses dismantled in Spain

The Spanish National Police (Policía Nacional), working closely with the Bavarian State Criminal Police Office (Bayerisches Landeskriminalamt) and with support from Europol, has carried out an operation targeting the international criminal organization known as Black Axe. Black Axe is a highly structured, hierarchical group that originated in Nigeria and has a presence in dozens of countries worldwide. The network is suspected of being involved in a wide range of criminal activities, including cyber-enabled fraud, drug … More → The post Cyber fraud network behind €5,93 million in losses dismantled in Spain appeared first on Help Net Security.
http://news.poseidon-us.com/TQJ2xk

Debian 13.3 is now available with targeted corrections, updates

Debian 13.3 is the third maintenance update for the stable Debian 13 distribution, codenamed “trixie”. It updates package content to address security and other issues reported since the last point update. This release includes more than 100 adjustments and multiple security patches across a range of packages. It includes updates for core services and applications such as Apache HTTP Server, GNOME components, and container tools. Existing systems running Debian 13 can install the 13.3 update … More → The post Debian 13.3 is now available with targeted corrections, updates appeared first on Help Net Security.
http://news.poseidon-us.com/TQJ2wR

Crypto crime hits record levels as state actors move billions

Nation-state involvement in crypto increased in 2025, signaling a shift in how on-chain crime operates. Three waves of crypto crime (Source: Chainalysis) Research from Chainalysis shows that crypto-related crime has grown more organized over recent years, with illicit groups running large-scale on-chain infrastructure to support cross-border criminal networks, procure services, and launder funds. That same infrastructure is being used by state actors, both through established professional service providers and through custom-built systems designed to evade … More → The post Crypto crime hits record levels as state actors move billions appeared first on Help Net Security.
http://news.poseidon-us.com/TQHwBt

Rethinking OT security for project heavy shipyards

In this Help Net Security interview, Hans Quivooij, CISO at Damen Shipyards Group, discusses securing OT and ICS in the shipyard. He outlines how project-based operations, rotating contractors, and temporary systems expand the threat surface and complicate access control. Quivooij also covers visibility in legacy environments and the risks introduced by IT and OT integration. Shipyards blend long-lived industrial equipment with short-lived projects and contractors. How does that project-based operating model change the threat surface … More → The post Rethinking OT security for project heavy shipyards appeared first on Help Net Security.
http://news.poseidon-us.com/TQHtQM

pfSense: Open-source firewall and routing platform

Firewalls, VPN access, and traffic rules need steady attention, often with limited budgets and staff. In that context, the open source pfSense Community Edition (CE) continues to show up in production environments, supported by a long-standing user community. pfSense CE is the free, open-source version of the pfSense firewall and routing platform. The software runs on standard x86 hardware, virtual machines, and some embedded systems, which keeps deployment flexible for small teams and labs. What … More → The post pfSense: Open-source firewall and routing platform appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6k

What security teams can learn from torrent metadata

Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate networks. Torrent traffic shows up in investigations tied to policy violations, insider risk, and criminal activity. A new research paper looks at that same torrent activity through an open source intelligence lens and asks how much signal security teams can extract from data that is already public. Data pipeline design Turning torrent metadata into intelligence Torrent files contain … More → The post What security teams can learn from torrent metadata appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6j

EU’s Chat Control could put government monitoring inside robots

Cybersecurity debates around surveillance usually stay inside screens. A new academic study argues that this boundary no longer holds when communication laws extend into robots that speak, listen, and move among people. Researchers Neziha Akalin and Alberto Giaretta examine the European Union’s proposed Chat Control regulation and its unintended impact on human robot interaction. The continuum of surveillance, from watching public spaces, to listening in private communications, to acting within embodied environments. A brief look … More → The post EU’s Chat Control could put government monitoring inside robots appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6h

Downtime pushes resilience planning into security operations

CISOs describe a shift in how they define success. New research from Absolute Security shows broad agreement that resilience outweighs security goals centered on prevention alone. Security leaders increasingly define their role around keeping the business operating through disruption. The cost of recovery (Source: Asolute Security) CISOs see themselves as responsible for recovery when incidents interrupt operations. Business continuity, endpoint restoration, and coordination with IT teams fall within their scope. Formal resilience strategies have become … More → The post Downtime pushes resilience planning into security operations appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6N

This new imaging technology breaks the rules of optics

Scientists have unveiled a new way to capture ultra-sharp optical images without lenses or painstaking alignment. The approach uses multiple sensors to collect raw light patterns independently, then synchronizes them later using computation. This sidesteps long-standing physical limits that have held optical imaging back for decades. The result is wide-field, sub-micron resolution from distances that were previously impossible.
http://news.poseidon-us.com/TQHDNl