433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Iran-linked APT targets US critical sectors with new backdoors

An Iran-linked hacking group has been active inside the networks of several US organizations since early February, raising concerns that the activity could precede broader cyber operations connected to escalating geopolitical tensions in the Middle East. New backdoors used by Seedworm Symantec and Carbon Black researchers have attributed the activity to Seedworm (aka MuddyWater), an Iranian advanced persistent threat (APT) group that has been linked to Iran’s Ministry of Intelligence and Security (MOIS), and is … More → The post Iran-linked APT targets US critical sectors with new backdoors appeared first on Help Net Security.
http://news.poseidon-us.com/TRKz99

Microsoft working on Teams feature to keep unauthorized bots at bay

Microsoft plans to add a new Teams feature that lets meeting admins identify and control third-party bots before they join. According to the Microsoft 365 Roadmap, the feature is scheduled to begin rolling out in May 2026 on Desktop, Mac, Linux, iOS, and Android versions of Microsoft Teams. Bots that are part of a company’s internal tools and used for transcription and taking notes are generally considered lower risk. Security risks come from malicious bots … More → The post Microsoft working on Teams feature to keep unauthorized bots at bay appeared first on Help Net Security.
http://news.poseidon-us.com/TRKz7l

New cyber module strengthens risk planning for health organizations

The Administration for Strategic Preparedness and Response’s (ASPR) new cybersecurity module in the Risk Identification and Site Criticality (RISC) 2.0 Toolkit helps organizations identify critical gaps, prioritize investments, and make informed decisions about risk mitigation to reduce disruptions to patient care and strengthen resilience. Healthcare leaders identified cloud-related threats, quantum computing risks, and attacks on connected products as the three areas where they feel least prepared. “Cyber threats are growing more sophisticated. This module is … More → The post New cyber module strengthens risk planning for health organizations appeared first on Help Net Security.
http://news.poseidon-us.com/TRKt6z

Hexnode IdP brings device-aware authentication and zero trust to enterprise access

Hexnode has announced the launch of Hexnode IdP. By introducing this native identity layer, Hexnode delivers enterprise-grade authentication and identity management within a single, unified framework. While debuting as a dedicated Identity Provider (IdP), the solution marks a significant expansion of the Hexnode ecosystem, acting as a comprehensive identity engine that integrates directly into the Hexnode UEM fabric. This integration enables organizations to leverage Hexnode’s proprietary Device Trust Engine to enforce context-aware policies based on … More → The post Hexnode IdP brings device-aware authentication and zero trust to enterprise access appeared first on Help Net Security.
http://news.poseidon-us.com/TRKmfn

Cyolo PRO 7.0 expands OT-first secure remote access with AI session intelligence

Cyolo has released Cyolo PRO (Privileged Remote Operations) v7.0, a major update that expands OT-first secure remote access and strengthens protection for critical infrastructure and industrial environments without disrupting operations. Secure remote access (SRA) tools focus primarily on managing access. Cyolo has always delivered a more holistic approach, designed to govern all scopes of access and provide proactive protection across the CPS environment. Cyolo PRO 7.0 introduces new capabilities, including AI-powered session intelligence, OT asset … More → The post Cyolo PRO 7.0 expands OT-first secure remote access with AI session intelligence appeared first on Help Net Security.
http://news.poseidon-us.com/TRKmfS

Cursor Automations turns code review and ops into background tasks

Cursor Automations, the always-on agent platform from Cursor, is expanding with a new generation of autonomous systems that streamline code review, incident response, and other engineering workflows. The platform runs AI agents on schedules or in response to development events. These triggers include merged pull requests on GitHub, newly created issues in Linear, messages sent in Slack, incidents reported through PagerDuty, and custom webhook events. Cursor aims to help engineering teams keep up with the … More → The post Cursor Automations turns code review and ops into background tasks appeared first on Help Net Security.
http://news.poseidon-us.com/TRKmbB

OpenAI’s GPT-5.4 doubles down on safety as competition heats up

In the midst of recent developments and controversies surrounding a contract with the U.S. Department of Defense, OpenAI released the GPT-5.4 model. The release comes at a time when users are reportedly leaving ChatGPT for rival chatbots, particularly Anthropic’s Claude. GPT-5.4 is rolling out gradually across ChatGPT and Codex and is available through the API as gpt-5.4. In ChatGPT, GPT-5.4 Thinking is available to Plus, Team, and Pro users, while Enterprise and Edu customers can … More → The post OpenAI’s GPT-5.4 doubles down on safety as competition heats up appeared first on Help Net Security.
http://news.poseidon-us.com/TRKhSz

March 2026 Patch Tuesday forecast: Is AI security an oxymoron?

Developers and analysts are using more AI tools to produce code and to test both the performance and security of the finished products. They are also embedding AI functionality in their products directly. But just how secure are these AI tools and routines themselves? Recent reports show they suffer from vulnerabilities just like any other code. For example, Google recently provided an update for CVE-2026-0628, associated with Gemini AI implemented in the Chrome browser. This … More → The post March 2026 Patch Tuesday forecast: Is AI security an oxymoron? appeared first on Help Net Security.
http://news.poseidon-us.com/TRKhQQ

Backup strategies are working, and ransomware gangs are responding with data theft

Business email compromise (BEC) and funds transfer fraud combined for 58% of all cyber insurance claims filed in 2025, according to data from Coalition covering more than 100,000 policyholders across the United States, Canada, the United Kingdom, Australia, and Germany. BEC was the single most common claim type at 31%, with frequency rising 15% year over year to 0.47%. Average losses per BEC incident dropped 28% to $27,000, a decline attributed to faster detection and … More → The post Backup strategies are working, and ransomware gangs are responding with data theft appeared first on Help Net Security.
http://news.poseidon-us.com/TRKdGw