433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

SonicWall cloud backup hack was the work of a state actor

Incident responders from Mandiant have wrapped up their investigation into the SonicWall cloud backup service hack, and the verdict is in: the culprit is a state-sponsored threat actor (though the specific nation wasn’t disclosed). “[The incident] was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call. The incident is unrelated to ongoing global Akira ransomware attacks on firewalls and other edge devices,” SonicWall said on Tuesday. … More → The post SonicWall cloud backup hack was the work of a state actor appeared first on Help Net Security.
http://news.poseidon-us.com/TP6QZB

Federal employees are reporting major workplace disruptions at nearly triple the national average

In a year of sweeping workforce overhauls, federal employees are reporting high levels of disruption, and low levels of engagement, new data from Gallup shows. The post Federal employees are reporting major workplace disruptions at nearly triple the national average first appeared on Federal News Network.
http://news.poseidon-us.com/TP6MvF

Prowler embeds AI directly into security workflows

Prowler launched Prowler Lighthouse AI, an intelligent security assistant and MCP Server, that brings autonomous AI directly into DevSecOps workflows. Available immediately, Prowler’s AI innovations combine agentic reasoning with automation to accelerate risk analysis, streamline compliance and guide teams through faster remediation across multi-cloud environments. This dual launch marks a defining moment for Prowler, establishing it as the first open cloud-security platform to embed AI at the core of security workflows. Cloud security at AI … More → The post Prowler embeds AI directly into security workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TP6HJQ

Malicious Infrastructure Finds Stability with aurologic GmbH

This investigative report reveals how German hosting provider aurologic GmbH has become a central enabler of malicious internet infrastructure, linking numerous threat activity networks while operating under a veneer of legal neutrality and regulatory ambiguity.
http://news.poseidon-us.com/TP69CY

Russia-linked hackers intensify attacks as global APT activity shifts

State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET’s APT Activity Report covering April through September 2025. The research highlights how operations linked to Russia, China, Iran, and North Korea have evolved in scope and technique, showing that nation-state activity remains a constant source of disruption. Attack sources (Source: ESET) Russia’s focus on Ukraine and its allies Russia-linked actors remained among the … More → The post Russia-linked hackers intensify attacks as global APT activity shifts appeared first on Help Net Security.
http://news.poseidon-us.com/TP68vt

1touch.io Kontxtual provides LLM-driven control over sensitive data

1touch.io unveils Kontxtual, an AI-driven data platform engineered for the AI era. Built to accelerate enterprise innovation without compromising control, Kontxtual harnesses the power of AI and LLMs to deliver real-time data, identity, usage, and risk insights, assuring sovereignty and security throughout the entire AI lifecycle. It enables rapid deployment and integration across any environment, cloud, on-premises, or mainframe. Tailored for today’s data security, privacy, and AI governance challenges, the platform unifies data classification, DSPM, … More → The post 1touch.io Kontxtual provides LLM-driven control over sensitive data appeared first on Help Net Security.
http://news.poseidon-us.com/TP64pv

Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows

Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities. Building on Aptori’s AI Triage, which delivers deterministic vulnerability validation, Code-Q extends that intelligence into verified code correction, bridging the gap between detection and secure delivery. The bottleneck between knowing and fixing Enterprises have made progress in detecting vulnerabilities, but remediation remains a persistent bottleneck. Even after a vulnerability is … More → The post Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TP64pN

Enhancing software supply chain security with Microsoft’s Signing Transparency

Microsoft is announcing the preview of Signing Transparency to address software supply chain threats that traditional code signing alone cannot fully prevent, building on the Zero Trust principle of “never trust, always verify.” Signing Transparency uses an append-only log to verifiably record each signature, with keys protected in a secure confidential computing enclave. The post Enhancing software supply chain security with Microsoft’s Signing Transparency appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TP63cY

Resiliency in the cloud—empowered by shared responsibility and Azure Essentials

Empowering organizations to shape the future of cloud with resilient, always-on solutions. The post Resiliency in the cloud—empowered by shared responsibility and Azure Essentials appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TP63bV

GitHub Universe 2025: Where developer innovation took center stage

At GitHub Universe 2025, the theme was clear: the ability to see, steer, and build across agents will bring the greatest impact. The post GitHub Universe 2025: Where developer innovation took center stage appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TP63ZP