433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Firmware-level Android backdoor found on tablets from multiple manufacturers

A new Android backdoor embedded directly in device firmware can quietly take control of apps and harvest data, Kaspersky researchers found. The malware, named Keenadu, was discovered during an investigation into earlier Android threats and appears to have been inserted during the firmware build process, not after devices reached users.  How the backdoor works The research team said they found the backdoor code in the firmware of Android-based tablets belonging to several brands. “The … More → The post Firmware-level Android backdoor found on tablets from multiple manufacturers appeared first on Help Net Security.
http://news.poseidon-us.com/TR0sXQ

The surprisingly simple flaw that can undermine quantum encryption

Quantum key distribution promises ultra-secure communication by using the strange rules of quantum physics to detect eavesdroppers instantly. But even the most secure quantum link can falter if the transmitter and receiver aren’t perfectly aligned. Researchers have now taken a deep dive into this often-overlooked issue, building a powerful new analytical framework to understand how tiny beam misalignments—caused by vibrations, turbulence, or mechanical flaws—disrupt secure key generation.
http://news.poseidon-us.com/TR0kjj

Phobos ransomware affiliate arrested in Poland

Officers from Poland’s Central Bureau for Combating Cybercrime (CBZC) detained a 47-year-old man suspected of creating, acquiring, and sharing computer programs used to unlawfully obtain information stored in computer systems. He faces a potential prison sentence of up to five years. The arrest took place in the Małopolska Voivodeship as part of a joint operation conducted by CBZC officers from the Katowice and Kielce branches. During a search of the suspect’s apartment, officers recovered a … More → The post Phobos ransomware affiliate arrested in Poland appeared first on Help Net Security.
http://news.poseidon-us.com/TR0h5V

Fake Incident Report Used in Phishing Campaign, (Tue, Feb 17th)

This morning, I received an interesting phishing email. I’ve a “love & hate” relation with such emails because I always have the impression to lose time when reviewing them but sometimes it’s a win because you spot interesting “TTPs” (“tools, techniques &  procedures”). Maybe one day, I'll try to automate this process!
http://news.poseidon-us.com/TR0XX0

Your encrypted data is already being stolen

Quantum computing is often treated as a distant, theoretical cybersecurity issue. According to Ronit Ghose, Global Head, Future of Finance of Citi Institute, that mindset is already putting financial institutions at risk. The biggest misconception, he says, is that quantum threats begin on a single future Q-day, when quantum machines suddenly crack encryption. In reality, adversaries can harvest encrypted data today and decrypt it later, creating long-term exposure for banks handling sensitive identity and transaction … More → The post Your encrypted data is already being stolen appeared first on Help Net Security.
http://news.poseidon-us.com/TR0XCJ

REMnux v8 brings AI integration to the Linux malware analysis toolkit

REMnux, a specialized Linux distribution for malware analysis, has released version 8 with a rebuilt platform based on Ubuntu 24.04 and a new capability aimed at connecting AI agents directly to its toolset. REMnux is designed for analyzing malicious software, phishing artifacts, suspicious documents, and related forensic data. The project includes more than 200 preconfigured tools commonly used in malware analysis workflows. The REMnux v8 release arrived as Ubuntu 20.04 approached end-of-life, creating a deadline … More → The post REMnux v8 brings AI integration to the Linux malware analysis toolkit appeared first on Help Net Security.
http://news.poseidon-us.com/TR0SsJ

Cybersecurity jobs available right now: February 17, 2026

Chief Security Officer Seven Eleven Club & Hotels | India | On-site – View job details As a Chief Security Officer, you will oversee physical, operational, and cybersecurity programs, protect sensitive data and infrastructure, and assess risks to prevent incidents. You will lead incident response, ensure compliance with safety and data privacy regulations, educate staff on security best practices, advise leadership and the board, and manage day-to-day security operations, personnel, surveillance systems, and access controls. … More → The post Cybersecurity jobs available right now: February 17, 2026 appeared first on Help Net Security.
http://news.poseidon-us.com/TR0Srk

Agentic cloud operations: A new way to run the cloud

While today’s cloud delivers extraordinary flexibility, the rapid growth of modern applications and AI workloads has introduced levels of scale and complexity that traditional operations were not designed for. The post Agentic cloud operations: A new way to run the cloud appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TR0MJr