433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Lookout’s AI-powered solution combats SMS phishing attacks

Lookout introduces Smishing AI, an AI-powered solution designed to protect enterprises from the growing threat of SMS phishing (smishing) attacks. SMS phishing, commonly called “smishing,” is a cyberattack where fraudsters send misleading text messages to trick people into giving up personal information. These messages often pretend to be trusted sources, like banks, delivery services, or government agencies, and may warn of unpaid bills, delivery issues, or fake prizes. The aim is to steal sensitive data, … More → The post Lookout’s AI-powered solution combats SMS phishing attacks appeared first on Help Net Security.
http://news.poseidon-us.com/TN01q3

How CIOs can steer legacy tech overhauls

When modernizing legacy IT systems, CIOs shouldn’t just keep an eye on risk. They should also connect changes to business goals.
http://news.poseidon-us.com/TN00qy

New NIST NCCoE Mobile Drivers Licenses Project Resources Now Available!

The NIST NCCoE is excited to announce and accept comments on three new draft publications under its Mobile Driver Licenses (mDL) Project. These releases include resources on mDL assurance, mDL data flows, and a privacy risk assessment. What are mDLs
http://news.poseidon-us.com/TMzymM

Final Publication Available: NIST IR 8523, Multi-Factor Authentication for Criminal Justice Information Systems

The NIST National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Interagency Report (IR) 8523, Multi-Factor Authentication for Criminal Justice Information Systems. Credential compromises represent an emergent
http://news.poseidon-us.com/TMzylx

Automated network pentesting uncovers what traditional tests missed

Most organizations run an annual network penetration test, remediate the issues it uncovers, and move on. But attackers are probing networks every day, using publicly available tools to exploit common misconfigurations and overlooked vulnerabilities. A new report, based on over 50,000 automated penetration tests performed with Vonahi Security’s vPenTest SaaS platform, has shown why once-per-year manual testing isn’t enough. The tests flagged the same preventable gaps across many organizations. Most frequently, they allowed multicast DNS … More → The post Automated network pentesting uncovers what traditional tests missed appeared first on Help Net Security.
http://news.poseidon-us.com/TMzvgT

Perforce expands DevOps Data Platform with AI-driven synthetic data generation

Perforce Software has expanded its software testing and synthetic data offerings with the introduction of AI-powered synthetic data generation. Delphix AI introduces a new language model embedded into the Delphix DevOps Data Platform, allowing teams to automatically deliver synthetic data across the development lifecycle. Uniting data masking, data delivery, and synthetic data generation in a single platform, and boosting it with AI, Delphix provides an enterprise-grade solution for DevOps acceleration, privacy compliance, and AI/ML model … More → The post Perforce expands DevOps Data Platform with AI-driven synthetic data generation appeared first on Help Net Security.
http://news.poseidon-us.com/TMzvfK

Xage Fabric prevents unauthorized access and sensitive data exposure

Xage Security has released zero trust platform designed to secure AI environments. Built on the same proven zero trust principles Xage uses to protect critical infrastructure, the platform delivers control over AI data access, tool usage, and multi-agent workflows, eliminating jailbreak risks and ending AI adoption anxiety. As the race to adopt AI continues, so too does the fear of unintended consequences, like rogue AI behavior and sensitive data leaks. Organizations want the competitive edge … More → The post Xage Fabric prevents unauthorized access and sensitive data exposure appeared first on Help Net Security.
http://news.poseidon-us.com/TMzvcx

Gigamon Insights delivers agentic AI for threat detection, compliance, and root-cause analysis

Gigamon has released Gigamon Insights, an agentic AI application purpose-built for network-derived telemetry that will deliver instant guidance for security and IT operations teams. Launching with integrations into SIEM and observability platforms from Elastic and Splunk and cloud services from AWS, Gigamon Insights boosts IT productivity by accelerating investigations without manually combing through dashboard data. Analysts can ask questions, query trusted metadata, and receive context-rich insights and recommended actions within the platforms they already use. … More → The post Gigamon Insights delivers agentic AI for threat detection, compliance, and root-cause analysis appeared first on Help Net Security.
http://news.poseidon-us.com/TMzvFS

Garak: Open-source LLM vulnerability scanner

LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and toxic outputs. By running different tests, it helps developers understand where a model might fail and how to make it safer. Garak works with a wide range of models and platforms. It supports Hugging Face Hub … More → The post Garak: Open-source LLM vulnerability scanner appeared first on Help Net Security.
http://news.poseidon-us.com/TMzmWZ

Fixing silent failures in security controls with adversarial exposure validation

Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, endpoints are protected, and SIEM rules are running. All good, right? Not so fast. Appearances can be deceiving. And deception can be devastating. Picus Security’s Blue Report 2025 shows that even well-configured environments continue to miss a substantial portion of attacks. In fact, across more than 160 million attack simulations, Picus Labs found … More → The post Fixing silent failures in security controls with adversarial exposure validation appeared first on Help Net Security.
http://news.poseidon-us.com/TMzmV3