433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Hexnode IdP brings device-aware authentication and zero trust to enterprise access

Hexnode has announced the launch of Hexnode IdP. By introducing this native identity layer, Hexnode delivers enterprise-grade authentication and identity management within a single, unified framework. While debuting as a dedicated Identity Provider (IdP), the solution marks a significant expansion of the Hexnode ecosystem, acting as a comprehensive identity engine that integrates directly into the Hexnode UEM fabric. This integration enables organizations to leverage Hexnode’s proprietary Device Trust Engine to enforce context-aware policies based on … More → The post Hexnode IdP brings device-aware authentication and zero trust to enterprise access appeared first on Help Net Security.
http://news.poseidon-us.com/TRKmfn

Cyolo PRO 7.0 expands OT-first secure remote access with AI session intelligence

Cyolo has released Cyolo PRO (Privileged Remote Operations) v7.0, a major update that expands OT-first secure remote access and strengthens protection for critical infrastructure and industrial environments without disrupting operations. Secure remote access (SRA) tools focus primarily on managing access. Cyolo has always delivered a more holistic approach, designed to govern all scopes of access and provide proactive protection across the CPS environment. Cyolo PRO 7.0 introduces new capabilities, including AI-powered session intelligence, OT asset … More → The post Cyolo PRO 7.0 expands OT-first secure remote access with AI session intelligence appeared first on Help Net Security.
http://news.poseidon-us.com/TRKmfS

Cursor Automations turns code review and ops into background tasks

Cursor Automations, the always-on agent platform from Cursor, is expanding with a new generation of autonomous systems that streamline code review, incident response, and other engineering workflows. The platform runs AI agents on schedules or in response to development events. These triggers include merged pull requests on GitHub, newly created issues in Linear, messages sent in Slack, incidents reported through PagerDuty, and custom webhook events. Cursor aims to help engineering teams keep up with the … More → The post Cursor Automations turns code review and ops into background tasks appeared first on Help Net Security.
http://news.poseidon-us.com/TRKmbB

OpenAI’s GPT-5.4 doubles down on safety as competition heats up

In the midst of recent developments and controversies surrounding a contract with the U.S. Department of Defense, OpenAI released the GPT-5.4 model. The release comes at a time when users are reportedly leaving ChatGPT for rival chatbots, particularly Anthropic’s Claude. GPT-5.4 is rolling out gradually across ChatGPT and Codex and is available through the API as gpt-5.4. In ChatGPT, GPT-5.4 Thinking is available to Plus, Team, and Pro users, while Enterprise and Edu customers can … More → The post OpenAI’s GPT-5.4 doubles down on safety as competition heats up appeared first on Help Net Security.
http://news.poseidon-us.com/TRKhSz

March 2026 Patch Tuesday forecast: Is AI security an oxymoron?

Developers and analysts are using more AI tools to produce code and to test both the performance and security of the finished products. They are also embedding AI functionality in their products directly. But just how secure are these AI tools and routines themselves? Recent reports show they suffer from vulnerabilities just like any other code. For example, Google recently provided an update for CVE-2026-0628, associated with Gemini AI implemented in the Chrome browser. This … More → The post March 2026 Patch Tuesday forecast: Is AI security an oxymoron? appeared first on Help Net Security.
http://news.poseidon-us.com/TRKhQQ

Backup strategies are working, and ransomware gangs are responding with data theft

Business email compromise (BEC) and funds transfer fraud combined for 58% of all cyber insurance claims filed in 2025, according to data from Coalition covering more than 100,000 policyholders across the United States, Canada, the United Kingdom, Australia, and Germany. BEC was the single most common claim type at 31%, with frequency rising 15% year over year to 0.47%. Average losses per BEC incident dropped 28% to $27,000, a decline attributed to faster detection and … More → The post Backup strategies are working, and ransomware gangs are responding with data theft appeared first on Help Net Security.
http://news.poseidon-us.com/TRKdGw

Why phishing still works today

In this Help Net Security video, Gal Livschitz, Senior Penetration Tester at Terra Security, explains how phishing has evolved and why employees still fall for it. He outlines how phishing now uses HTTPS, branded pages, and lookalike domains, making attacks harder to spot. He highlights communication overload as a key weakness that attackers exploit. Livschitz reviews QR phishing, where codes inside PDFs bypass link scanning tools. He explains how attackers use redirects and short lived … More → The post Why phishing still works today appeared first on Help Net Security.
http://news.poseidon-us.com/TRKdGq

Scientists finally see the atomic flaws hiding inside computer chips

Researchers at Cornell University have developed a powerful imaging technique that reveals atomic scale defects inside computer chips for the first time. Using an advanced electron microscopy method, the team mapped the exact positions of atoms inside tiny transistor structures and uncovered small imperfections nicknamed “mouse bites.” These defects form during the complex manufacturing process and can disrupt how electrons flow through a chip’s channels, which are only about 15 to 18 atoms wide.
http://news.poseidon-us.com/TRKZ6p

Western governments lay the groundwork for secure 6G networks

Governments are preparing for 6G, the next generation of mobile networks, placing security and resilience among their top priorities. In response, seven countries participating in the Global Coalition on Telecoms (GCOT) have introduced a set of 6G Security and Resilience Principles, developed with support from industry partners. The coalition brings together the governments of the United Kingdom, the United States, Canada, Japan, and Australia. Sweden and Finland recently joined as new members. Industry partners supporting … More → The post Western governments lay the groundwork for secure 6G networks appeared first on Help Net Security.
http://news.poseidon-us.com/TRKXbW