433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

ClickFix Campaigns Targeting Windows and macOS

Insikt Group reveals five ClickFix social engineering clusters (QuickBooks, Booking.com, Birdeye) targeting Windows and macOS. Learn how threat actors exploit native system tools with malicious, obfuscated commands to gain initial access, and get key mitigations for defense
http://news.poseidon-us.com/TRhCxq

Codenotary introduces AgentX for autonomous Linux infrastructure security

Codenotary has announced the availability of AgentX, an autonomous platform designed to manage, secure, and protect large-scale Linux infrastructure in the cloud or on-premises through coordinated networks of AI agents. AgentX introduces a new approach to infrastructure operations by allowing distributed AI agents to collaborate, automating security enforcement, operational tasks, and lifecycle management while maintaining full permissions control and governance for administrators. AgentX continuously reviews configurations, user roles, and security controls across servers, clusters, and … More → The post Codenotary introduces AgentX for autonomous Linux infrastructure security appeared first on Help Net Security.
http://news.poseidon-us.com/TRhC33

Spur Intelligence delivers deeper visibility into anonymized infrastructure

Spur Intelligence has announced new enhancements to its IP intelligence platform, designed to give security and fraud teams deeper visibility into anonymized infrastructure and enable informed, real-time decisions on risky user sessions. New capabilities include AI service identification, a policy API for real-time session decisions, and enhanced geographic infrastructure insights. AI service tagging in the Spur IP context object As AI-driven automation and anonymization technologies proliferate across the internet, organizations face growing challenges in distinguishing … More → The post Spur Intelligence delivers deeper visibility into anonymized infrastructure appeared first on Help Net Security.
http://news.poseidon-us.com/TRhC30

Tenable Hexa AI automates exposure management and security workflows

Tenable has revealed Tenable Hexa AI, the agentic AI engine of the Tenable One Exposure Management Platform that automates security workflows and transforms exposure intelligence into coordinated action to reduce cyber risk. AI-powered cyberattacks, rapid vulnerability discovery and the explosion of AI-driven tools are expanding the attack surface faster than security teams can keep up. At the same time, security operations now involve a growing mix of humans, automation and AI agents operating across fragmented … More → The post Tenable Hexa AI automates exposure management and security workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TRhC2y

Barracuda strengthens cyber resilience with BarracudaONE platform updates

Barracuda Networks has announced advancements to the BarracudaONE cybersecurity platform and Barracuda Partner Success Program. The latest innovations strengthen cyber resilience across email, network access and generative AI usage, while the enhanced partner program delivers new benefits, incentives and tools that help partners accelerate growth and profitability. “Email and identity‑based attacks are intensifying at an unprecedented pace, and generative AI is introducing an entirely new layer of risk,” said Rohit Ghai, Chief Executive Officer at … More → The post Barracuda strengthens cyber resilience with BarracudaONE platform updates appeared first on Help Net Security.
http://news.poseidon-us.com/TRhC2m

Google’s TurboQuant cuts AI memory use without losing accuracy

Large language models carry a persistent scaling problem. As context windows grow, the memory required to store key-value (KV) caches expands proportionally, consuming GPU memory and slowing inference. A team at Google Research has developed three compression algorithms: TurboQuant, PolarQuant, and Quantized Johnson-Lindenstrauss (QJL). All three are designed to compress those caches aggressively without degrading model output quality. The overhead problem in vector quantization Vector quantization has long been used to compress the high-dimensional numerical … More → The post Google’s TurboQuant cuts AI memory use without losing accuracy appeared first on Help Net Security.
http://news.poseidon-us.com/TRhC2c

HPE enhances security to support AI and distributed enterprise environments

HPE has unveiled new security innovations designed to help organizations scale distributed operations, reduce cyber risk, and maintain consistent governance as AI adoption accelerates across the enterprise. To help enterprises securely adopt AI and turn resilience into a core business capability, HPE is introducing the HPE Juniper Networking SRX400 Series Firewalls, an expanded hybrid mesh security architecture, and resilience-centered enhancements to extend consistent protection across cloud, core and edge environments. “In the AI era, security … More → The post HPE enhances security to support AI and distributed enterprise environments appeared first on Help Net Security.
http://news.poseidon-us.com/TRhC1S

Training an AI agent to attack LLM applications like a real adversary

Most enterprise software development teams now ship AI-powered applications faster than traditional penetration testing can keep up with. A security team with 500 applications may test each one once a year, or less. In the time between tests, the underlying models, integrations, and behaviors can change, with no corresponding security review. Novee launched a product it calls AI Red Teaming for LLM Applications, an AI pentesting agent built specifically to probe LLM-powered software. The company … More → The post Training an AI agent to attack LLM applications like a real adversary appeared first on Help Net Security.
http://news.poseidon-us.com/TRh7kJ

You don’t have to choose between BAS or automated pentesting, you shouldn’t

There’s a debate making the rounds in security circles that sounds reasonable on the surface but falls apart under operational scrutiny: Which is better, breach and attack simulation (BAS) or automated penetration testing (APT)? Security vendors have stoked this debate for obvious reasons, with some even explicitly arguing that automated pentesting should replace BAS entirely. But for practitioners responsible for defending an organization, this framing is the problem. It represents a coverage regression disguised as … More → The post You don’t have to choose between BAS or automated pentesting, you shouldn’t appeared first on Help Net Security.
http://news.poseidon-us.com/TRh7gn

Why your phishing simulations aren’t building a security culture

Security culture isn’t built by phishing simulations. In this Help Net Security video, Dan Potter, VP of Cyber Resilience at Immersive, argues that annual training videos and quarterly phishing tests happen in calm, controlled settings that tell us nothing about how people perform when a real incident hits. Real attacks trigger anxiety, cognitive narrowing, and hesitation. People fixate on the loudest problem in the room, lose sight of the bigger picture, and slow down when … More → The post Why your phishing simulations aren’t building a security culture appeared first on Help Net Security.
http://news.poseidon-us.com/TRh58x