433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

AI SREs: Separating hype from reality

“AI SRE” should not mean a chatbot guessing its way through your telemetry.
http://news.poseidon-us.com/TMxtPl

Salesloft Drift data breach: Investigation reveals how attackers got in

The attack that resulted in the Salesloft Drift data breach started with the compromise of the company’s GitHub account, Salesloft confirmed this weekend. Supply chain compromise On August 26, the company publicly revealed that earlier that month, a threat actor exfiltrated data from their customers’ Salesforce instances by leveraging stolen OAuth credentials that enable the integration of their Drift (Salesloft) chatbot with said instances. Google Threat Intelligence Group attributed the attack to an attack group … More → The post Salesloft Drift data breach: Investigation reveals how attackers got in appeared first on Help Net Security.
http://news.poseidon-us.com/TMxnJQ

Why eSIMs should be part of your digital transformation strategy

Explore why eSIMs are essential for digital transformation: automated deployment, cost control, enhanced security and sustainable mobile connectivity.
http://news.poseidon-us.com/TMxZkV

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support

The Linux Kernel Runtime Guard (LKRG) is a kernel module that checks the Linux kernel while it’s running. It looks for signs of tampering and tries to catch attempts to exploit security flaws in the kernel. Because it’s a module and not a patch, LKRG can run on many different kernels without any changes to them. It works with versions going back to RHEL7 and its variants, as well as the latest mainline and distribution … More → The post Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support appeared first on Help Net Security.
http://news.poseidon-us.com/TMxT6B

Cybersecurity research is getting new ethics rules, here’s what you need to know

Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the 2026 USENIX Security Symposium, all submissions must include a stakeholder-based ethics analysis. Other major venues such as IEEE Security and Privacy, and ACM CCS have also emphasized the importance of ethical review in recent calls for papers. This change reflects a growing concern that cybersecurity research can unintentionally cause harm. Research that exposes vulnerabilities, collects … More → The post Cybersecurity research is getting new ethics rules, here’s what you need to know appeared first on Help Net Security.
http://news.poseidon-us.com/TMxT51

InterceptSuite: Open-source network traffic interception tool

InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does support HTTP/1 and HTTP/2. It offers support for databases, SMTP, and custom protocols, and can manage unknown protocols and their TLS connections. Developed in C, it ensures efficient memory management and performance, utilising native SOCKS5 proxy support on Linux, Mac, and Windows, with OpenSSL for … More → The post InterceptSuite: Open-source network traffic interception tool appeared first on Help Net Security.
http://news.poseidon-us.com/TMxQXM

Cyber defense cannot be democratized

The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In an earnest attempt to shift left, security teams deputized developers to own remediation. While development teams have legitimately become more security-focused, it’s created a dynamic in which security is still accountable for risk but has … More → The post Cyber defense cannot be democratized appeared first on Help Net Security.
http://news.poseidon-us.com/TMxQVv

AI moves fast, but data security must move faster

Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering that their data protection strategies are not ready for the challenges AI creates. The 2025 Thales Data Threat Report, based on a survey of more than 3,000 IT and security professionals, highlights how quickly AI … More → The post AI moves fast, but data security must move faster appeared first on Help Net Security.
http://news.poseidon-us.com/TMxPBQ

Azure mandatory multifactor authentication: Phase 2 starting in October 2025

Microsoft Azure is announcing the start of Phase 2 multifactor authentication enforcement at the Azure Resource Manager layer, starting October 1, 2025. The post Azure mandatory multifactor authentication: Phase 2 starting in October 2025 appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TMxKNq