433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities

Check Point announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify zero trust across hybrid networks. “As organizations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments,” said Nataly Kremer, Chief Product Officer at Check Point Software Technologies. “R82.10 helps enterprises shift to a prevention-first model by unifying management, strengthening … More → The post Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TPf55d

Building the missing layers for an internet of agents

Cybersecurity teams are starting to think about how large language model agents might interact at scale. A new paper from Cisco Research argues that the current network stack is not prepared for this shift. The work proposes two extra layers on top of the application transport layer to help agents communicate in a structured way and agree on shared meaning before they act. Traditional OSI stack and our proposed network stack for agentic applications. We … More → The post Building the missing layers for an internet of agents appeared first on Help Net Security.
http://news.poseidon-us.com/TPdzWv

What security leaders should watch for when companies buy or sell a business

In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, and divestitures. Sullivan talks about the types of risk an acquiring company can take on, including cyber exposure, compliance duties, and past governance decisions. He outlines why data handling matters throughout the process, from deciding what should move to keeping records of how data was sent and received. The … More → The post What security leaders should watch for when companies buy or sell a business appeared first on Help Net Security.
http://news.poseidon-us.com/TPdzWt

Data brokers are exposing medical professionals, and turning their personal lives into open files

Large amounts of personal information about medical professionals are available on people search sites. A new analysis by Incogni’s researchers shows how much data about doctors appears online and how easily it can be found. The findings should concern healthcare leaders who support staff safety, workforce protection, and clinical operations. Doctors have searchable profiles Researchers examined 786 medical doctors working in major U.S. hospitals. 97% of them appeared on at least one people search site. … More → The post Data brokers are exposing medical professionals, and turning their personal lives into open files appeared first on Help Net Security.
http://news.poseidon-us.com/TPdzVp

New infosec products of the week: December 5, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BlackFog, Datadog, Forward Edge-AI, SandboxAQ, and Upwind. BlackFog releases ADX Vision to block data loss from unapproved AI use BlackFog announced the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX Vision gives organizations the visibility and control needed to manage AI securely. Operating directly on the device, it detects shadow AI … More → The post New infosec products of the week: December 5, 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TPdxYn

Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025

On December 3, 2025, the React team released a security advisory regarding a vulnerability, CVE-2025-55182, in the React server that could allow an unauthenticated, remote attacker to perform remote code execution on an affected device or system. For a description of this vulnerability, see the public React Security Advisory. Cisco’s standard practice is to update integrated third-party software components to later versions as they become available. This advisory will be updated as additional information becomes available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb Security Impact Rating: Critical CVE: CVE-2025-55182
http://news.poseidon-us.com/TPdmXx