433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

That “summarize with AI” button might be manipulating you

Microsoft security researchers discovered a growing trend of AI memory poisoning attacks used for promotional purposes, referred to as AI Recommendation Poisoning. The MITRE ATLAS knowledge base classifies this behavior as AML.T0080: Memory Poisoning. The activity focuses on shaping future recommendations by inserting prompts that cause an assistant to treat specific companies, websites, or services as trusted or preferred. Once stored, these entries can affect responses in later, unrelated conversations. Manipulated assistants may influence recommendations … More → The post That “summarize with AI” button might be manipulating you appeared first on Help Net Security.
http://news.poseidon-us.com/TQv3Qp

Google Search introduces new ways to remove sensitive personal information and explicit images

Google expanded its “Results about you” tool to give users more control over sensitive personal information and added a way to request removal of non-consensual explicit images from Search. Manage and limit sensitive personal information in Search Users can request the removal of Search results that contain sensitive personal information, such as driver’s license numbers, passport numbers, and Social Security numbers, through the Results about you hub. First-time users must enter the contact information they … More → The post Google Search introduces new ways to remove sensitive personal information and explicit images appeared first on Help Net Security.
http://news.poseidon-us.com/TQtyQG

Yubico previews passkey-enabled digital signatures in upcoming YubiKey 5.8 firmware

Yubico’s upcoming YubiKey 5.8 firmware introduces standardized APIs that integrate hardware-backed signatures with passkey authentication. To enable privacy-capable digital signatures using passkeys, expanded enterprise IdP support, and next-generation digital wallet use cases, the firmware adds support for FIDO CTAP 2.3 and preview WebAuthn signing extensions. “The adoption of CTAP 2.3, together with enhancements such as the W3C signing extension, enables usable digital signatures in web applications and services where digital signing is part of the … More → The post Yubico previews passkey-enabled digital signatures in upcoming YubiKey 5.8 firmware appeared first on Help Net Security.
http://news.poseidon-us.com/TQtv3Q

Cisco enhances security for enterprise AI adoption

Cisco announced a suite of capabilities to help enterprises adopt agentic AI with confidence, combining agent protection, interaction governance, and resilient connectivity for AI-driven workflows. As organizations move from AI assistants to autonomous agents that use tools and data across hybrid environments, security teams need to strengthen agentic defenses, govern agent interactions with enterprise systems and external services, and maintain reliable, cryptographically protected connectivity at scale. “In the age of AI, safety and security are … More → The post Cisco enhances security for enterprise AI adoption appeared first on Help Net Security.
http://news.poseidon-us.com/TQtm1G

Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy

Global retail and beauty brands manage a unique cybersecurity balancing act. They depend on consumer trust, massive volumes of personal data, and a sprawling network of vendors, while also managing thousands of physical locations and dynamic digital growth. In this Help Net Security interview, Jérôme Etienne, Group CISO, Groupe Rocher shares practical insights on closing strategy gaps, managing third-party risk, and securing online and in-store environments. In the conversation, he also discusses why point-of-sale and … More → The post Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy appeared first on Help Net Security.
http://news.poseidon-us.com/TQtk4n

Trellix SecondSight identifies subtle indicators of an active breach

Trellix announced Trellix SecondSight, a threat hunting service designed to proactively identify low-noise advanced threats often undetected, reducing organizational risk for Trellix customers. “Threat actors’ use of AI has significantly increased alert fatigue for security analysts,” said John Fokker, VP Threat Intelligence Strategy, Trellix. “While automated systems flag high-level alerts, they often miss subtle, low-noise signals enabling actions like lateral movement. Trellix SecondSight is a critical component, offering analysts a ‘second set of eyes’ to … More → The post Trellix SecondSight identifies subtle indicators of an active breach appeared first on Help Net Security.
http://news.poseidon-us.com/TQtk4f

Zen-AI-Pentest: Open-source AI-powered penetration testing framework

Zen-AI-Pentest provides an open-source framework for scanning and exercising systems using a combination of autonomous agents and standard security utilities. The project aims to let users run an orchestrated sequence of reconnaissance, vulnerability scanning, exploitation, and reporting using AI guidance and industry tools like Nmap and Metasploit. It is written to support command line, API, and web interfaces. Multi-agent structure and integrated tools Zen-AI-Pentest organizes its functionality around a set of agents that handle discrete … More → The post Zen-AI-Pentest: Open-source AI-powered penetration testing framework appeared first on Help Net Security.
http://news.poseidon-us.com/TQtk3r