433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Ping Identity offers protection against adversarial AI threats

Ping Identity announced “Identity for AI,” a new solution designed to secure the world of AI agents. As organizations embrace agentic AI to boost productivity and commerce, Ping Identity is redefining how enterprises enable this new class of autonomous digital identities, delivering visibility, access control, governance, and privilege oversight to build trust into every interaction. Identity for AI will help enterprises engage the agentic commerce channel, secure the autonomous workforce, and protect against adversarial AI … More → The post Ping Identity offers protection against adversarial AI threats appeared first on Help Net Security.
http://news.poseidon-us.com/TP6Qc2

Team Cymru RADAR investigates external infrastructure in real time

Team Cymru announced RADAR, a new real-time discovery module designed to give threat analysts visibility into all internet-facing infrastructure, whether known or unknown, without waiting on asset inventories, third-party scans, or compliance-oriented tools. “Our RADAR solution is about giving defenders the power to investigate external infrastructure in real time — their own or anyone else’s – and take action immediately,” said Joe Sandar, CEO, Team Cymru. Cyber threat analysts and intelligence teams often face a … More → The post Team Cymru RADAR investigates external infrastructure in real time appeared first on Help Net Security.
http://news.poseidon-us.com/TP6Qbv

SonicWall cloud backup hack was the work of a state actor

Incident responders from Mandiant have wrapped up their investigation into the SonicWall cloud backup service hack, and the verdict is in: the culprit is a state-sponsored threat actor (though the specific nation wasn’t disclosed). “[The incident] was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call. The incident is unrelated to ongoing global Akira ransomware attacks on firewalls and other edge devices,” SonicWall said on Tuesday. … More → The post SonicWall cloud backup hack was the work of a state actor appeared first on Help Net Security.
http://news.poseidon-us.com/TP6QZB

Federal employees are reporting major workplace disruptions at nearly triple the national average

In a year of sweeping workforce overhauls, federal employees are reporting high levels of disruption, and low levels of engagement, new data from Gallup shows. The post Federal employees are reporting major workplace disruptions at nearly triple the national average first appeared on Federal News Network.
http://news.poseidon-us.com/TP6MvF

Prowler embeds AI directly into security workflows

Prowler launched Prowler Lighthouse AI, an intelligent security assistant and MCP Server, that brings autonomous AI directly into DevSecOps workflows. Available immediately, Prowler’s AI innovations combine agentic reasoning with automation to accelerate risk analysis, streamline compliance and guide teams through faster remediation across multi-cloud environments. This dual launch marks a defining moment for Prowler, establishing it as the first open cloud-security platform to embed AI at the core of security workflows. Cloud security at AI … More → The post Prowler embeds AI directly into security workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TP6HJQ

Malicious Infrastructure Finds Stability with aurologic GmbH

This investigative report reveals how German hosting provider aurologic GmbH has become a central enabler of malicious internet infrastructure, linking numerous threat activity networks while operating under a veneer of legal neutrality and regulatory ambiguity.
http://news.poseidon-us.com/TP69CY

Russia-linked hackers intensify attacks as global APT activity shifts

State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET’s APT Activity Report covering April through September 2025. The research highlights how operations linked to Russia, China, Iran, and North Korea have evolved in scope and technique, showing that nation-state activity remains a constant source of disruption. Attack sources (Source: ESET) Russia’s focus on Ukraine and its allies Russia-linked actors remained among the … More → The post Russia-linked hackers intensify attacks as global APT activity shifts appeared first on Help Net Security.
http://news.poseidon-us.com/TP68vt

1touch.io Kontxtual provides LLM-driven control over sensitive data

1touch.io unveils Kontxtual, an AI-driven data platform engineered for the AI era. Built to accelerate enterprise innovation without compromising control, Kontxtual harnesses the power of AI and LLMs to deliver real-time data, identity, usage, and risk insights, assuring sovereignty and security throughout the entire AI lifecycle. It enables rapid deployment and integration across any environment, cloud, on-premises, or mainframe. Tailored for today’s data security, privacy, and AI governance challenges, the platform unifies data classification, DSPM, … More → The post 1touch.io Kontxtual provides LLM-driven control over sensitive data appeared first on Help Net Security.
http://news.poseidon-us.com/TP64pv

Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows

Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities. Building on Aptori’s AI Triage, which delivers deterministic vulnerability validation, Code-Q extends that intelligence into verified code correction, bridging the gap between detection and secure delivery. The bottleneck between knowing and fixing Enterprises have made progress in detecting vulnerabilities, but remediation remains a persistent bottleneck. Even after a vulnerability is … More → The post Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TP64pN