433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

GitHub jumps on the bandwagon and will use your data to train AI

GitHub updated how it uses data to improve AI-powered coding assistance. Starting April 24, interaction data from Copilot Free, Pro, and Pro+ users may be used to train and improve GitHub’s models unless users opt out. Copilot Business and Copilot Enterprise users are not included in this change. Users who have already opted out do not need to take further action, as their preferences remain in place. If users choose to participate, GitHub may use … More → The post GitHub jumps on the bandwagon and will use your data to train AI appeared first on Help Net Security.
http://news.poseidon-us.com/TRjZX8

Mission to smuggle $170 million worth of AI tech to China collapsed for three men

Three individuals, Stanley Yi Zheng, Matthew Kelly, and Tommy Shad English, have been charged with conspiracy to commit smuggling and export control violations after allegedly attempting to procure millions of dollars’ worth of restricted computer chips from a California-based hardware company. In October 2023, Tommy Shad English, claiming to represent a Thailand-based company, ordered 750 computer servers worth about $170 million from a U.S. hardware firm, including 600 with export-controlled chips that require a license … More → The post Mission to smuggle $170 million worth of AI tech to China collapsed for three men appeared first on Help Net Security.
http://news.poseidon-us.com/TRjZLx

Deepfake X-rays are so real even doctors can’t tell the difference

Deepfake X-rays created by AI are now convincing enough to fool both doctors and AI models. In tests, radiologists had limited success identifying fake images, especially when they didn’t know they were being shown. This opens the door to risks like fraudulent medical claims and tampered diagnoses. Experts say stronger safeguards and detection tools are critical as the technology advances.
http://news.poseidon-us.com/TRjVYm

Reddit declares war on bad bot activity

Reddit is introducing changes to support interactions between people. The company is taking a bottom-up approach to help users understand when they are engaging with another person unless an account is labeled otherwise. Reddit plans to verify that users are human without requiring disclosure of real-world identity. How does it work Verified profiles for brands, publishers, and creators launched in late 2025 to help their content gain acceptance in relevant communities. The next step is … More → The post Reddit declares war on bad bot activity appeared first on Help Net Security.
http://news.poseidon-us.com/TRjSbw

Google races to secure encryption before quantum threats arrive

Google is preparing for the quantum era, a turning point in digital security, with a 2029 timeline for post-quantum cryptography (PQC) migration. Security professionals warn that current encryption could be broken by large-scale quantum computers in the coming years. This risk is already relevant due to store-now-decrypt-later attacks. Google says organizations should adopt NIST-developed PQC standards before large-scale, fault-tolerant quantum computers become a reality. “That’s why we’ve adjusted our threat model to prioritize PQC migration … More → The post Google races to secure encryption before quantum threats arrive appeared first on Help Net Security.
http://news.poseidon-us.com/TRjNTZ

DataBahn brings AI-driven intelligence into the security pipeline

DataBahn.ai has announced Autonomous In-Stream Data Intelligence (AIDI), a new operating model for security data pipelines in which data is continuously interpreted, validated, and acted on in real time as it flows. Building on its AI-native foundation, DataBahn advances the pipeline from intelligent data preparation to an active system of in-stream decision-making, enabling organizations to detect issues earlier, adapt dynamically and ensure data is trusted before it reaches downstream systems. DataBahn is also introducing the … More → The post DataBahn brings AI-driven intelligence into the security pipeline appeared first on Help Net Security.
http://news.poseidon-us.com/TRjHjG

AI SOC vendors are selling a future that production deployments haven’t reached yet

Vendors selling AI-powered security operations platforms have built their pitches around a consistent set of promises: autonomous threat investigation, dramatic reductions in analyst workload, and an accelerating path toward humanless operations. Practitioners buying and deploying those platforms describe something different. A report by Anton Chuvakin, Security Advisor at Google Cloud’s Office of the CISO, and Oliver Rochford, co-founder of Aunoo AI, draws on more than 30 vendor briefings, public practitioner commentary from Reddit and Discord, … More → The post AI SOC vendors are selling a future that production deployments haven’t reached yet appeared first on Help Net Security.
http://news.poseidon-us.com/TRjDxz

A nearly undetectable LLM attack needs only a handful of poisoned samples

Prompt engineering has become a standard part of how large language models are deployed in production, and it introduces an attack surface most organizations have not yet addressed. Researchers have developed and tested a prompt-based backdoor attack method, called ProAttack, that achieves attack success rates approaching 100% on multiple text classification benchmarks without altering sample labels or injecting external trigger words. A defense paradigm for mitigating backdoor attacks through LoRA-based fine-tuning of language models (Source: … More → The post A nearly undetectable LLM attack needs only a handful of poisoned samples appeared first on Help Net Security.
http://news.poseidon-us.com/TRjDxj

Your facilities run on fragile supply chains and nobody wants to admit it

In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building systems. She explains how sourcing, localized redundancy, and flexible infrastructure design are being integrated into resilience planning. Dodoo also shares practical approaches such as regional vendor networks, alternative contracts, and strategic inventory to maintain continuity during disruptions. Supply chains for critical building systems, HVAC components, fire suppression materials, access control hardware, … More → The post Your facilities run on fragile supply chains and nobody wants to admit it appeared first on Help Net Security.
http://news.poseidon-us.com/TRjDxW