433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Meta ditches end-to-end encrypted messaging on Instagram

End-to-end encrypted messaging on Instagram will no longer be supported after May 8, 2026. Meta justified the move by saying the feature was rarely used, with only a small fraction of Instagram users enabling encryption. The company advised users seeking end-to-end encryption to switch to WhatsApp, where it is enabled by default. Unlike WhatsApp, Instagram never rolled out encryption to all users and the feature remained optional. Users with affected chats will see instructions on … More → The post Meta ditches end-to-end encrypted messaging on Instagram appeared first on Help Net Security.
http://news.poseidon-us.com/TRWZD5

Microsoft Edge 146 adds IP privacy and local network access controls

Microsoft Edge version 146 (Stable) became available on March 13, 2026, bringing updates to tracking protection, IP privacy, and enterprise network security policies. One change affects tracking prevention in InPrivate browsing. InPrivate windows use the same tracking prevention level configured for standard browsing sessions. The separate option that previously allowed a different tracking setting for private windows has been removed. The release expands Private IP, part of the Edge Secure Network capability. The feature routes … More → The post Microsoft Edge 146 adds IP privacy and local network access controls appeared first on Help Net Security.
http://news.poseidon-us.com/TRWVjn

Hackers tried to breach Poland’s nuclear research centre

Poland’s National Centre for Nuclear Research (NCBJ) thwarted a cyberattack targeting its IT infrastructure. The attempted intrusion was detected and blocked before attackers could compromise systems or disrupt operations. “No production, operational, or research processes were disrupted, and the MARIA reactor is operating safely and smoothly, at full power,” said Prof. Jakub Kupecki, Director of the National Centre for Nuclear Research. The National Centre for Nuclear Research is one of the largest scientific institutes in … More → The post Hackers tried to breach Poland’s nuclear research centre appeared first on Help Net Security.
http://news.poseidon-us.com/TRWVjj

KEEQuant advances chip-scale QKD for telecom, data centers, and critical infrastructure

KEEQuant has announced its commercial chip-scale QKD technology, marking an advance in quantum-secure communications. The system replaces bulky optical assemblies with photonic integration, lowering the cost and complexity of quantum key distribution and making quantum-safe key exchange a practical upgrade for telecom operators, data center providers, and critical infrastructure organizations. The result is smaller, more scalable systems that remain compatible with existing fiber environments and encryption solutions, making adoption more practical for organizations preparing their … More → The post KEEQuant advances chip-scale QKD for telecom, data centers, and critical infrastructure appeared first on Help Net Security.
http://news.poseidon-us.com/TRWVgT

45,000 malicious IP addresses taken down, 94 suspects arrested

An international law enforcement operation has taken down more than 45,000 malicious IP addresses and servers linked to phishing, malware, and ransomware activity. The action was carried out as part of Operation Synergia III, an investigation that ran from July 18, 2025 to January 31, 2026. According to INTERPOL, the operation resulted in 94 arrests, while 110 additional suspects remain under investigation. Authorities also seized 212 electronic devices and servers linked to the criminal networks. … More → The post 45,000 malicious IP addresses taken down, 94 suspects arrested appeared first on Help Net Security.
http://news.poseidon-us.com/TRWMG3

JSOC IT’s AUTOPSY platform puts security stacks under live API verification

JSOC IT has announced the launch of AUTOPSY, a security verification platform that investigates an organization’s security stack through live API integrations before a breach occurs, rather than after one forces the conversation. The platform’s flagship product, READY, is a security assessment that replaces self-reported questionnaires with API-verified telemetry across an organization’s security stack, including endpoint detection, identity and access management, backup and recovery, vulnerability management, and more than 24 integrated security platforms. The launch … More → The post JSOC IT’s AUTOPSY platform puts security stacks under live API verification appeared first on Help Net Security.
http://news.poseidon-us.com/TRWMFH

Certificate lifespans are shrinking and most organizations aren’t ready

The push for shorter TLS certificate lifespans has been building for years. It started with Google’s internal push toward 90-day certificates, which gained traction inside the industry before resistance from enterprise customers slowed things down. Then Apple proposed 47-day certificates, which reignited the debate and ultimately forced the CA/Browser Forum to set a formal schedule. The timeline that came out of those discussions moves certificate validity from one year down to 200 days, then 100, … More → The post Certificate lifespans are shrinking and most organizations aren’t ready appeared first on Help Net Security.
http://news.poseidon-us.com/TRWF7S

What smart factories keep getting wrong about cybersecurity

In this Help Net Security interview, Packsize CSO Troy Rydman breaks down the biggest vulnerabilities in smart factory environments today, from IoT devices and legacy systems to human error. He explains how unmanaged devices, from sensors to robotic components, often go unpatched and become entry points for attackers. Legacy infrastructure is frequently overlooked as organizations move to cloud and SaaS platforms, leaving outdated systems exposed. Employees remain a persistent weak point, not because of negligence, … More → The post What smart factories keep getting wrong about cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TRWF7P

VulHunt: Open-source vulnerability detection framework

Binarly has published VulHunt Community Edition, making the core scanning engine from Binarly’s commercial Transparency Platform available to independent researchers and practitioners. What VulHunt does VulHunt Community Edition is a framework for detecting vulnerabilities in compiled software. It operates against multiple binary representations simultaneously, working across disassembly, an intermediate representation layer, and decompiled code. Targets include POSIX executables and UEFI firmware modules. The detection logic is expressed in Lua rules. Each rule specifies metadata such … More → The post VulHunt: Open-source vulnerability detection framework appeared first on Help Net Security.
http://news.poseidon-us.com/TRWF7K