433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Researchers uncover ClickFix-themed phishing kit

Palo Alto Networks researchers have discovered and analyzed “IUAM ClickFix Generator”, a phishing kit that allows less skilled attackers to infect unsuspecting users with malware by using the increasingly popular ClickFix social engineering technique. “This tool allows threat actors to create highly customizable phishing pages that mimic the challenge-response behavior of a browser verification page commonly deployed by Content Delivery Networks (CDNs) and cloud security providers to defend against automated threats. The spoofed interface is … More → The post Researchers uncover ClickFix-themed phishing kit appeared first on Help Net Security.
http://news.poseidon-us.com/TNYHBY

North Korean hackers stole over $2 billion in cryptocurrency this year

North Korean hackers have stolen more than $2 billion in cryptocurrency in 2025, according to blockchain analytics firm Elliptic, and the year isn’t over yet. Though this year’s record losses are driven largely by the February attack on cryptocurrency exchange Bybit ($1.46 billion stolen), the company has also linked more than thirty additional hacks to North Korea this year. “The actual figure may be even higher,” the company says. “We are aware of many other … More → The post North Korean hackers stole over $2 billion in cryptocurrency this year appeared first on Help Net Security.
http://news.poseidon-us.com/TNYHBG

Netskope UZTNA adds policy control by device posture, risk, and role

Netskope has enhanced its Universal Zero Trust Network Access (UZTNA) solution. Comprised of Netskope One Private Access and Netskope Device Intelligence, Netskope’s UZTNA solution extends beyond the core use case of delivering fast, consistent, secure access to remote and local users and devices to deliver deeper threat inspection of their diverse device ecosystems and private application traffic. Netskope also goes further than other solutions by providing organizations with a scalable framework for retiring or reducing … More → The post Netskope UZTNA adds policy control by device posture, risk, and role appeared first on Help Net Security.
http://news.poseidon-us.com/TNY0qj

CyberArk unveils new capabilities to reduce risk across human and machine identities

CyberArk announced new discovery and context capabilities across its Machine Identity Security portfolio. The enhancements enable security teams to find, understand and secure machine identities, spanning certificates, keys, secrets, workloads and more, reducing risk and simplifying compliance at scale. Machine identities outnumber human identities by an estimated 82 to 1, driven by increased AI adoption and cloud native growth. As a result, machine identity-related security incidents are on the rise, with 72% of security leaders reporting … More → The post CyberArk unveils new capabilities to reduce risk across human and machine identities appeared first on Help Net Security.
http://news.poseidon-us.com/TNXww0

Radiflow360 unifies OT risk, compliance, and response

Radiflow has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers visibility, risk management and streamlined incident response for mid-sized industrial enterprises. Radiflow360 now enables mid-sized industrial operators to gain visibility and control over their OT networks and risks, and is supported by an AI analyst assistant that speeds up assessments and prioritizes threats. This new platform streamlines compliance, accelerates incident response and integrates seamlessly with other Radiflow and third-party tools, delivering … More → The post Radiflow360 unifies OT risk, compliance, and response appeared first on Help Net Security.
http://news.poseidon-us.com/TNXwvw

Rethinking AI security architectures beyond Earth

If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one is a moving endpoint that must stay secure while communicating through long, delay-prone links. A new study explores how AI could automate security for space systems and whether the best approach is to centralize control or spread it out. Space security enters a new era Commercial satellite constellations are changing how the space industry works. … More → The post Rethinking AI security architectures beyond Earth appeared first on Help Net Security.
http://news.poseidon-us.com/TNXwvj

DefectDojo: Open-source DevSecOps platform

DefectDojo is an open-source tool for DevSecOps, application security posture management (ASPM), and vulnerability management. It helps teams manage security testing, track and remove duplicate findings, handle remediation, and generate reports. Whether you’re a solo security practitioner or a CISO managing multiple teams, DefectDojo helps you organize your security work and report your organization’s security posture. At its core, it functions as a bug tracker for security vulnerabilities. It is designed to collect, organize, and … More → The post DefectDojo: Open-source DevSecOps platform appeared first on Help Net Security.
http://news.poseidon-us.com/TNXwv4

Developing economies are falling behind in the fight against cybercrime

Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to have when budgets allow. That means little investment in tools, training, or talent. At the same time, limited job opportunities and high unemployment make cybercrime an appealing alternative for some. When income matters more than how it’s earned, online crime can look like an easy way … More → The post Developing economies are falling behind in the fight against cybercrime appeared first on Help Net Security.
http://news.poseidon-us.com/TNXqHq