433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cisco ThousandEyes Agent Certificate Validation Vulnerability

A vulnerability in certification validation routines of Cisco ThousandEyes Endpoint Agent for macOS and RoomOS could allow an unauthenticated, remote attacker to intercept or manipulate metrics information. This vulnerability exists because the affected software does not properly validate certificates for hosted metrics services. An on-path attacker could exploit this vulnerability by intercepting network traffic using a crafted certificate. A successful exploit could allow the attacker to masquerade as a trusted host and monitor or change communications between the remote metrics service and the vulnerable client. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N Security Impact Rating: Medium CVE: CVE-2025-20126
http://news.poseidon-us.com/THFCK9

Swimlane Hero helps solve complex security operations problems

Swimlane unveiled Hero, a private agentic AI security operations (SecOps) companion. Built on the foundation of Swimlane’s Hero AI innovations, Hero empowers security teams to work smarter and faster by suggesting next steps and answering complex questions privately to speed mean-time-to-remediate (MTTR). Fully integrated into the Swimlane Turbine hyperautomation platform and its ecosystem of integrated data points, Hero is contextually aware of all data in a customer’s Turbine environment, their processes and past decisions made, … More → The post Swimlane Hero helps solve complex security operations problems appeared first on Help Net Security.
http://news.poseidon-us.com/THF8lK

The U.S. Cyber Trust Mark set to launch

The White House has announced the launch of the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program for consumer-grade internet-connected devices. “The White House launched this bipartisan effort to educate American consumers and give them an easy way to assess the cybersecurity of such products, as well as incentivize companies to produce more cybersecure devices, much as EnergyStar labels did for energy efficiency,” the White House said. “The U.S. Cyber Trust Mark program allows … More → The post The U.S. Cyber Trust Mark set to launch appeared first on Help Net Security.
http://news.poseidon-us.com/THF8l3

BioConnect unveils biometric devices for secure access control

BioConnect introduced its Arc Series biometric devices. Designed to address the evolving security, compliance, and scalability needs of enterprises and data centers, the Arc Series sets a new standard in modern access control. The launch includes three innovative devices: Arc Vision, a facial authentication device; Arc Touch, a fingerprint authentication device; and the upcoming Arc Rex, a simple multi-modal facial authentication device, available in September 2025. Together with the Privacy by Design BioConnect Trust Platform, … More → The post BioConnect unveils biometric devices for secure access control appeared first on Help Net Security.
http://news.poseidon-us.com/THF2Sv

Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers

CISA has added Mitel MiCollab (CVE-2024-41713, CVE-2024-55550) and Oracle WebLogic Server (CVE-2020-2883) vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The Mitel MiCollab vulnerabilities exploited Mitel MiCollab is a popular enterprise collaboration suite. CVE-2024-41713 and CVE-2024-55550 are both path traversal vulnerabilities. The former is exploitable without authentication, and may allow an attacker to gain access “to provisioning information including non-sensitive user and network information and perform unauthorized administrative actions on the MiCollab Server.” The latter … More → The post Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers appeared first on Help Net Security.
http://news.poseidon-us.com/THF2Q8

Security, data challenges hinder agentic AI adoption

Tech pros said the most common use case for the technology is IT service desk automation, according to a Tray.ai report. 
http://news.poseidon-us.com/THDxjb

Transcend Migration Accelerator improves privacy strategies for organizations

Transcend announced its white-glove Migration Accelerator for businesses leaving behind legacy privacy platforms. Transcend’s dedicated switching solution removes the traditional headaches of migration and empowers organizations to unlock the full potential of Transcend’s automated platform. In a landscape where legacy solutions were once the appropriate default choice for many companies at GDPR’s inception, forward-looking organizations are now in the process of rethinking their privacy strategies. This includes seeking next-generation solutions like Transcend that don’t just … More → The post Transcend Migration Accelerator improves privacy strategies for organizations appeared first on Help Net Security.
http://news.poseidon-us.com/THDr37

Why an “all gas, no brakes” approach for AI use won’t work

Machine learning and generative AI are changing the way knowledge workers do their jobs. Every company is eager to be “an AI company,” but AI can often seem like a black box, and the fear of security, regulatory and privacy risks can stymie innovation. Executives are under huge pressure to invest and prove ROI but often lack the proper guardrails and tools to ensure they can go through the process without legal or compliance concerns. The post Why an “all gas, no brakes” approach for AI use won’t work appeared first on Help Net Security.
http://news.poseidon-us.com/THDh49

Scaling penetration testing through smart automation

In this Help Net Security interview, Marko Simeonov, CEO of Plainsea, discusses how organizations can move beyond compliance-driven penetration testing toward a more strategic, risk-based approach. He explains how automation, human expertise, and continuous monitoring can transform penetration testing into a dynamic, business-critical process. The post Scaling penetration testing through smart automation appeared first on Help Net Security.
http://news.poseidon-us.com/THDcHT