433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the ongoing conflict in the Middle East. Stryker confirmed in a Form 8-K filing with the SEC that a cyberattack caused a global disruption to its Microsoft systems. The Wall Street Journal reported the attack began in the United States before spreading globally, with staff discovering that cellphones and laptops … More → The post War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker appeared first on Help Net Security.
http://news.poseidon-us.com/TRRlkh

A sudden change to how VA evaluates disabilities triggers swift backlash

“There are people who believe if you have this advanced prosthetic, you’re no longer disabled,” Carl Blake said. “That’s something we certainly cannot abide.”
http://news.poseidon-us.com/TRRdsB

Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans

Codoxo has announced the launch of Deepfake Detection, an AI-driven fraud detection tool now being deployed by health plans across the U.S. The solution helps identify AI-generated or manipulated medical documentation and diagnostic images submitted in support of claims before payment is made. Healthcare fraud is already a multibillion-dollar problem, and generative AI is turning documentation fraud from a manual crime into a scalable one. Fraudsters know payers rely on progress notes, clinical narratives, and … More → The post Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans appeared first on Help Net Security.
http://news.poseidon-us.com/TRRdNx

Stop fixing OT security with IT thinking

In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, discusses the specific cybersecurity challenges in manufacturing environments. The conversation covers why standard IT security practices break down on shop floors, where PLCs and decade-old firmware were never designed to be networked. She explains how nation-state actors quietly settle into industrial networks, using stale accounts and compromised workstations to map environments without triggering alarms. She addresses patch management in OT, where production … More → The post Stop fixing OT security with IT thinking appeared first on Help Net Security.
http://news.poseidon-us.com/TRRYrL

Agentic attack chains advance as infostealers flood criminal markets

Cybercriminals spent much of 2025 automating their operations, shifting from one-off attacks to systems that can run entire intrusion cycles with minimal human input. Data collected from criminal forums, illicit marketplaces, and underground chat services shows a threat environment where stolen identity data, unpatched vulnerabilities, and ransomware operations are interdependent. The findings come from Flashpoint’s 2026 Global Threat Intelligence Report, pulling data directly from sources across open and restricted online spaces. AI is moving from … More → The post Agentic attack chains advance as infostealers flood criminal markets appeared first on Help Net Security.
http://news.poseidon-us.com/TRRVt2

Does Anthropic deserve the trust of the cybersecurity community?

The cybersecurity industry runs on trust. The belief that when a vendor says they will behave a certain way, they will, that critical CVEs are in fact critical, or when companies say they’re GDPR compliant, they really are. But earning trust is not a one-and-done thing. Anthropic understood this better than any AI company. As OpenAI moved fast and broke things, Anthropic published a Responsible Scaling Policy (RSP), a framework for addressing catastrophic risks. Although … More → The post Does Anthropic deserve the trust of the cybersecurity community? appeared first on Help Net Security.
http://news.poseidon-us.com/TRRVt1

Wireless vulnerabilities are doubling every few years

Wireless vulnerabilities are being disclosed at a rate that has no precedent in the fifteen-year history of systematic tracking. In 2025, researchers published 937 new wireless-related CVEs, an average of 2.5 per day, according to a threat report from Bastille Networks based on data from the NIST National Vulnerability Database. Wireless threats increasing 20X faster than overall CVE disclosures (Source: Bastille Networks) Wireless CVEs are growing 20 times faster than the broader CVE field The … More → The post Wireless vulnerabilities are doubling every few years appeared first on Help Net Security.
http://news.poseidon-us.com/TRRVsK