433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Russia-linked hackers intensify attacks as global APT activity shifts

State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET’s APT Activity Report covering April through September 2025. The research highlights how operations linked to Russia, China, Iran, and North Korea have evolved in scope and technique, showing that nation-state activity remains a constant source of disruption. Attack sources (Source: ESET) Russia’s focus on Ukraine and its allies Russia-linked actors remained among the … More → The post Russia-linked hackers intensify attacks as global APT activity shifts appeared first on Help Net Security.
http://news.poseidon-us.com/TP68vt

1touch.io Kontxtual provides LLM-driven control over sensitive data

1touch.io unveils Kontxtual, an AI-driven data platform engineered for the AI era. Built to accelerate enterprise innovation without compromising control, Kontxtual harnesses the power of AI and LLMs to deliver real-time data, identity, usage, and risk insights, assuring sovereignty and security throughout the entire AI lifecycle. It enables rapid deployment and integration across any environment, cloud, on-premises, or mainframe. Tailored for today’s data security, privacy, and AI governance challenges, the platform unifies data classification, DSPM, … More → The post 1touch.io Kontxtual provides LLM-driven control over sensitive data appeared first on Help Net Security.
http://news.poseidon-us.com/TP64pv

Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows

Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities. Building on Aptori’s AI Triage, which delivers deterministic vulnerability validation, Code-Q extends that intelligence into verified code correction, bridging the gap between detection and secure delivery. The bottleneck between knowing and fixing Enterprises have made progress in detecting vulnerabilities, but remediation remains a persistent bottleneck. Even after a vulnerability is … More → The post Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TP64pN

Enhancing software supply chain security with Microsoft’s Signing Transparency

Microsoft is announcing the preview of Signing Transparency to address software supply chain threats that traditional code signing alone cannot fully prevent, building on the Zero Trust principle of “never trust, always verify.” Signing Transparency uses an append-only log to verifiably record each signature, with keys protected in a secure confidential computing enclave. The post Enhancing software supply chain security with Microsoft’s Signing Transparency appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TP63cY

Resiliency in the cloud—empowered by shared responsibility and Azure Essentials

Empowering organizations to shape the future of cloud with resilient, always-on solutions. The post Resiliency in the cloud—empowered by shared responsibility and Azure Essentials appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TP63bV

GitHub Universe 2025: Where developer innovation took center stage

At GitHub Universe 2025, the theme was clear: the ability to see, steer, and build across agents will bring the greatest impact. The post GitHub Universe 2025: Where developer innovation took center stage appeared first on Microsoft Azure Blog.
http://news.poseidon-us.com/TP63ZP

MajorKey IDProof+ combats AI-driven fraud

MajorKey Technologies announced IDProof+, a high-assurance identity verification solution leveraging biometric technology. Developed in collaboration with identity verification innovator authID, IDProof+ is designed to help enterprises combat AI-driven fraud and streamline remote workforce onboarding. Key benefits of IDProof+ include: Integration with Microsoft Entra Biometric identity validation at the point of access Powered by authID’s Proof technology for accuracy Lightning-fast verification in just 700 ms Deepfake and synthetic identity prevention Global coverage, supporting 14,000+ document types … More → The post MajorKey IDProof+ combats AI-driven fraud appeared first on Help Net Security.
http://news.poseidon-us.com/TP62Ss

Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data

Hypori announced the expansion of its platform with the launch of the Hypori Secure Workspace Ecosystem, a suite of next-generation products designed to give organizations flexibility, scalability, and control over secure mobile access. The new portfolio introduces Hypori Mobile and the Hypori Lyte product lines, reflecting the company’s continued investment in research and development (R&D) to meet cybersecurity threats and mission demands. This is in addition to the launch of Hypori Secure Messaging. “Secure mobility … More → The post Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data appeared first on Help Net Security.
http://news.poseidon-us.com/TP62Sq

Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode

Binarly released the Binarly Transparency Platform 3.5 with Java ecosystem support, enterprise-grade YARA integration, and operational upgrades. With this update, Binarly’s cryptographic algorithm identification engine now supports Java archives (JARs) and JVM bytecode, scanning both standalone and embedded files inside Docker containers or firmware. This means organizations can finally see what cryptographic primitives their Java-based products depend on, without needing access to source code. Built on Code Property Graph (CPG) analysis, the new engine tracks … More → The post Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode appeared first on Help Net Security.
http://news.poseidon-us.com/TP62SX

OpenGuardrails: A new open-source model aims to make AI safer for real-world use

When you ask a large language model to summarize a policy or write code, you probably assume it will behave safely. But what happens when someone tries to trick it into leaking data or generating harmful content? That question is driving a wave of research into AI guardrails, and a new open-source project called OpenGuardrails is taking a bold step in that direction. Created by Thomas Wang of OpenGuardrails.com and Haowen Li of The Hong … More → The post OpenGuardrails: A new open-source model aims to make AI safer for real-world use appeared first on Help Net Security.
http://news.poseidon-us.com/TP605q