433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

UK reduces cyberattack fix times from two months to eight days

The UK government has launched a new vulnerability monitoring service (VMS) that promises to reduce the time needed to fix critical cyber weaknesses across the public sector. Scanning government systems for critical cyber flaws The service, launched as part of the Blueprint for Modern Digital Government, published in January 2025, continuously scans internet-facing systems at around 6,000 public sector organizations. Using commercial and proprietary tools, it detects about 1,000 types of cyber vulnerabilities. When a … More → The post UK reduces cyberattack fix times from two months to eight days appeared first on Help Net Security.
http://news.poseidon-us.com/TRFDSs

pureLiFi unveils LiFi architecture to extend gigabit capacity indoors

pureLiFi is addressing a key fixed wireless access (FWA) challenge by delivering reliable indoor signal performance through LiFi, a wireless communication technology that transmits data through the light spectrum instead of traditional radio frequencies. The latest LiFi systems leverage technology trusted by international security agencies for classified networks, demonstrating that LiFi’s capacity and military-grade security are accessible more broadly. Moving beyond the constraints of radio frequencies, pureLiFi is unveiling its high-bandwidth architecture, capable of delivering … More → The post pureLiFi unveils LiFi architecture to extend gigabit capacity indoors appeared first on Help Net Security.
http://news.poseidon-us.com/TRFDSr

Motorola turns to GrapheneOS for smartphone security upgrade

Motorola is strengthening smartphone security through a long-term partnership with the GrapheneOS Foundation, a mobile security nonprofit that develops a hardened operating system based on the Android Open Source Project. GrapheneOS includes protections designed to reduce entire classes of vulnerabilities, strengthen app sandboxing and system boundaries, and limit the impact of common exploits while maintaining a standard Android user experience. GrapheneOS is best suited for users who prioritize privacy, security architecture, and greater control over … More → The post Motorola turns to GrapheneOS for smartphone security upgrade appeared first on Help Net Security.
http://news.poseidon-us.com/TRFDSq

A tiny twist creates giant magnetic skyrmions in 2D crystals

Twisting atomically thin magnetic layers does more than reshape their electronics—it can create giant, topological magnetic textures. In chromium triiodide, researchers observed skyrmion-like patterns stretching far beyond the expected moiré scale, reaching hundreds of nanometers. Even more surprising, their size doesn’t simply follow the twist pattern but peaks at a specific angle. This twist-controlled magnetism could pave the way for low-power spintronic devices built from geometry alone.
http://news.poseidon-us.com/TRFBpY

Your dependencies are 278 days out of date and your pipelines aren’t protected

Applications continue to ship with known weaknesses even as development workflows speed up. A new Datadog State of DevSecOps 2026 report examines how dependency management and pipeline practices are influencing exposure across cloud native environments. Across the environments studied, 87% of organizations run at least one exploitable vulnerability in production services, affecting 40% of those services. This condition points to a persistent accumulation of security debt inside deployed software stacks. Dependency lag continues to grow … More → The post Your dependencies are 278 days out of date and your pipelines aren’t protected appeared first on Help Net Security.
http://news.poseidon-us.com/TRF40c

Security debt is becoming a governance issue for CISOs

Application security backlogs keep expanding across large development portfolios. Veracode’s 2026 State of Software Security Report puts numbers behind a familiar operational pattern, fixes lag discovery, and older weaknesses stay open across release cycles. 2026 findings against the 2025 baseline (Source: Veracode) The analysis spans 1.6 million unique applications that underwent static analysis, dynamic analysis, software composition analysis, and manual penetration testing through Veracode’s platform. The scope covers commercial software suppliers, outsourcers, and open source … More → The post Security debt is becoming a governance issue for CISOs appeared first on Help Net Security.
http://news.poseidon-us.com/TRF3z3

AFCA brings in ex-Beyond Bank CIO

As its inaugural chief technology officer.
http://news.poseidon-us.com/TRDxjl

BlacksmithAI: Open-source AI-powered penetration testing framework

BlacksmithAI is an open-source penetration testing framework that uses multiple AI agents to execute different stages of a security assessment lifecycle. A multi-agent structure for offensive workflows BlacksmithAI runs as a hierarchical system in which an orchestrator coordinates task execution across specialized agents. Each agent maps to a common penetration testing function. The recon agent handles attack surface mapping and information gathering. The scan and enumeration agent performs service discovery. A vulnerability analysis agent evaluates … More → The post BlacksmithAI: Open-source AI-powered penetration testing framework appeared first on Help Net Security.
http://news.poseidon-us.com/TRDxbt