433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

AxoSyslog: Open-source scalable security data processor

AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team. “We first started by making syslog-ng more cloud-ready: we packaged syslog-ng in a container, added helm charts, and made it more suitable for use in cloud-native environments. We’ve also improved the monitoring and operational experience to help AxoSyslog better integrate with modern telemetry pipelines,” Balazs Scheidler, CEO of Axoflow, told Help Net Security. AxoSyslog is not … More → The post AxoSyslog: Open-source scalable security data processor appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ8st

Product showcase: Augmenting penetration testing with Plainsea

Human-led penetration testing is an essential practice for any organization seeking to proactively address potential attack vectors. However, this indispensable pentesting method is often limited by several factors: high resource demands, project time constraints, dispersed communication, and lack of continuous visibility into evolving vulnerabilities. Plainsea‘s innovative all-in-one platform addresses these challenges through an augmented penetration testing approach that results in a continuous, streamlined, and collaborative service. Designed for MSSPs and security teams, the platform enables … More → The post Product showcase: Augmenting penetration testing with Plainsea appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ8sZ

CWE top 25 most dangerous software weaknesses

The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying the root causes of these vulnerabilities provides insights to shape investments, policies, and practices that proactively prevent their occurrence. The CWE top 25 most dangerous software weaknesses list was calculated by analyzing public vulnerability information in Common Vulnerabilities and Exposures (CVE) Records for CWE root cause mappings. This year’s dataset included 31,770 CVE Records for … More → The post CWE top 25 most dangerous software weaknesses appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ8rJ

Enhancing visibility for better security in multi-cloud and hybrid environments

In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She discusses the growing complexity of cloud environments and the importance of real-time detection to protect against increasingly sophisticated attacks. Motta also shares practical advice for SMBs and organizations navigating compliance and cloud security challenges. How have cloud-specific threats evolved over the past few years, and what new … More → The post Enhancing visibility for better security in multi-cloud and hybrid environments appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ6Rb

Preventing credential theft in the age of AI

In this Help Net Security video, Tina Srivastava, MIT Lecturer and CEO of Badge, discusses a 20-year cryptography problem – using biometrics for authentication without storing a face/finger/voice print. This has massive implications for corporate and personal security/privacy because there is nothing for an attacker to steal. The post Preventing credential theft in the age of AI appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ6RZ

Full recovery from breaches takes longer than expected

In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly. Cybersecurity leaders feel unprepared for future threats Recovery times were even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each – 70% above the average – and their recovery times stretched to … More → The post Full recovery from breaches takes longer than expected appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ6Qq

Increase In Phishing SVG Attachments, (Thu, Nov 21st)

There is an increase in SVG attachments used in phishing emails (Scalable Vector Graphics, an XML-based vector image format).
http://news.poseidon-us.com/TGJ5w5

Researchers use artificial intelligence to diagnose depression

Depression is one of the most common mental illnesses. As many as 280 million people worldwide are affected by this disease, which is why researchers have developed an artificial intelligence (AI) model that helps to identify depression based on both speech and brain neural activity. This multimodal approach, combining two different data sources, allows a more accurate and objective analysis of a person’s emotional state, opening the door to a new phase of depression diagnosis.
http://news.poseidon-us.com/TGJ3xS

Artificial intelligence can be used to predict river discharge and warn of potential flooding

Researchers have created a method that uses artificial intelligence to more accurately predict short-term river discharge using historical data from two hydrometric stations on the Ottawa River along with other weather-based parameters. They built on an existing type of algorithm called group method of data handling, which constructs predictive models by sorting and combining data into groups. The models are computed in different combinations repeatedly until the best and most reliable data combination is identified.
http://news.poseidon-us.com/TGJ3Hv

Real-world chemists are more diverse than generative AI images suggest

Asking children ‘What does a scientist look like?’ now results in more illustrations of women and people of color than decades ago. But do generative artificial intelligence (AI) tools also depict the diversity among scientists? Researchers prompted AI image generators for portraits of chemists. They found that none of the collections accurately represents the gender, racial or disability diversity among real chemists today.
http://news.poseidon-us.com/TGJ2xF