433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Silobreaker Mimir adds agentic AI to intelligence workflows with governance and transparency

Silobreaker has announced new agentic AI capabilities that combine faster research and deeper contextual analysis with built-in governance and transparency to ensure trusted intelligence can be safely consumed across the wider enterprise. Silobreaker Mimir is an embedded agentic capability for intelligence operations, working directly within the analyst workflow. It helps teams retrieve evidence, deepen analysis, and turn validated findings into native assets and stakeholder ready outputs, such as creating dashboards and reports, without leaving the … More → The post Silobreaker Mimir adds agentic AI to intelligence workflows with governance and transparency appeared first on Help Net Security.
http://news.poseidon-us.com/TS8Mzd

OpenAI’s Chronicle feature lets Codex read your screen, raising privacy concerns

OpenAI’s Chronicle is a feature designed to help Codex, an AI-powered coding assistant, better understand what users are working on by capturing context directly from their screens. It uses recent screen activity to build memories, allowing Codex to interpret references, identify relevant sources, and pick up on the tools and workflows users rely on, without requiring them to restate context in every prompt. “In these cases, Codex uses Chronicle to provide additional context. When another … More → The post OpenAI’s Chronicle feature lets Codex read your screen, raising privacy concerns appeared first on Help Net Security.
http://news.poseidon-us.com/TS8MxR

CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133)

CISA added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including a Cisco Catalyst SD-WAN Manager vulnerability (CVE-2026-20133) that Cisco has yet to flag as exploited. Three Cisco Catalyst SD-WAN Manager vulnerabilities Alongside CVE-2026-20133, CISA has also listed CVE-2026-20128 and CVE-2026-20122 – two other Catalyst SD-WAN Manager vulnerabilities – as being leveraged in attacks. The latter two flaws have been confirmed as actively exploited by Cisco in early March 2026. In March, VulnCheck’s … More → The post CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133) appeared first on Help Net Security.
http://news.poseidon-us.com/TS8FmS

A single platform powers SIM farm proxy networks across 17 countries

Racks of phones and 4G modems, connected to carrier networks and rented out as commercial mobile proxy services, are operating across at least 94 locations in 17 countries. An investigation by infrastructure intelligence firm Infrawatch traced a large portion of those deployments to a shared software platform called ProxySmart, built and operated out of Minsk, Belarus. SIM farm (Source: Infrawatch) Infrawatch identified 87 distinct instances of the ProxySmart control panel exposed on the internet, spread … More → The post A single platform powers SIM farm proxy networks across 17 countries appeared first on Help Net Security.
http://news.poseidon-us.com/TS894P

NGate NFC malware targets Android users through trojanized payment app

NFC-based payment fraud is expanding geographically and operationally. A campaign active since November 2025 is targeting Android users in Brazil using a new variant of the NGate malware family, this time embedded in a trojanized version of HandyPay, a legitimate NFC relay application available on Google Play since 2021. ESET Research identified the campaign and attributed two separate NGate samples to the same threat actor. Both samples are distributed from the same domain and use … More → The post NGate NFC malware targets Android users through trojanized payment app appeared first on Help Net Security.
http://news.poseidon-us.com/TS893s

Researchers build an encrypted routing layer for private AI inference

Organizations in healthcare, finance, and other sensitive industries want to use large AI models without exposing private data to the cloud servers running those models. A cryptographic technique called Secure Multi-Party Computation (MPC) makes this possible. It splits data into encrypted fragments, distributes them across two or more servers that do not share information with each other, and lets those servers compute an AI result without either one ever seeing the raw input. The catch … More → The post Researchers build an encrypted routing layer for private AI inference appeared first on Help Net Security.
http://news.poseidon-us.com/TS7wB3

Cybersecurity jobs available right now: April 21, 2026

Application Security Engineer (DevSecOps / Azure DevOps) BEWAHARVEST | Philippines | Hybrid – View job details As an Application Security Engineer (DevSecOps / Azure DevOps), you will embed security across the SDLC by working with engineering and DevOps teams to implement automated security controls and testing. You will manage application security programs including SAST, DAST, SCA, IAST, and RASP, integrating them into Azure DevOps pipelines with enforceable quality gates. You will perform API security testing, … More → The post Cybersecurity jobs available right now: April 21, 2026 appeared first on Help Net Security.
http://news.poseidon-us.com/TS7w8x

AI swarms could hijack democracy without anyone noticing

AI-powered personas are becoming so realistic that they can infiltrate online communities and subtly steer public opinion. Unlike traditional bots, they adapt, coordinate, and refine their messaging at a massive scale, creating a false sense of consensus. Early warning signs—like deepfakes and fake news networks—have already appeared in global elections. Researchers warn that the next election could be the true test of this technology’s power.
http://news.poseidon-us.com/TS7tfW