433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

A new book reveals how a covert US campaign targeted the Sinaloa cartel

“Sinaloa’s been around for over a century. They can outfight the government in parts of Mexico and they’re as big as a Fortune 50 company,” Jake Braun said. The post A new book reveals how a covert US campaign targeted the Sinaloa cartel first appeared on Federal News Network.
http://news.poseidon-us.com/TPZr2j

AI Malware: Hype vs. Reality

A grounded look at AI malware: most threats sit at low maturity levels, with no verified autonomous BYOAI attacks. Learn what’s real, what’s hype, and how defenders should respond.
http://news.poseidon-us.com/TPZnt5

How a noisy ransomware intrusion exposed a long-term espionage foothold

Getting breached by two separate and likely unconnected cyber attack groups is a nightmare scenario for any organization, but can result in an unexpected silver lining: the noisier intrusion can draw attention to a far stealthier threat that might otherwise linger undetected for months. A double whammy In a recently published report, threat researchers at Positive Technologies have detailed the findings of their investigation into two incidents at Russian companies, which they have tied to: … More → The post How a noisy ransomware intrusion exposed a long-term espionage foothold appeared first on Help Net Security.
http://news.poseidon-us.com/TPZmXL

MuddyWater cyber campaign adds new backdoors in latest wave of attacks

ESET researchers say an Iran aligned threat group is refining its playbook again, and the latest activity shows how much its tactics have shifted. MuddyWater is a long running cyberespionage group, and new findings points to a campaign that hits a range of organizations in Israel, with one confirmed victim in Egypt. A wider set of targets and tools Researchers say the victims in Israel were in the technology, engineering, manufacturing, local government and educational … More → The post MuddyWater cyber campaign adds new backdoors in latest wave of attacks appeared first on Help Net Security.
http://news.poseidon-us.com/TPZhY4

Skyflow delivers Runtime AI Data Security for protecting sensitive data in agentic workflows

Skyflow announced the launch of its Runtime AI Data Security platform for AWS AgentCore. While AI models are improving every few months and the industry is investing hundreds of billions of dollars on AI infrastructure, most organizations still struggle to move from demos and prototypes to production-grade agentic applications. As enterprises and the startups and ISVs that serve them begin deploying agentic applications in production, they need a reliable way to protect sensitive customer data. … More → The post Skyflow delivers Runtime AI Data Security for protecting sensitive data in agentic workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TPZbpL

Upwind adds real-time AI security and posture management to its CNAPP

Upwind announced the launch of its integrated AI security suite, expanding the company’s CNAPP to protect the growing enterprise AI attack surface. The suite introduces real-time AI security, AI posture management, AI agents, and runtime protection, allowing AI security to benefit from the same deep cloud context that already powers Upwind’s CNAPP across data security, API security, identity, and cloud detection and response. “AI security should not be a stand-alone security component,” said Amiram Shachar, … More → The post Upwind adds real-time AI security and posture management to its CNAPP appeared first on Help Net Security.
http://news.poseidon-us.com/TPZbpF

Creative cybersecurity strategies for resource-constrained institutions

In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity with limited resources and still build resilience. He discusses the tension between open research and the need to protect sensitive information, noting that workable solutions come from understanding how people get their jobs done. Pickett explains how security teams can partner with researchers to set guardrails that support innovation rather than slow it. He also … More → The post Creative cybersecurity strategies for resource-constrained institutions appeared first on Help Net Security.
http://news.poseidon-us.com/TPZbnc

Product showcase: UserLock IAM for Active Directory

UserLock brings modern identity and access management (IAM) to Active Directory, adding granular multi-factor authentication (MFA), contextual access controls, single sign-on (SSO) and real-time session management. It helps AD-first teams secure logons and govern access to network and SaaS resources without overhauling their identity stack. How UserLock works Real-time visibility into your AD environment For most AD teams, visibility is a big operational blind spot. Access controls are much more effective when you can see … More → The post Product showcase: UserLock IAM for Active Directory appeared first on Help Net Security.
http://news.poseidon-us.com/TPZVsZ