433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Booking.com data breach: Customer reservation data exposed

“Unauthorized third parties may have been able to access certain booking information associated with your reservation,” email alerts sent out by Booking.com over the weekend warn. The online travel agency did not say which system(s) were accessed by the unauthorized third parties nor explained the scope of the incident. They only said that they “recently noticed suspicious activity affecting a number of reservations” and that their investigation revealed that the attackers may have accessed name(s), … More → The post Booking.com data breach: Customer reservation data exposed appeared first on Help Net Security.
http://news.poseidon-us.com/TS22Hn

Binary Defense expands NightBeacon with threat-aligned Detection Coverage Index

Binary Defense has announced the launch of NightBeacon Detect, a new module within NightBeacon, the company’s AI-driven SOC platform. The first capability released is Detection Coverage Index, a confidence-based view of how well an organization is covered against specific threat actors, their tactics, techniques, and sub-techniques, and how that coverage changes over time. NightBeacon Detect solves the problem with how detection coverage is measured Security teams invest heavily in detection tools, rules, and telemetry, yet … More → The post Binary Defense expands NightBeacon with threat-aligned Detection Coverage Index appeared first on Help Net Security.
http://news.poseidon-us.com/TS22G6

Google to penalize sites that hijack the back button

Google is broadening its spam policies to crack down on “back button hijacking,” a deceptive practice where websites interfere with browser navigation, blocking users from returning to the page they came from. Instead, users are usually redirected to pages they have not visited or are shown unsolicited recommendations or ads. “Back button hijacking interferes with the browser’s functionality, breaks the expected user journey, and results in user frustration. People report feeling manipulated and less willing … More → The post Google to penalize sites that hijack the back button appeared first on Help Net Security.
http://news.poseidon-us.com/TS1yck

AI adoption is outpacing the safeguards around it

AI is becoming part of professional and private life, reaching mainstream adoption faster than the personal computer or the internet. These systems are tested in reasoning, safety, and real-world tasks, but the reliability of those measurements remains uncertain. The 2026 AI Index from Stanford’s Institute for Human-Centered Artificial Intelligence outlines the broader environment around this growth, including economic value, labor market effects, and the role of AI sovereignty. It also examines developments in science and … More → The post AI adoption is outpacing the safeguards around it appeared first on Help Net Security.
http://news.poseidon-us.com/TS1ycC

Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready

In this Help Net Security interview, Idan Habler, AI Security Researcher at Cisco, breaks down a threat most security teams haven’t named yet: agentic memory as an attack surface. Habler walks through MemoryTrap, a disclosed and remediated method to compromise Claude Code’s memory, showing how a single poisoned memory object can spread across sessions, users, and subagents. He explains why AI memory needs the same governance as secrets and identities, and what organizations must rebuild … More → The post Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready appeared first on Help Net Security.
http://news.poseidon-us.com/TS1rCr

Review: The Psychology of Information Security

Security controls fail when they are designed without regard for the people who must use them. That is the central argument of Leron Zinatullin’s second edition, and it is an argument he builds methodically across 17 chapters that draw from organizational psychology, change management, and usability research. About the author Leron Zinatullin is the CISO of Constantinople, a provider of AI-native banking. He’s also a speaker and advisor to startups. He has led large scale, … More → The post Review: The Psychology of Information Security appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lMF

29 million leaked secrets in 2025: Why AI agents credentials are out of control

AI agents need credentials to work. They authenticate with LLM platforms, connect to databases, call SaaS APIs, access cloud resources, and orchestrate across dozens of external services. Every integration point requires an identity. Most organizations are handling this badly, and the evidence is in the code. GitGuardian’s State of Secrets Sprawl Report found 28,649,024 new secrets exposed in public GitHub commits across 2025, a 34% year-over-year increase and the largest annual jump in the report’s … More → The post 29 million leaked secrets in 2025: Why AI agents credentials are out of control appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lMD

Zero trust at year two: What nobody planned for

In this Help Net Security video, Jim Alkove, CEO of Oleria, walks through where zero trust programs typically stand one to two years in. Most organizations have made gains in endpoint security and network segmentation, but identity remains the stubborn problem. Identity sprawl, legacy system exceptions, and workforce friction each contribute to stalls that few programs anticipated. Alkove then turns to a challenge most teams are not prepared for: AI agents operating at scale. A … More → The post Zero trust at year two: What nobody planned for appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lMC

Cybersecurity jobs available right now: April 14, 2026

Cyber Security Engineer/Application Security Specialist Tecnots | India | On-site – View job details As a Cyber Security Engineer/Application Security Specialist, you will integrate security into the SDLC, perform application security reviews, and support secure APIs, authentication, and data protection. You will embed security into CI/CD pipelines using SAST and DAST, enforce secure coding practices, and support remediation. You will secure cloud and on-prem environments, including Microsoft Azure, manage IAM and access controls, and handle … More → The post Cybersecurity jobs available right now: April 14, 2026 appeared first on Help Net Security.
http://news.poseidon-us.com/TS1lLY