433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

WatchGuard Firebox firewalls under attack (CVE-2025-14733)

More than 115,000 internet-facing WatchGuard Firebox firewalls may be vulnerable to compromise via CVE-2025-14733, a remote code execution vulnerability actively targeted by attackers, Shadowserver’s latest scanning reveals. About CVE-2025-14733 WatchGuard Firebox firewalls, which also incorporate VPN and unified threat management capabilities, are used by organizations around the world. The appliances run the Fireware OS, a network security operating system built on a hardened Linux-based kernel. WatchGuard disclosed CVE-2025-14733 on December 18, when it also revealed … More → The post WatchGuard Firebox firewalls under attack (CVE-2025-14733) appeared first on Help Net Security.
http://news.poseidon-us.com/TPyBtn

DIG AI: Uncensored darknet AI assistant at the service of criminals and terrorists

Resecurity has identified the emergence of uncensored darknet AI assistants, enabling threat actors to leverage advanced data processing capabilities for malicious purposes. One of these – DIG AI – was identified on September 29 of this year and has already gained popularity among cybercriminal and organized crime circles. During Q4 2025, our HUNTER team observed a notable increase in malicious actors’ utilizing DIG AI, accelerating during the Winter Holidays, when illegal activity worldwide reached a … More → The post DIG AI: Uncensored darknet AI assistant at the service of criminals and terrorists appeared first on Help Net Security.
http://news.poseidon-us.com/TPyBsw

Docker makes hardened images free open and transparent for everyone

Docker has made its open source Docker Hardened Images project available at no cost for every developer and organization. The catalog contains more than 1,000 container images built on open source distributions such as Debian and Alpine and is released under the Apache 2.0 license. The images are accessible through Docker Hub and related distribution points. “Security has to start at the earliest point in development, and needs to be universally available to every developer,” … More → The post Docker makes hardened images free open and transparent for everyone appeared first on Help Net Security.
http://news.poseidon-us.com/TPy7gS

574 arrests, $3 million recovered in Africa-wide cybercrime crackdown

Law enforcement agencies across 19 countries arrested 574 suspects and recovered approximately $3 million during a major cybercrime operation spanning Africa. Suspects were arrested in Ghana in connection to the cyber-fraud case, with over 100 digital devices seized. (Source: Europol) The month-long initiative, known as Operation Sentinel (27 October–27 November), targeted three of the region’s most prevalent cybercrime threats: business email compromise (BEC), digital extortion, and ransomware. All three were identified as growing risks in … More → The post 574 arrests, $3 million recovered in Africa-wide cybercrime crackdown appeared first on Help Net Security.
http://news.poseidon-us.com/TPy7fP

Building cyber talent through competition, residency, and real-world immersion

In this Help Net Security interview, Chrisma Jackson, Director of Cybersecurity & Mission Computing Center and CISO at Sandia National Laboratories, reflects on where the cyber talent pipeline breaks down and what it takes to fix it. She discusses skill gaps, hiring and retention realities, and how cybersecurity careers are evolving beyond traditional paths. Where do you see the real bottleneck in the cyber talent pipeline? Is it skills, training models, compensation, or something deeper … More → The post Building cyber talent through competition, residency, and real-world immersion appeared first on Help Net Security.
http://news.poseidon-us.com/TPy1GV

This AI finds simple rules where humans see only chaos

A new AI developed at Duke University can uncover simple, readable rules behind extremely complex systems. It studies how systems evolve over time and reduces thousands of variables into compact equations that still capture real behavior. The method works across physics, engineering, climate science, and biology. Researchers say it could help scientists understand systems where traditional equations are missing or too complicated to write down.
http://news.poseidon-us.com/TPxz9Z

Browser agents don’t always respect your privacy choices

Browser agents promise to handle online tasks without constant user input. They can shop, book reservations, and manage accounts by driving a web browser through an AI model. A new academic study warns that this convenience comes with privacy risks that security teams should not ignore. The report evaluates eight popular browser agents released or updated in 2025. These include ChatGPT Agent, Google Project Mariner, Amazon Nova Act, Perplexity Comet, Browserbase Director, Browser Use, Claude … More → The post Browser agents don’t always respect your privacy choices appeared first on Help Net Security.
http://news.poseidon-us.com/TPxysv

Anubis: Open-source web AI firewall to protect from scraper bots

Anubis is an open-source tool designed to protect websites from automated scraping and abusive traffic by adding computational friction before a request is served. Maintained by TecharoHQ, the project targets a growing problem for site operators who want to keep content accessible to humans while limiting large scale automated collection. At its core, Anubis acts as a gatekeeper that sits in front of a web service. When a client connects, the tool can require the … More → The post Anubis: Open-source web AI firewall to protect from scraper bots appeared first on Help Net Security.
http://news.poseidon-us.com/TPxysF