433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

SmartBear expands ReadyAPI with AI-powered API testing capabilities

SmartBear has announced ReadyAPI’s new AI test generation capability that accelerates API testing by up to 80% while giving teams control to enable or disable AI. While competitors focus on speed alone, ReadyAPI’s AI test generation capability is architected for quality at scale and addresses the testing gap by aligning validation with development velocity without compromising application integrity. The AI capability automates repetitive test creation while QA professionals maintain oversight and strategic orchestration. Users can … More → The post SmartBear expands ReadyAPI with AI-powered API testing capabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TSbcGK

Attackers accessed, downloaded code from Grafana Labs’ GitHub

A threat actor has managed to access Grafana Labs’ GitHub environment and download the company’s codebase, the open-source observability and data visualization firm announced on Sunday. The breach is significant given Grafana Labs’ widespread use across enterprise engineering and DevOps teams worldwide. Grafana Labs is best known for its open-source dashboard and visualization platform, but also offers tools for log aggregation (Loki), continuous profiling (Pyroscope), distributed tracing (Tempo), and a hosted SaaS option (Grafana Cloud). … More → The post Attackers accessed, downloaded code from Grafana Labs’ GitHub appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWV9

201 arrested in INTERPOL disruption of phishing and fraud networks

Operation Ramz, a cybercrime initiative coordinated by INTERPOL across the MENA region, focused on disrupting phishing campaigns, malware activity, and cyber scams that caused substantial financial losses across the region. The operation resulted in the arrest of 201 individuals and the identification of an additional 382 suspects. Moroccan authorities seized computers, smartphones and external hard drives containing banking data and software used for phishing operations. (Source: INTERPOL) Authorities identified 3,867 victims and seized 53 servers. … More → The post 201 arrested in INTERPOL disruption of phishing and fraud networks appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWV8

The AI backdoor your security stack is not built to see

Enterprises deploying LLMs have spent the past two years building defenses around a reasonable assumption: malicious behavior leaves a trace in the input. Scan for suspicious tokens, filter unusual characters, watch for prompt injection patterns. New research from Microsoft and the Institute of Science Tokyo demonstrates that this defensive posture has a blind spot, and the cost of that blind spot could be measured in leaked proprietary data and regulatory exposure. The attack, called MetaBackdoor, … More → The post The AI backdoor your security stack is not built to see appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWTZ

Lyrie: Open-source autonomous pentesting agent

Penetration testing has usually required weeks of manual work, specialized tooling, and teams with narrow skill sets. Lyrie, an open-source autonomous security agent built by OTT Cybersecurity, compresses that process into a command line tool and publishes the entire codebase. The project reached version 3.1.0 this month. The release adds XChaCha20-Poly1305 memory encryption for sensitive threat data, seven new proof-of-concept generators covering prompt injection, auth bypass, CSRF, open redirect, race conditions, secret exposure, and cross-site … More → The post Lyrie: Open-source autonomous pentesting agent appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWTW

AI shrinks vulnerability exploitation window to hours

Time has become organizations’ biggest vulnerability because the gap between vulnerability discovery and exploitation has narrowed to hours, according to Synack’s 2026 State of Vulnerabilities Report. Total vulnerabilities by severity (2022-2025) (Source: Synack) AI expands the attack surface Agentic AI systems that act autonomously across systems introduce new risks that require human expertise to identify and understand. Automated scanning detects known signatures but can miss logic flaws, misconfigurations, and unexpected behavior. In 2025, mean time … More → The post AI shrinks vulnerability exploitation window to hours appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWTQ

Product showcase: McAfee + ChatGPT integration turns doubt into a scam check

McAfee + ChatGPT integration brings real-time scam detection in conversations and gives users an easier way to verify suspicious content before clicking or responding. It is available to anyone, without requiring a McAfee or ChatGPT subscription. It combines conversational AI with McAfee’s cybersecurity intelligence to help users evaluate potentially dangerous content such as messages, emails, links, screenshots, and social media posts for signs of scams or phishing. How McAfee + ChatGPT helps identify phishing attempts … More → The post Product showcase: McAfee + ChatGPT integration turns doubt into a scam check appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWTL

When ransomware hits, confidence doesn’t restore endpoints

Ransomware, supply chain vulnerabilities, insider threats, compliance failures, and software disruptions remain major concerns for security leaders, according to The Ransomware Reality: Zero Days to Recover report by Absolute Security. How CISOs currently ensure endpoint resilience against ransomware (overall, %) (Source: Absolute Security) A survey of 750 CISOs from enterprise organizations with more than 5,000 employees in the United States and the United Kingdom revealed gaps between ransomware frequency, confidence in recovery capabilities, and remediation … More → The post When ransomware hits, confidence doesn’t restore endpoints appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWTD

Debian 13.5 point release lands with security fixes, bug patches

Debian 13.5 is the fifth point release for the stable distribution “trixie.” The update folds in roughly 100 Debian Security Advisories and corrections for more than 130 source packages, covering everything from the Linux kernel and Apache HTTP Server to OpenSSH, sudo, systemd, OpenSSL, glibc, and FreeRDP. Fresh installer images carrying the same fixes will follow at the regular download locations. Sysadmins running trixie do not need to reinstall. Existing media remain valid, and machines … More → The post Debian 13.5 point release lands with security fixes, bug patches appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWSs

Google lets Workspace admins apply one policy across all SAML apps

Google has updated Context-Aware Access (CAA) in Google Workspace to introduce a default policy assignment for SAML applications. SAML applications are third-party or internal applications that use the Security Assertion Markup Language (SAML) protocol to enable single sign-on (SSO) with Google Workspace credentials. Google says this update introduces a default assignment that serves as a universal security baseline, automatically protecting any SAML-based application that does not have a specific policy already assigned. By establishing this … More → The post Google lets Workspace admins apply one policy across all SAML apps appeared first on Help Net Security.
http://news.poseidon-us.com/TSbV0z