433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Mobilicom rolls out a secured autonomy system powering next-gen AI drones

Mobilicom launched the Secured Autonomy (SA) Compute PRO-AT, which combines Mobilicom’s OS3 (Operational Security, Safety, and Standards compliance) cybersecurity software with Aitech’s rugged, NVIDIA-based AI Supercomputers, including the A230 Vortex AI GPGPU (general-purpose computing on graphics processing units) supercomputer. By integrating these solutions, Mobilicom expands its offerings for larger and faster drones, including platforms covered in the U.S. Department of Defense Group 2 and 3 UAS category. The SA Compute PRO-AT establishes a new category … More → The post Mobilicom rolls out a secured autonomy system powering next-gen AI drones appeared first on Help Net Security.
http://news.poseidon-us.com/TNbdqj

Accenture helps organizations advance agentic AI with Gemini Enterprise

Accenture and Google Cloud announced that their strategic alliance is driving client reinvention with Gemini Enterprise agentic AI solutions, building on the successful adoption of Google Cloud technologies for organizations across industries. Accenture is advancing agentic AI with support for Gemini Enterprise, a new agentic platform designed to bring the full power of Google’s AI to every employee and every workflow. With Accenture’s deep experience in cloud and AI technologies, engineering capabilities, and technical expertise … More → The post Accenture helps organizations advance agentic AI with Gemini Enterprise appeared first on Help Net Security.
http://news.poseidon-us.com/TNbYxw

Proof launches Certify, the cryptographic answer to AI-generated fraud

Generative AI is enabling the proliferation of fake documents, images, videos, and data at an unprecedented scale, to the point where it’s indistinguishable from reality. While fake media and misinformation have garnered the most attention, the real danger in AI lies in its ability to forge signatures, falsify records, impersonate one’s voice on the phone or fake a person’s likeness on video. Proof’s Certify product enables instantly authorized digital signing of any type of content … More → The post Proof launches Certify, the cryptographic answer to AI-generated fraud appeared first on Help Net Security.
http://news.poseidon-us.com/TNbYxp

comforte AG debuts TAMUNIO, its all-in-one shield for data security

comforte AG launched TAMUNIO, a unified data security platform designed to reduce risk, accelerate innovation with cloud and AI, and optimize operational costs for the most demanding enterprises. Built on decades of experience securing mission-critical environments, TAMUNIO integrates the best of comforte’s existing product portfolio with new capabilities designed to help customers manage the digital challenges of today and tomorrow. As they double down on digital transformation to accelerate growth, organizations are seeing their cyber-attack … More → The post comforte AG debuts TAMUNIO, its all-in-one shield for data security appeared first on Help Net Security.
http://news.poseidon-us.com/TNbYxm

Apple offers $2 million for zero-click exploit chains

Apple bug bounty program’s categories are expanding and rewards are rising, and zero-click exploit chains may now earn researchers up to $2 million. “Our bonus system, providing additional rewards for Lockdown Mode bypasses and vulnerabilities discovered in beta software, can more than double this reward, with a maximum payout in excess of $5 million,” Apple noted. The top rewards in all categories will apply only for issues affecting the company’s latest publicly available software and … More → The post Apple offers $2 million for zero-click exploit chains appeared first on Help Net Security.
http://news.poseidon-us.com/TNbYwx

Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)

CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access platforms, is being exploited by attackers in the wild. While Gladinet is aware of the vulnerability and of its active exploitation, a patch is still in the works. In the meantime, users can and should mitigate the flaw by disabling a handler within their installation’s Web.config file. “We have observed in-the-wild exploitation of this vulnerability impacting three customers so … More → The post Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371) appeared first on Help Net Security.
http://news.poseidon-us.com/TNbRVy

Why GPS fails in cities. And how it was brilliantly fixed

Our everyday GPS struggles in “urban canyons,” where skyscrapers bounce satellite signals, confusing even advanced navigation systems. NTNU scientists created SmartNav, combining satellite corrections, wave analysis, and Google’s 3D building data for remarkable precision. Their method achieved accuracy within 10 centimeters during testing. The breakthrough could make reliable urban navigation accessible and affordable worldwide.
http://news.poseidon-us.com/TNbMxN

October 2025 Patch Tuesday forecast: The end of a decade with Microsoft

A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after nearly a decade of service. Not far behind, after six years in existence, comes the end of Office 2019 and Exchange Server 2019. While this Patch Tuesday may be cause for celebration at Microsoft with the final updates for these products, I hope you’ve been following this closely and have already migrated to … More → The post October 2025 Patch Tuesday forecast: The end of a decade with Microsoft appeared first on Help Net Security.
http://news.poseidon-us.com/TNbDtH

From theory to training: Lessons in making NICE usable

SMBs may not have big budgets, but they are on the receiving end of many cyberattacks. A new study from Cleveland State University looked at how these companies could train staff without getting lost in the thousands of skills and tasks in the NICE Cybersecurity Workforce Framework. The result is a stripped-down, scenario-based curriculum that may hold lessons for security leaders in much larger enterprises. Shrinking a giant framework The research team asked a simple … More → The post From theory to training: Lessons in making NICE usable appeared first on Help Net Security.
http://news.poseidon-us.com/TNbDt1