433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Compromised SAP NetWeaver instances are ushering in opportunistic threat actors

A second wave of attacks against the hundreds of SAP NetWeaver platforms compromised via CVE-2025-31324 is underway. “[The] attacks [are] staged by follow-on, opportunistic threat actors who are leveraging previously established webshells (from the first zero-day attack) on vulnerable systems,” Onapsis warned last week. The second wave of attacks CVE-2025-31324 is a vulnerability in SAP NetWeaver’s Visual Composer tool that allows unauthenticated attackers to: Upload malicious files to the host system by sending carefully crafted … More → The post Compromised SAP NetWeaver instances are ushering in opportunistic threat actors appeared first on Help Net Security.
http://news.poseidon-us.com/TKjfT0

Hunted Labs Entercept combats software supply chain attacks

Hunted Labs announced Entercept, an AI-powered source code security platform that gives enterprises instant visibility into suspicious behavior from the people and code in their software supply chain. Open source code and the people who write it are the unguarded entry point for cybercriminals aiming to inject ransomware, disrupt business, or commit espionage. As the use of open source code skyrockets, development and security teams face mounting pressure to find out who’s behind their code … More → The post Hunted Labs Entercept combats software supply chain attacks appeared first on Help Net Security.
http://news.poseidon-us.com/TKjfRS

Resecurity One simplifies cybersecurity operations

Resecurity launched Resecurity One, the next-generation cybersecurity platform designed to improve how organizations approach cybersecurity. Resecurity One combines Digital Risk Management, Cyber Threat Intelligence, Endpoint Protection, Identity Protection, Supply Chain Risk Monitoring, and xDR capabilities into a unified solution, providing comprehensive protection against evolving cyber threats. Resecurity One is a breakthrough in cybersecurity technology that addresses the challenges faced by organizations of all sizes in managing multiple cybersecurity products. By integrating various cybersecurity functionalities into … More → The post Resecurity One simplifies cybersecurity operations appeared first on Help Net Security.
http://news.poseidon-us.com/TKjSRg

Bluetooth 6.1 released, enhances privacy and power efficiency

The Bluetooth Special Interest Group has released Bluetooth 6.1, and one of the most important new features is an update to how devices manage privacy and power. The update, called Bluetooth Randomized RPA (resolvable private address) Updates, helps protect users from tracking and reduces battery drain. Better privacy Bluetooth devices often change their address to make it harder for others to track them. In Bluetooth 6.1, the timing of these changes is now randomized. This … More → The post Bluetooth 6.1 released, enhances privacy and power efficiency appeared first on Help Net Security.
http://news.poseidon-us.com/TKjKpY

Why security teams cannot rely solely on AI guardrails

In this Help Net Security interview, Dr. Peter Garraghan, CEO of Mindgard, discusses their research around vulnerabilities in the guardrails used to protect large AI models. The findings highlight how even billion-dollar LLMs can be bypassed using surprisingly simple techniques, including emojis. To defend against prompt injection, many LLMs are wrapped in guardrails that inspect and filter prompts. But these guardrails are typically AI-based classifiers themselves, and, as Mindgard’s study shows, they are just as … More → The post Why security teams cannot rely solely on AI guardrails appeared first on Help Net Security.
http://news.poseidon-us.com/TKjKnL

How to give better cybersecurity presentations (without sounding like a robot)

Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not talent,” he says. “Any skill, be it dancing, football, or presenting, can be developed only if you commit and practice.” So, the first step is obvious: Quit avoiding presentations. The more you do them, the better you’ll get. Content first, delivery second We tend to focus on the performance side of presenting: … More → The post How to give better cybersecurity presentations (without sounding like a robot) appeared first on Help Net Security.
http://news.poseidon-us.com/TKjKmX