433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Securonix brings autonomous decision-making to security operations

Securonix announced the next phase of Securonix EON, introducing modular GenAI Agents. These specialized, decision-capable agents are designed to perform high-impact jobs to be done (JTBD) across the threat detection, investigation, and response (TDIR) lifecycle. These intelligent security agents represent the future of security operations: autonomous, explainable, human-aligned—and ready to scale with the threat landscape. “Our customers and prospects are interested in increasing the efficiency and accuracy of their Security Operation Centers, and reducing the … More → The post Securonix brings autonomous decision-making to security operations appeared first on Help Net Security.
http://news.poseidon-us.com/TKSZKm

Arkose Labs launches Edge and Scraping Protection to secure enterprise digital borders

Arkose Labs has announced the expansion of its security portfolio with two new offerings: Arkose Edge and Arkose Scraping Protection. These innovations address the growing challenges large enterprises face in securing their complex digital perimeters and protecting valuable content from theft by scammers using advanced bots. Arkose Labs Founder and CEO Kevin Gosschalk said: “Enterprises have told us they’re tired of investing in security products that leave gaping vulnerabilities at their API endpoints, which erodes … More → The post Arkose Labs launches Edge and Scraping Protection to secure enterprise digital borders appeared first on Help Net Security.
http://news.poseidon-us.com/TKSZKl

Torii introduces agentic SaaS Management Platform

Torii unveiled Torii Eko, an agentic SaaS Management Platform, ushering in a new era of AI-powered execution for modern software management. Torii Eko includes three intelligent in-platform agents: Eko Assist, available now; and Eko Insight and Eko Act, both coming later this year. Together, they deliver context-rich insights and action exactly when and where teams need it. The modern software portfolio is exploding in complexity. Torii’s research shows the average tech stack now includes 668 … More → The post Torii introduces agentic SaaS Management Platform appeared first on Help Net Security.
http://news.poseidon-us.com/TKSZKk

Saviynt ISPM provides insights into an organization’s identity and access posture

Saviynt launched AI-powered Identity Security Posture Management (ISPM) as part of its converged Identity Cloud platform. Saviynt’s ISPM provides actionable insights into an organization’s identity and access posture, offering an intelligent starting point to prioritizing and remediating risks. “As GE HealthCare became a stand-alone company, the demands around identity security and audit readiness significantly increased. We are excited for Saviynt’s ISPM to help us shift from a reactive to a proactive approach – empowering our … More → The post Saviynt ISPM provides insights into an organization’s identity and access posture appeared first on Help Net Security.
http://news.poseidon-us.com/TKSZHv

Trellix DLP Endpoint Complete prevents data leaks in Windows and macOS

Trellix announced advancements to Trellix DLP Endpoint Complete, available globally in Q2 2025. New offerings and features incorporate intelligent capabilities to enhance Trellix’s data loss prevention (DLP) solutions, enabling customers to protect sensitive information in non-text file formats, strengthen compliance through visual labeling features, stop exfiltration via text in web forms such as AI chat interactions, and protect data during wireless file-sharing between macOS devices. “By extending DLP capabilities to non-text formats and supporting emerging … More → The post Trellix DLP Endpoint Complete prevents data leaks in Windows and macOS appeared first on Help Net Security.
http://news.poseidon-us.com/TKSTlL

Product showcase: Ledger Flex secure crypto wallet

The Ledger Flex is a hardware wallet designed for the secure storage of cryptocurrencies and NFTs. It combines security features with a user-friendly interface, making it suitable for both beginners and more experienced users. Ledger Flex stores your private keys offline. This is called cold storage. By keeping keys offline, your assets are safer from online threats like hackers or malware. Unlike software wallets, which store private keys on devices connected to the internet, hardware … More → The post Product showcase: Ledger Flex secure crypto wallet appeared first on Help Net Security.
http://news.poseidon-us.com/TKSTlC

Mobile security is a frontline risk. Are you ready?

The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. For enterprises, mobile is no longer a secondary risk. It’s now one of the primary attack surfaces. CVE data for iOS and Android OS versions (Source: Zimperium) Mobile phishing (mishing) is surging One-third of mobile threats are phishing-based attacks, called mishing. SMS phishing (smishing) makes up over two-thirds of these. Attackers are also … More → The post Mobile security is a frontline risk. Are you ready? appeared first on Help Net Security.
http://news.poseidon-us.com/TKSTjN

Villain: Open-source framework for managing and enhancing reverse shells

Villain is an open-source Stage 0/1 command-and-control (C2) framework designed to manage multiple reverse TCP and HoaxShell-based shells. Beyond simply handling connections, Villain enhances these shells with added functionality, offering commands and utilities, and allowing for shell sessions sharing across Villain instances running on different machines (sibling servers). “The main idea was to create a super-fast multi-handler for the most common types of reverse shells used in CTFs and, occasionally, in penetration tests, such as … More → The post Villain: Open-source framework for managing and enhancing reverse shells appeared first on Help Net Security.
http://news.poseidon-us.com/TKSQNl

Securing the invisible: Supply chain security trends

Adversaries are infiltrating upstream software, hardware, and vendor relationships to quietly compromise downstream targets. Whether it’s a malicious update injected into a CI/CD pipeline, a rogue dependency hidden in open-source code, or tampered hardware components, these attacks bypass traditional defenses by weaponizing trusted channels. Continuous monitoring of third-party risk “As more supply-chain attacks surface, third-party security is becoming essential for all businesses. Organizations must vet their suppliers, ensuring they practice good cyber security hygiene, while … More → The post Securing the invisible: Supply chain security trends appeared first on Help Net Security.
http://news.poseidon-us.com/TKSQN7

Why cyber resilience must be part of every organization’s DNA

As AI brings about excitement and transformative potential, the report reveals that organizations are forging ahead with innovations despite increased security concerns, according to LevelBlue’s 2025 Futures Report. In fact, just 29% of executives surveyed say they are reluctant to implement AI tools and technologies because of cybersecurity ramifications. AI-powered threats Organizations expect AI-powered attacks, such as deepfakes and synthetic identity attacks, to rise in 2025, but many remain unprepared. Researchers found that only 29% … More → The post Why cyber resilience must be part of every organization’s DNA appeared first on Help Net Security.
http://news.poseidon-us.com/TKSQM9