433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Zscaler enhances data sovereignty controls with regional processing and logging

Zscaler has expanded its data sovereignty capabilities globally, powered by the Zscaler Zero Trust Exchange cloud security platform. For global enterprises, the conflict between protecting data and enabling cross-border collaboration is a major compliance and business challenge to growth. Zscaler already operates 160+ data centers and is present in most countries. Its architecture is based on isolated control, data, and logging planes, distinct layers and separation for management, traffic inspection, and record-keeping to ensure sensitive … More → The post Zscaler enhances data sovereignty controls with regional processing and logging appeared first on Help Net Security.
http://news.poseidon-us.com/TRRwKs

SOC Prime’s DetectFlow Enterprise moves threat detection to the data ingestion layer

SOC Prime has announced the release of DetectFlow Enterprise, a solution that brings real-time threat detection to the ingestion layer, turning data pipelines into detection pipelines. Running tens of thousands of Sigma detections on live Kafka streams with millisecond MTTD using Apache Flink, DetectFlow Enterprise enables security teams to detect, tag, enrich, and correlate threat data in flight before data reaches downstream systems such as SIEM, EDR, and Data Lakes. This gives organizations a way … More → The post SOC Prime’s DetectFlow Enterprise moves threat detection to the data ingestion layer appeared first on Help Net Security.
http://news.poseidon-us.com/TRRwKk

Binary Defense’s NightBeacon brings AI-driven analysis to SOCs

Binary Defense has announced the launch of NightBeacon, an AI-powered security operations platform built directly into the company’s security operations center (SOC). NightBeacon serves as the intelligence infrastructure behind Binary Defense’s MDR service, supporting every analyst shift, detection, and investigation across the SOC. Customers benefit from an approximately 30% reduction in mean time to resolution, 46% faster incident summarization, and a 24% to 26% increase in the number of incidents SOC analysts can process per … More → The post Binary Defense’s NightBeacon brings AI-driven analysis to SOCs appeared first on Help Net Security.
http://news.poseidon-us.com/TRRwJj

War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the ongoing conflict in the Middle East. Stryker confirmed in a Form 8-K filing with the SEC that a cyberattack caused a global disruption to its Microsoft systems. The Wall Street Journal reported the attack began in the United States before spreading globally, with staff discovering that cellphones and laptops … More → The post War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker appeared first on Help Net Security.
http://news.poseidon-us.com/TRRlkh

A sudden change to how VA evaluates disabilities triggers swift backlash

“There are people who believe if you have this advanced prosthetic, you’re no longer disabled,” Carl Blake said. “That’s something we certainly cannot abide.”
http://news.poseidon-us.com/TRRdsB

Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans

Codoxo has announced the launch of Deepfake Detection, an AI-driven fraud detection tool now being deployed by health plans across the U.S. The solution helps identify AI-generated or manipulated medical documentation and diagnostic images submitted in support of claims before payment is made. Healthcare fraud is already a multibillion-dollar problem, and generative AI is turning documentation fraud from a manual crime into a scalable one. Fraudsters know payers rely on progress notes, clinical narratives, and … More → The post Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans appeared first on Help Net Security.
http://news.poseidon-us.com/TRRdNx

Stop fixing OT security with IT thinking

In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, discusses the specific cybersecurity challenges in manufacturing environments. The conversation covers why standard IT security practices break down on shop floors, where PLCs and decade-old firmware were never designed to be networked. She explains how nation-state actors quietly settle into industrial networks, using stale accounts and compromised workstations to map environments without triggering alarms. She addresses patch management in OT, where production … More → The post Stop fixing OT security with IT thinking appeared first on Help Net Security.
http://news.poseidon-us.com/TRRYrL

Agentic attack chains advance as infostealers flood criminal markets

Cybercriminals spent much of 2025 automating their operations, shifting from one-off attacks to systems that can run entire intrusion cycles with minimal human input. Data collected from criminal forums, illicit marketplaces, and underground chat services shows a threat environment where stolen identity data, unpatched vulnerabilities, and ransomware operations are interdependent. The findings come from Flashpoint’s 2026 Global Threat Intelligence Report, pulling data directly from sources across open and restricted online spaces. AI is moving from … More → The post Agentic attack chains advance as infostealers flood criminal markets appeared first on Help Net Security.
http://news.poseidon-us.com/TRRVt2

Does Anthropic deserve the trust of the cybersecurity community?

The cybersecurity industry runs on trust. The belief that when a vendor says they will behave a certain way, they will, that critical CVEs are in fact critical, or when companies say they’re GDPR compliant, they really are. But earning trust is not a one-and-done thing. Anthropic understood this better than any AI company. As OpenAI moved fast and broke things, Anthropic published a Responsible Scaling Policy (RSP), a framework for addressing catastrophic risks. Although … More → The post Does Anthropic deserve the trust of the cybersecurity community? appeared first on Help Net Security.
http://news.poseidon-us.com/TRRVt1