433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Agencies meeting the efficiency mandate through AI, back office consolidations

Federal agency and industry executives say understanding where technology can have the biggest return on investment will drive modernization journeys.
http://news.poseidon-us.com/TR2JT3

Agencies meeting the efficiency mandate through AI, back office consolidations

Federal agency and industry executives say understanding where technology can have the biggest return on investment will drive modernization journeys.
http://news.poseidon-us.com/TR2JHD

GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack

GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and SectopRAT.
http://news.poseidon-us.com/TR2682

China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)

A suspected China-linked cyberespionage group has been covertly exploiting a critical zero-day flaw (CVE-2026-22769) in Dell’s RecoverPoint for Virtual Machines software since at least mid-2024, according to new research from Google’s threat intelligence team and Mandiant. The attackers deployed stealthy backdoors (BRICKSTORM and GRIMBOLT), a webshell (SLAYSTYLE) and maintained long-term access inside targeted networks. “Beyond the Dell appliance exploitation, Mandiant observed the actor employing novel tactics to pivot into VMware virtual infrastructure, including the creation … More → The post China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769) appeared first on Help Net Security.
http://news.poseidon-us.com/TR25Sw

Brinqa targets manual bottlenecks in exposure management with integrated AI agents

Brinqa has advanced its platform with the introduction of two new AI agents, the AI Attribution Agent and the AI Deduplication Agent, designed to address two of the most persistent and costly problems in enterprise security, unclear asset ownership and duplicate exposure signals. The key business problem of enterprise organizations around exposure management is not a lack of tools or information, it’s that they can’t make fast, defensible decisions when tools disagree, environments change, and … More → The post Brinqa targets manual bottlenecks in exposure management with integrated AI agents appeared first on Help Net Security.
http://news.poseidon-us.com/TR25SN

Microsoft Edge 145 lands with major enterprise security upgrades

Microsoft has begun rolling out Edge 145 to the Stable release channel, adding several enterprise-focused security enhancements. The update is being deployed in phases, with some features available through preview and targeted release programs. Edge 145 brings expanded data protection capabilities to Edge for Business. The browser supports cross-tenant enforcement of Intune App Protection Policies through Intune Mobile Application Management. Organizations can apply data loss prevention controls to Edge work profiles even on devices managed … More → The post Microsoft Edge 145 lands with major enterprise security upgrades appeared first on Help Net Security.
http://news.poseidon-us.com/TR25Q6

Securonix shifts security operations to measurable AI-driven productivity

Securonix announced Sam, the AI SOC Analyst, and the Securonix Agentic Mesh, introducing a new operating model for security operations that scales analyst productivity, governs AI in production, and delivers board-ready outcomes. At a time when security operations are overwhelmed by alert volume, analyst shortages, and rising SIEM costs, Securonix is shifting the conversation from AI features and consumption metrics to measurable work delivered. With Sam and Agentic Mesh, security leaders can now quantify how … More → The post Securonix shifts security operations to measurable AI-driven productivity appeared first on Help Net Security.
http://news.poseidon-us.com/TR25Pz

The era of the Digital Parasite: Why stealth has replaced ransomware

For years, ransomware encryption functioned as the industry’s alarm bell. When systems locked up, defenders knew an attack had occurred. Not anymore. New empirical data show that attackers are actively dismantling that signal. According to Picus Security’s Red Report 2026, adversaries are no longer optimizing for disruption; they’re optimizing for residency. Based on a thorough analysis of more than 1.1 million malicious files and 15.5 million adversarial actions from 2025, this year’s report documents a … More → The post The era of the Digital Parasite: Why stealth has replaced ransomware appeared first on Help Net Security.
http://news.poseidon-us.com/TR25Pg

Cloud Range launches AI Validation Range to safely test and secure AI before deployment

Cloud Range has introduced its AI Validation Range, a secure, contained virtual cyber range that enables organizations to test, train, and validate AI models, applications, and autonomous agents without risking exposure of sensitive production data. AI adoption is accelerating faster than most organizations can meaningfully validate its security. Security teams are asked to integrate and defend AI systems that they didn’t design and can’t safely evaluate in production. With AI Validation Range, organizations can verify … More → The post Cloud Range launches AI Validation Range to safely test and secure AI before deployment appeared first on Help Net Security.
http://news.poseidon-us.com/TR25MB