433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Combining millions of years of evolution with tech wizardry: The cyborg cockroach

A research team has developed two new autonomous navigation systems for cyborg insects to better navigate unknown, complex environments. The algorithms utilized only simple circuits that leveraged natural insect behaviors, like wall-following and climbing, to navigate challenging terrain, such as sandy, rock-strewn surfaces. For all difficulties of terrain tested, the cyborg insects were able to reach their target destination, demonstrating the potential of cyborg insects for surveillance, disaster-site exploration, and more.
http://news.poseidon-us.com/TJ54tP

Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand

A new, improved version of Darcula, a cat-themed phishing-as-a-service (PhaaS) platform aimed at serving Chinese-speaking criminals, will be released this month and will allow malicious users to create customized phishing kits to target a wider variety of brands than ever before, Netcraft researchers are warning. Even users who have gotten wise to the fake “missed package” or “package confirmation” notices from their national post or delivery services may not be ready the variety of phishing … More → The post Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand appeared first on Help Net Security.
http://news.poseidon-us.com/TJ51fx

Hackers pose as employers to steal crypto, login credentials

Since early 2024, ESET researchers have been tracking DeceptiveDevelopment, a series of malicious campaigns linked to North Korea-aligned operators. Disguising themselves as software development recruiters, these threat actors lure victims with fake job offers and deliver software projects embedded with infostealing malware. “As part of a fake job interview process, the DeceptiveDevelopment operators ask their targets to take a coding test, such as adding a feature to an existing project, with the files necessary for … More → The post Hackers pose as employers to steal crypto, login credentials appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4xF1

Menlo Security acquires Votiro to boost data security for enterprises

Menlo Security announced the acquisition of Votiro, a data and file security platform that specializes in Content Disarm & Reconstruction (CDR) and data loss prevention. Together, Menlo Security and Votiro will enable enterprises to implement data security best practices without slowing employee and business productivity. In modern enterprise, data resides in numerous locations including software as a service (SaaS) applications and multiple cloud storage solutions, while being spread across multiple Cloud Service Providers (CSPs) and … More → The post Menlo Security acquires Votiro to boost data security for enterprises appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4xC6

Privacera enables enterprises to identify, assess, and remediate AI-related risks

Privacera announced significant updates to its AI Governance (PAIG) platform, reinforcing its commitment to AI risk management and compliance. These additions align PAIG to the existing National Institute of Standards and Technology’s (NIST) AI Risk Management Framework, offering a comprehensive, structured approach designed to improve trustworthiness in AI technologies while promoting innovation and mitigating risks. “As enterprises increasingly integrate generative AI into their workflows and deploy more AI Agents, ensuring security and compliance is critical,” … More → The post Privacera enables enterprises to identify, assess, and remediate AI-related risks appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4sX7

Norton’s AI-powered features defend against scams and social engineering threats

Norton is setting the standard for scam protection with a new range of AI-powered features fully integrated in Norton Cyber Safety products to help protect people from the most widespread cyberthreat of our time. Like the first domino tipping over and setting off a chain reaction, scams are the initial event that can trigger a series of serious attacks, including identity theft and financial fraud. The Company reports that 90% of all cyberthreats now originate … More → The post Norton’s AI-powered features defend against scams and social engineering threats appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4sX1

1Password helps MSPs boost security and streamline their operations

1Password introduced 1Password Enterprise Password Manager – MSP Edition, a dedicated solution that transforms how MSPs safeguard client data and helps them confront complex threat environments. With features tailored to MSPs’ unique needs, this comprehensive solution strengthens client security posture and boosts productivity, all while enabling MSPs to scale their operations efficiently and maximize profitability. “The demand we’ve seen from MSPs since the beta program has been extraordinary,” said Jason Eberhardt, VP of Global MSP … More → The post 1Password helps MSPs boost security and streamline their operations appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4sWR

Lumu Playback strengthens threat detection

Lumu announced Playback feature for Managed Service Providers (MSPs). Playback collects, analyzes and stores network metadata including network logs, and turns them into actionable threat intelligence. This enterprise-grade technology is widely adopted by the financial sector, healthcare, government, and education, and is now being made available to the MSP market and its SMB clients. Playback enables MSPs to efficiently meet compliance requirements, and strengthen threat detection while significantly reducing operational costs. Via a self-service experience, … More → The post Lumu Playback strengthens threat detection appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4sQh

Unknown and unsecured: The risks of poor asset visibility

In this Help Net Security interview, Juliette Hudson, CTO of CybaVerse, discusses why asset visibility remains a critical cybersecurity challenge. She explains how to maintain security without slowing down operations, shares ways to improve visibility in OT environments, and explains how AI can be both a solution and a challenge. Hudson also provides actionable advice for security leaders seeking to enhance their organization’s security posture. Why is asset visibility still such a critical issue? You … More → The post Unknown and unsecured: The risks of poor asset visibility appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4hsh

300% increase in endpoint malware detections

The third quarter of 2024 saw a dramatic shift in the types of malware detected at network perimeters, according to a new WatchGuard report. The report’s key findings include a 300% increase quarter over quarter of endpoint malware detections, highlighted by growing threats that exploit legitimate websites or documents for malicious purposes as threat actors turn to more social engineering tactics to execute their attacks. While Microsoft documents like Word and Excel have long been … More → The post 300% increase in endpoint malware detections appeared first on Help Net Security.
http://news.poseidon-us.com/TJ4hr9