433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader

Microsoft and Cloudflare have disrupted a Phishing-as-a-Service operation selling the RaccoonO365 kit for stealing Microsoft 365 account credentials. “Using a court order granted by the Southern District of New York, [we] seized 338 websites associated with the popular service, disrupting the operation’s technical infrastructure and cutting off criminals’ access to victims,” announced Steven Masada, Assistant General Counsel at Microsoft’s Digital Crimes Unit (DCU). Who is behind RaccoonO365? RaccoonO365 (aka Storm-2246) sold pre-packaged, subscription-based phishing kits, … More → The post Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader appeared first on Help Net Security.
http://news.poseidon-us.com/TN7DzB

BeyondTrust introduces identity security controls for AI

BeyondTrust released new AI security controls in Identity Security Insights. These capabilities provide visibility into AI agents, secure orchestration of their actions, and an on-board intelligence layer to help teams make faster, smarter security decisions. “The rise of AI agents is creating a new and urgent identity security challenge. Agentic AI is not an isolated problem; it’s a subset of the broader non-human identity landscape. To secure it effectively, organizations must think holistically about their … More → The post BeyondTrust introduces identity security controls for AI appeared first on Help Net Security.
http://news.poseidon-us.com/TN7DyG

Siren’s K9 uses AI to turn complex investigations into actionable insights

Siren announced the launch of K9, an AI companion designed to transform the way investigators uncover threats and connections. K9 is fast, dependable and mission-focused, built to guard, protect, and serve those on the front lines of keeping communities and nations safe. “K9 is more than an AI companion, it’s a loyal partner,” said Jeferson Zanim, CPO at Siren. “We designed it to feel like a trusted colleague. Always ready, always reliable and focused on … More → The post Siren’s K9 uses AI to turn complex investigations into actionable insights appeared first on Help Net Security.
http://news.poseidon-us.com/TN7DlD

Astrix unveils secure-by-design AI agents to help enterprises manage compliance risk

Astrix Security launched the AI Agent Control Plane (ACP), a solution designed to deploy secure-by-design AI agents across the enterprise. With ACP, every AI agent receives short-lived, precisely scoped credentials and just-in-time access based on least privilege principles, eliminating access chaos and reducing compliance risk. “Agentic threats are no longer theoretical. Recent studies show 80% of companies have already experienced unintended AI agent actions, from unauthorized system access to data leaks,” said Alon Jackson, Astrix … More → The post Astrix unveils secure-by-design AI agents to help enterprises manage compliance risk appeared first on Help Net Security.
http://news.poseidon-us.com/TN6yZ6

ManageEngine enhances Log360 to reduce alert fatigue for SOC teams

ManageEngine unveiled that its security information and event management (SIEM) solution, Log360, has been strengthened with a reengineered threat detection approach, in a major enhancement aimed at addressing the needs of security operations center (SOC) teams. Over 60% of SOC teams are overwhelmed with irrelevant threat data, of which a majority (53%) of cloud security alerts can be considered noise, according to the 2025 Threat Intelligence Benchmark study commissioned by Google. ManageEngine’s latest release bolsters … More → The post ManageEngine enhances Log360 to reduce alert fatigue for SOC teams appeared first on Help Net Security.
http://news.poseidon-us.com/TN6y8j

Global AI spending to approach $1.5 trillion this year: Gartner

Hyperscaler investments in GPUs and accelerators will nearly double the size of the AI server market, the analyst firm said Wednesday.
http://news.poseidon-us.com/TN6x2F

How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet built to closely mimic a real industrial environment. Why traditional honeypots fall short Honeypots are systems designed to attract attackers so that security teams can study their behavior without putting production equipment at risk. Most ICS honeypots today are low interaction, using software to simulate devices like programmable logic controllers (PLCs). These setups are useful … More → The post How a fake ICS network can reveal real cyberattacks appeared first on Help Net Security.
http://news.poseidon-us.com/TN6sqQ

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how organizations can stay compliant with international rules while keeping their systems practical and user-friendly. Goldberg points out that getting compliance right goes beyond avoiding penalties and helps build trust with customers, partners, and regulators everywhere. If you could design the ideal compliance platform from scratch, how would you merge European … More → The post Creating a compliance strategy that works across borders appeared first on Help Net Security.
http://news.poseidon-us.com/TN6sF8

Rayhunter: EFF releases open-source tool to detect cellular spying

The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These devices, also known as IMSI catchers or Stingrays, mimic cell towers to trick phones into connecting so they can collect data. Rayhunter gives researchers, journalists, and privacy advocates a way to identify suspicious cellular activity. EFF group developed it to work on a common, low-cost mobile hotspot device. At launch, they used an Orbic hotspot, … More → The post Rayhunter: EFF releases open-source tool to detect cellular spying appeared first on Help Net Security.
http://news.poseidon-us.com/TN6sCq