433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Ex-Google engineers charged with orchestrating high-tech secrets extraction

A federal grand jury has indicted three Silicon Valley engineers on charges in a scheme to steal trade secrets from Google and other leading technology companies. The indictment charges the three defendants with conspiracy to commit trade secret theft, theft and attempted theft of trade secrets, and obstruction of justice. Each could receive up to 10 years in prison if convicted. Federal prosecutors said the three used their positions to gain access to confidential and … More → The post Ex-Google engineers charged with orchestrating high-tech secrets extraction appeared first on Help Net Security.
http://news.poseidon-us.com/TR47Jn

Google cleans house, bans 80,000 developer accounts from the Play Store

Google prevented more than 1.75 million policy-violating apps from being published on Google Play and banned over 80,000 developer accounts that attempted to publish harmful apps in 2025. Developer verification, mandatory pre-review checks, and testing requirements in the Google Play ecosystem have reduced entry points for bad actors. “User safety is at the core of everything we build. Over the years, we’ve introduced tools to help users stay safe and make informed app choices — … More → The post Google cleans house, bans 80,000 developer accounts from the Play Store appeared first on Help Net Security.
http://news.poseidon-us.com/TR40cR

Man gets five years for aiding North Korean IT employment scam

Ukrainian national Oleksandr Didenko, 29, was sentenced in U.S. District Court to 5 years in prison for an identity theft scheme that enabled North Korean workers to secure fraudulent employment. He pleaded guilty in November 2025 to wire fraud conspiracy and aggravated identity theft and agreed to forfeit more than $1.4 million, including about $181,438 in cash and cryptocurrency seized from him and his co-conspirators. “Oleksandr Didenko’s fraudulent activity inflicted systemic and deliberate financial harm … More → The post Man gets five years for aiding North Korean IT employment scam appeared first on Help Net Security.
http://news.poseidon-us.com/TR3xC4

651 arrested, $4.3 million recovered in African cybercrime sweep

Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more than $4.3 million from online scams. In Nigeria police took down a fraud ring that used phishing, identity theft and social engineering to scam victims (Source: Interpol) Running from 8 December 2025 to 30 January 2026, the operation targeted networks behind high-yield investment fraud, mobile money scams and fraudulent loan … More → The post 651 arrested, $4.3 million recovered in African cybercrime sweep appeared first on Help Net Security.
http://news.poseidon-us.com/TR3q4s

Security Compass brings policy-driven security and compliance to agentic AI development

Security Compass released SD Elements for Agentic AI Workflow, enabling organizations to stay in control of security and compliance as AI becomes part of software development. AI agents introduce an unprecedented opportunity to accelerate the velocity of software development, but concerns about security and compliance are holding back adoption in regulated industries. Emerging laws like EU Cyber Resilience Act increase the burden of security on software manufacturers. Using the SD Elements Agentic AI workflow, you … More → The post Security Compass brings policy-driven security and compliance to agentic AI development appeared first on Help Net Security.
http://news.poseidon-us.com/TR3q4q

The CISO view of fraud risk across the retail payment ecosystem

In this Help Net Security interview, Paul Suarez, VP and CISO at Casey’s, explains how his team manages patching and upgrades for fuel payment systems with long hardware lifecycles. He also discusses risks tied to QR code payments and outlines why loyalty abuse can be hard to spot. Suarez shares how Casey’s monitors payment systems across stores, corporate networks, and third-party processors. How do you manage patching and modernization for fuel-related payment infrastructure that may … More → The post The CISO view of fraud risk across the retail payment ecosystem appeared first on Help Net Security.
http://news.poseidon-us.com/TR3q4n

Applying green energy tax policies to improve cybersecurity

For years, governments have focused only on the stick of compliance when they could leverage the carrot of tax incentives. Theoretically, compliance fines and penalties should act as a deterrent that improves accountability and reduces data breaches. However, many vendors often assume compliance risk rather than securing data effectively. For example, Meta has been the most penalized company, accounting for €2.5 billion in fines across parent and subsidiaries. These large, ubiquitous, irreplaceable technology companies are … More → The post Applying green energy tax policies to improve cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TR3q4T

Quantum security is turning into a supply chain problem

Supplier onboarding, invoice processing, and procurement platforms run on encrypted data flows that were built for long-term trust. In many organizations, that trust still depends on cryptographic standards like RSA and elliptic curve cryptography (ECC), even as security teams begin planning for a post-quantum world. A recent apexanalytix research report argues that supply chain leaders are already operating inside a quantum risk window, even though large-scale quantum computing remains years away. The core issue is … More → The post Quantum security is turning into a supply chain problem appeared first on Help Net Security.
http://news.poseidon-us.com/TR3lLP

Uptime Kuma: Open-source monitoring tool

Service availability monitoring remains a daily operational requirement across IT teams, SaaS providers, and internal infrastructure groups. Many environments rely on automated checks and alerting to track outages, latency issues, and service degradation across web applications and network endpoints. Uptime Kuma is an open-source uptime monitoring project that supports this type of operational monitoring through a self-hosted deployment model. The tool is designed to monitor a wide range of service types, including websites, APIs, network … More → The post Uptime Kuma: Open-source monitoring tool appeared first on Help Net Security.
http://news.poseidon-us.com/TR3lLK