433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Europol goes after The Com’s ransomware and extortion networks

Law enforcement agencies across 28 countries have spent the past year building cases against a loosely organized collective known as The Com, a decentralized network of mostly teenagers and young adults linked to high-profile ransomware attacks, financial extortion, and the coercion of vulnerable children. Europol announced the first operational results of Project Compass, reporting 30 arrests and the full or partial identification of 179 perpetrators since the initiative launched in January 2025. Investigators have also … More → The post Europol goes after The Com’s ransomware and extortion networks appeared first on Help Net Security.
http://news.poseidon-us.com/TRBlFn

Android 17 second beta expands privacy controls for contacts, SMS and local networks

Google’s second beta of Android 17 continues updates to platform behavior and introduces new APIs focused on protecting sensitive data. Protecting contact and local network data A new system-level Contacts Picker gives apps temporary access only to the contact information a user selects. It limits contact data exposure and works across both personal and work profiles on the device. Contacts Picker (Source: Google) The update also introduces the EyeDropper API, which lets apps select a … More → The post Android 17 second beta expands privacy controls for contacts, SMS and local networks appeared first on Help Net Security.
http://news.poseidon-us.com/TRBlCt

Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)

It&#x27s Friday, let&#x27s have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:
http://news.poseidon-us.com/TRBjj0

Microsoft taps ASUS and Dell for the Windows 365 Cloud PC strategy

Microsoft is adding two new Windows 365 Cloud PC devices, the ASUS NUC 16 for Windows 365 and the Dell Pro Desktop for Windows 365, expanding hardware options for its cloud-based desktop service. Both devices are scheduled for release in the third quarter of 2026, with distribution varying by region and model. The two devices join Windows 365 Link, Microsoft’s first Cloud PC device, which launched in April 2025. Details for both products remain limited. … More → The post Microsoft taps ASUS and Dell for the Windows 365 Cloud PC strategy appeared first on Help Net Security.
http://news.poseidon-us.com/TRBfjB

Illumio Insights brings agentless visibility and breach containment to hybrid environments

Illumio unveiled its solution to deliver agentless visibility and breach containment across both data center and cloud environments. Illumio Insights ingests real-time telemetry and policy data from Check Point and Fortinet firewalls, converting existing firewall information into real-time traffic maps to provide agentless visibility across the hybrid environment. This extends Illumio Insights into data center and endpoint estates, providing end-to-end view and analysis of network posture. By ingesting native firewall telemetry, Insights can map data … More → The post Illumio Insights brings agentless visibility and breach containment to hybrid environments appeared first on Help Net Security.
http://news.poseidon-us.com/TRBfj7

AuthMind enhances identity observability to secure vaults, secrets, and NHIs

AuthMind has announced that its platform offers enhanced capabilities to address the fast-growing security concerns surrounding vaults, secrets managers, and AI-driven workloads. Since its founding, AuthMind has focused on securing identity access and execution paths across agentic AI, non-human identities (NHIs), and human users, enabling enterprises to observe what identities actually do across cloud, network and infrastructure environments. As adoption of agentic AI and automation accelerates, the identity-to-secret attack surface has expanded, increasing the urgency … More → The post AuthMind enhances identity observability to secure vaults, secrets, and NHIs appeared first on Help Net Security.
http://news.poseidon-us.com/TRBfj4

Ransomware activity peaks outside business hours

Intrusions continue to center on credential access and timed execution outside standard business hours. The Sophos Active Adversary Report 2026 analyzes 661 incident response and managed detection and response cases handled between November 1, 2024 and October 31, 2025, spanning organizations in 70 countries. The dataset examines how attackers gain access, how quickly they reach key systems, and when ransomware and data theft occur. Identity-related root causes as a proportion of all cases covered in … More → The post Ransomware activity peaks outside business hours appeared first on Help Net Security.
http://news.poseidon-us.com/TRBfgQ

NATO greenlights iPhone and iPad for classified information handling

Apple confirmed that the iPhone and iPad have been approved for use with classified information in NATO restricted environments. The devices will no longer require special software or settings to handle NATO restricted-level information. “This achievement recognizes that Apple has transformed how security is traditionally delivered. Prior to iPhone, secure devices were only available to sophisticated government and enterprise organizations after a massive investment in bespoke security solutions,” stated Ivan Krstić, Apple’s VP of Security … More → The post NATO greenlights iPhone and iPad for classified information handling appeared first on Help Net Security.
http://news.poseidon-us.com/TRBYxS

Oculeus 2FN authenticates calls in real time to stop CLI spoofing

Oculeus has launched its new Two Factor Network (2FN) solution. The 2FN solution provides a framework for telcos to trace the origin of traffic, verify caller identity, determine the roaming status of inbound calls, and prevent Caller Line Identification (CLI) spoofing. The landscape of fraud has been changed by cybercrime-as-a-service with the evolution of specialized criminal gangs that subvert communications networks at scale, then sell their services to less technically skilled scammers worldwide. The services … More → The post Oculeus 2FN authenticates calls in real time to stop CLI spoofing appeared first on Help Net Security.
http://news.poseidon-us.com/TRBWSN

N-able’s Anomaly Detection feature identifies credential-based threats

N-able expanded its Anomaly Detection capabilities in Cove Data Protection to combat the surge in identity-driven cyberattacks targeting backup environments. The new functionality delivers real-time alerts when suspicious or unauthorized changes to backup policies are detected, giving customers an early warning system against the credential-based tactics attackers use to disable or corrupt backups before deploying ransomware. Identity-based attacks have become a major driver of successful cyberattacks, with AI making these schemes even more convincing. With … More → The post N-able’s Anomaly Detection feature identifies credential-based threats appeared first on Help Net Security.
http://news.poseidon-us.com/TRBWSM