433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Edge Delta Security Data Pipelines mitigates security threats

Edge Delta announced its Security Data Pipelines. This solution empowers security teams to process, analyze, and act on security data faster and more efficiently than ever before. By enabling real-time data processing and enrichment, Edge Delta’s Security Data Pipelines transform how organizations detect, respond to, and mitigate security threats across complex environments. The Security Data Pipelines provide a foundational, scalable framework for standardizing, enriching, and streaming security data from a wide array of data sources … More → The post Edge Delta Security Data Pipelines mitigates security threats appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3pBm

Pangea introduces AI guardrails to secure AI applications

Pangea announced AI Guard and Prompt Guard to secure AI, defending against threats like prompt injection and sensitive information disclosure. Alongside the company’s existing AI Access Control and AI Visibility products, Pangea now offers comprehensive suite of guardrails to secure AI applications. “As companies race to build and deploy AI apps via RAG and agentic frameworks, integrating LLMs with users and sensitive data introduces substantial security risks,” said Oliver Friedrichs, CEO of Pangea. “New attacks … More → The post Pangea introduces AI guardrails to secure AI applications appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3kJP

Attackers are chaining flaws to breach Palo Alto Networks firewalls

Exploitation attempts targeting CVE-2025-0108, a recently disclosed authentication bypass vulnerability affecting the management web interface of Palo Alto Networks’ firewalls, are ramping up. “GreyNoise now sees 25 malicious IPs actively exploiting CVE-2025-0108, up from 2 on February 13,” the threat intelligence company shared on Tuesday. “This high-severity flaw allows unauthenticated attackers to execute specific PHP scripts, potentially leading to unauthorized access to vulnerable systems.” CVE-2025-0108 + CVE-2024-9474 and/or CVE-2025-0111 Palo Alto Networks has updated the … More → The post Attackers are chaining flaws to breach Palo Alto Networks firewalls appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3kHP

Veeam brings recovery orchestrator to Microsoft Hyper-V customers

Veeam Software announced it’s bringing recovery orchestrator to Microsoft Hyper-V customers as part of the Veeam Data Platform. Veeam Recovery Orchestrator simplifies and automates the disaster recovery planning, testing, and execution process. It allows organizations to create, manage, and test disaster recovery plans in a streamlined manner, ensuring quick and effective recovery of their data when an outage or disaster strikes. Building on Veeam Data Platform’s cyber resilience—malware scanning, IoC detection, and proactive threat scanning—enhanced … More → The post Veeam brings recovery orchestrator to Microsoft Hyper-V customers appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3kFM

XWorm Cocktail: A Mix of PE data with PowerShell Code, (Wed, Feb 19th)

While hunting, I spent some time trying to deobfuscate a malicious file discovered on VT. It triggered my PowerShell rule. At the end, I found two files that look close together:
http://news.poseidon-us.com/TJ3gSW

Kunai: Open-source threat hunting tool for Linux

Kunai is an open-source tool that provides deep and precise event monitoring for Linux environments. “What sets Kunai apart is its ability to go beyond simple event generation. While most security monitoring tools rely on syscalls or kernel function hooking, Kunai takes a more advanced approach by correlating events on the host and providing enriched insights. This means fewer but more meaningful events, reducing noise and the strain on log ingestion while delivering deeper visibility … More → The post Kunai: Open-source threat hunting tool for Linux appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3bZm

VC-backed cybersecurity startups and the exit crunch

The cybersecurity startup landscape is at a crossroads. As venture-backed companies strive for successful exits, the bar has risen dramatically, requiring more funding, higher revenue, and faster growth than ever before. In this Help Net Security video, Mark Kraynak, Founding Partner at Acrew Capital, breaks down the Exit Escape Velocity for Cybersecurity Startups report to explore the challenges of IPOs and M&A deals in the post-COVID era. The post VC-backed cybersecurity startups and the exit crunch appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3bYQ

Cyber hygiene habits that many still ignore

Cybersecurity advice is everywhere. We’re constantly reminded to update our passwords, enable two-factor authentication, and avoid clicking suspicious links. Yet, beneath these practical steps lie deeper cyber hygiene habits that, despite their importance, are frequently overlooked. These underlying mindsets and systemic behaviors shape the security landscape. 1. Treating digital security as a habit, not a checklist Most cybersecurity recommendations are framed as tasks: update software, change passwords, verify emails. But proper cyber hygiene isn’t about … More → The post Cyber hygiene habits that many still ignore appeared first on Help Net Security.
http://news.poseidon-us.com/TJ3YvM