433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

BigID uses agentic AI to automate privacy and compliance mapping

BigID announced the agentic AI–powered data mapping capability that automates and visualizes personal data flows for privacy and compliance. Agentic Data Mapping strengthens privacy programs with AI-driven automation, helping organizations modernize compliance operations, maintain accountability, and ensure continuous visibility across complex data environments. This innovation transforms static, manual privacy records into intelligent, continuously updated maps: giving organizations a living view of how personal data moves, where it’s processed, and where risks emerge. As personal data … More → The post BigID uses agentic AI to automate privacy and compliance mapping appeared first on Help Net Security.
http://news.poseidon-us.com/TPLwM9

The Cloudflare Outage May Be a Security Roadmap

An intermittent outage at Cloudflare on Tuesday briefly knocked many of the Internet’s top destinations offline. Some affected Cloudflare customers were able to pivot away from the platform temporarily so that visitors could still access their websites. But security experts say doing so may have also triggered an impromptu network penetration test for organizations that have come to rely on Cloudflare to block many types of abusive and malicious traffic.
http://news.poseidon-us.com/TPLvdH

SBA told laid-off employees they could get their jobs back. It rescinded that offer a day later  

The RIF rescissions and their immediate recall stem from competing interpretations of shutdown-ending spending deal Congress passed last week. The post SBA told laid-off employees they could get their jobs back. It rescinded that offer a day later   first appeared on Federal News Network.
http://news.poseidon-us.com/TPLtXM

SBA told laid-off employees they could get their jobs back. It rescinded that offer a day later  

The RIF rescissions and their immediate recall stem from competing interpretations of shutdown-ending spending deal Congress passed last week. The post SBA told laid-off employees they could get their jobs back. It rescinded that offer a day later   first appeared on Federal News Network.
http://news.poseidon-us.com/TPLtKs

Black Kite launches AI Agent to automate third-party risk work

Black Kite announced the release of Black Kite AI Agent, an agent that automatically investigates, assesses, and reports on third-party risk. “Our strong performance validates that our accuracy, scalability, and transparent approach is more than meeting the demands to avoid disruptions and reduce the administrative costs associated with legacy third-party cyber risk management,” said Paul Paget, CEO, Black Kite. “Managing third-party cyber risk is one of the most dynamic and complex challenges facing business leaders … More → The post Black Kite launches AI Agent to automate third-party risk work appeared first on Help Net Security.
http://news.poseidon-us.com/TPLpqP

Stealth-patched FortiWeb vulnerability under active exploitation (CVE-2025-58034)

Attackers are actively exploiting another FortiWeb vulnerability (CVE-2025-58034) that Fortinet fixed without making its existence public at the time. About CVE-2025-58034 CVE-2025-58034 is an OS Command Injection flaw caused by improper neutralization of special elements. It allows authenticated attackers to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands. “Fortinet has observed this to be exploited in the wild,” the company’s Product Security Incident Response Team confirmed in a security … More → The post Stealth-patched FortiWeb vulnerability under active exploitation (CVE-2025-58034) appeared first on Help Net Security.
http://news.poseidon-us.com/TPLpq9

Threat group reroutes software updates through hacked network gear

Sometimes an attack hides in the most ordinary corner of a network. ESET researchers say a China aligned threat group known as PlushDaemon has been quietly using hacked routers to steer software updates toward its own servers. The discovery shows how a small foothold in a single device can become a path into global targets. A new implant built to redirect everything ESET found that PlushDaemon uses an implant called EdgeStepper. It sits on a … More → The post Threat group reroutes software updates through hacked network gear appeared first on Help Net Security.
http://news.poseidon-us.com/TPLgDk

Sophos adds Intelix threat intelligence to Microsoft Security and 365 Copilot

Sophos announced the general availability of new integrations that connect Sophos Intelix, its cyber threat intelligence repository, with Microsoft Security Copilot and Microsoft 365 Copilot. Organizations of all sizes now gain real-time access to Sophos threat intelligence within Microsoft’s AI-powered environments, helping them strengthen defenses and respond to threats Every day, Sophos processes more than 223 terabytes of telemetry in its Sophos Central platform, generating over 34 million detections and automatically blocking more than 11 … More → The post Sophos adds Intelix threat intelligence to Microsoft Security and 365 Copilot appeared first on Help Net Security.
http://news.poseidon-us.com/TPLgDh

Arctic Wolf expands MDR capabilities with Abnormal AI behavioral email intelligence

Arctic Wolf announced a new integration between the Arctic Wolf Aurora Platform and Abnormal AI, expanding detection and response capabilities across one of the most targeted attack surfaces, email. The integration brings Abnormal AI’s behavioral AI detections directly into Arctic Wolf’s Managed Detection and Response (MDR) solution, enhancing protection for customers against business email compromise, phishing, malware, and insider account threats. Customers will benefit from active response and guided remediation from Arctic Wolf’s AI-powered SOC, … More → The post Arctic Wolf expands MDR capabilities with Abnormal AI behavioral email intelligence appeared first on Help Net Security.
http://news.poseidon-us.com/TPLgCk