433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Darktrace expands MSSP offering with AI-driven managed email security

Darktrace has launched its managed security service for MSSPs, enabling partners to deliver AI-native email security with real-time detection, investigation, and response across the email ecosystem. The launch is supported by updates to the Darktrace Defenders Partner Program designed to provide flexibility and scalability for partners at every stage of their services maturity, helping them expand security offerings and deliver AI-native protection to customers around the world. Email threats continue to grow in sophistication as … More → The post Darktrace expands MSSP offering with AI-driven managed email security appeared first on Help Net Security.
http://news.poseidon-us.com/TRgQFz

Novee introduces autonomous AI red teaming to hunt LLM vulnerabilities

Novee today introduced AI Red Teaming for LLM Applications for its AI penetration testing platform, designed to uncover security vulnerabilities in LLM-powered applications before attackers can exploit them. Enterprises are deploying AI-enabled software, from customer-facing chatbots to internal copilots and autonomous agents, and security teams are now facing a new class of risks, including prompt injection, jailbreak attempts, data exfiltration, and manipulation of agent behavior that traditional pentesting tools were never designed to detect. Unlike … More → The post Novee introduces autonomous AI red teaming to hunt LLM vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TRgQFC

Detectify uncovers hidden assets and risks across entire IP ranges

Detectify has launched IP Range Scanning, enabling continuous discovery and monitoring of entire IP address blocks to help security teams identify forgotten assets and hidden risks before attackers exploit them. Many organizations are sitting on forgotten IP addresses that have become entry points for cyberattacks. While millions have been spent securing public-facing websites, legacy tools can miss large parts of the attack surface due to noise and stale data. Detectify’s research shows how serious this … More → The post Detectify uncovers hidden assets and risks across entire IP ranges appeared first on Help Net Security.
http://news.poseidon-us.com/TRgQCr

32% of top-exploited vulnerabilities are over a decade old

Exploitation timelines continued to compress in enterprise environments, with newly disclosed flaws reaching active use almost immediately and older weaknesses remaining active years after disclosure. (Source: Cisco Talos) Findings from Cisco Talos’ 2025 Year in Review show how attackers combined rapid weaponization with long-term exposure spanning infrastructure, identity systems, and user workflows. Top-targeted vulnerabilities show speed and persistence Newly disclosed vulnerabilities moved into active exploitation with little delay. React2Shell became the most targeted vulnerability of … More → The post 32% of top-exploited vulnerabilities are over a decade old appeared first on Help Net Security.
http://news.poseidon-us.com/TRgQCj

Microsoft details AI prompt abuse techniques targeting AI assistants

Prompt abuse occurs when crafted inputs manipulate an AI system into producing unintended behavior, such as attempting to access sensitive information or overriding built-in safety instructions. Prompt injection is also recognized as one of the top risks in the 2025 OWASP guidance for LLM applications. “Detecting abuse is challenging because it exploits natural language, such as subtle differences in phrasing, which can manipulate AI behavior while leaving little or no obvious trace. Without proper logging … More → The post Microsoft details AI prompt abuse techniques targeting AI assistants appeared first on Help Net Security.
http://news.poseidon-us.com/TRgQCc

NVIDIA puts GPU orchestration in community hands

GPU-accelerated AI workloads now run on Kubernetes in the large majority of enterprise environments. Managing those workloads at scale has required specialized tooling that, until now, remained under vendor control. NVIDIA moved to change that at KubeCon Europe in Amsterdam this week, donating its Dynamic Resource Allocation (DRA) Driver for GPUs to the Cloud Native Computing Foundation (CNCF). The transfer shifts ownership of the driver from NVIDIA to the broader Kubernetes project community. Developers across … More → The post NVIDIA puts GPU orchestration in community hands appeared first on Help Net Security.
http://news.poseidon-us.com/TRgQCX

Check Point unveils AI Defense Plane to govern and secure enterprise AI systems

Check Point has announced the Check Point AI Defense Plane, a unified AI security control plane designed to help enterprises govern how AI is connected, deployed, and operated across the business. As AI systems move from assistants to autonomous actors that access data, invoke tools, and take action, the AI Defense Plane provides the intelligence layer needed to secure these systems. “The enterprise is entering the agentic era. AI is no longer limited to generating … More → The post Check Point unveils AI Defense Plane to govern and secure enterprise AI systems appeared first on Help Net Security.
http://news.poseidon-us.com/TRgQC5

Protos AI delivers agent-driven threat intelligence without vendor lock-in

Protos Labs has announced the launch of a freemium edition of Protos AI, a platform that deploys specialized AI agents augmenting cyber threat intelligence (CTI) analyst teams by executing structured investigations from planning to reporting. The new tier enables security teams to operationalize AI-driven investigations without committing to closed vendor ecosystems or overhauling existing security stacks. As AI adoption accelerates across cybersecurity, many organizations face a gap between experimentation and practical implementation. ISC2’s 2024 Cybersecurity … More → The post Protos AI delivers agent-driven threat intelligence without vendor lock-in appeared first on Help Net Security.
http://news.poseidon-us.com/TRgGtV

AiStrike cuts alert noise with Continuous Detection Engineering

AiStrike has launched Continuous Detection Engineering, a capability that transforms how security operations teams manage detections, shifting from reactive alert triage to proactive, intelligence-driven optimization. The detection quality gap Security teams today are overwhelmed by alerts, but the root cause is not volume, it’s detection quality. AiStrike’s analysis across enterprise environments revealed that: More than 80% of alerts lead to dead ends Fewer than 20% of detection rules ever trigger alerts Under 5% of rules … More → The post AiStrike cuts alert noise with Continuous Detection Engineering appeared first on Help Net Security.
http://news.poseidon-us.com/TRgGsb

GitHub-hosted malware campaign uses split payload to evade detection

A large-scale malware delivery campaign has been targeting developers, gamers, and general users through fake tools hosted on GitHub, Netskope researchers have warned. These “lures” are highly polished and appear legitimate, occasionally mimicking real projects, thus making them difficult to distinguish from safe software. A dual-component trojan is delivered Netskope threat researchers first discovered a trojanized GitHub repository ostensibly offering a Docker image of the OpenClaw AI assistant. The repo was very convincing. “The README … More → The post GitHub-hosted malware campaign uses split payload to evade detection appeared first on Help Net Security.
http://news.poseidon-us.com/TRgGsZ