433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

AI is drowning software maintainers in junk security reports

AI-assisted vulnerability research has exploded, unleashing a firehose of low-quality reports on overworked software maintainers who are wasting hours sifting through noise instead of fixing real problems. Linus Torvalds, the Linux kernel’s creator, says the flood has made the project’s security mailing list “almost entirely unmanageable, with enormous duplication due to different people finding the same things with the same tools.” Too many duplicates, and too much AI slop “If you found a bug using … More → The post AI is drowning software maintainers in junk security reports appeared first on Help Net Security.
http://news.poseidon-us.com/TSbrl9

Game over for 74 suspected scammers after Dutch cops plastered their faces on billboards

The Dutch police’s Game Over?! campaign, which publicly displays images of suspected fraudsters to encourage self-surrenders and gather public tips, is proving successful, with the identities of 74 of the 100 suspects shown already identified. A digital display promoting the Dutch police’s Game Over?! campaign (Source: Politie) Launched in March 2026, the campaign displays blurred photos of 100 suspected fraudsters on billboards along motorways, petrol stations, and supermarkets, as well as in television and online … More → The post Game over for 74 suspected scammers after Dutch cops plastered their faces on billboards appeared first on Help Net Security.
http://news.poseidon-us.com/TSbrkk

Attackers are exploiting critical NGINX vulnerability (CVE-2026-42945)

A critical NGINX vulnerability (CVE-2026-42945) disclosed last week is being exploited by attackers, VulnCheck security researcher Patrick Garrity revealed on Saturday. The vulnerability, dubbed NGINX Rift, can be reliably exploited to trigger a denial-of-service condition and can potentially allow for unauthenticated remote code execution, all achievable by sending a specially crafted HTTP request to a vulnerable NGINX instance. What is NGINX? NGINX is the most widely deployed web server and, as such, it’s one of … More → The post Attackers are exploiting critical NGINX vulnerability (CVE-2026-42945) appeared first on Help Net Security.
http://news.poseidon-us.com/TSbn7h

SmartBear expands ReadyAPI with AI-powered API testing capabilities

SmartBear has announced ReadyAPI’s new AI test generation capability that accelerates API testing by up to 80% while giving teams control to enable or disable AI. While competitors focus on speed alone, ReadyAPI’s AI test generation capability is architected for quality at scale and addresses the testing gap by aligning validation with development velocity without compromising application integrity. The AI capability automates repetitive test creation while QA professionals maintain oversight and strategic orchestration. Users can … More → The post SmartBear expands ReadyAPI with AI-powered API testing capabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TSbcGK

Attackers accessed, downloaded code from Grafana Labs’ GitHub

A threat actor has managed to access Grafana Labs’ GitHub environment and download the company’s codebase, the open-source observability and data visualization firm announced on Sunday. The breach is significant given Grafana Labs’ widespread use across enterprise engineering and DevOps teams worldwide. Grafana Labs is best known for its open-source dashboard and visualization platform, but also offers tools for log aggregation (Loki), continuous profiling (Pyroscope), distributed tracing (Tempo), and a hosted SaaS option (Grafana Cloud). … More → The post Attackers accessed, downloaded code from Grafana Labs’ GitHub appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWV9

201 arrested in INTERPOL disruption of phishing and fraud networks

Operation Ramz, a cybercrime initiative coordinated by INTERPOL across the MENA region, focused on disrupting phishing campaigns, malware activity, and cyber scams that caused substantial financial losses across the region. The operation resulted in the arrest of 201 individuals and the identification of an additional 382 suspects. Moroccan authorities seized computers, smartphones and external hard drives containing banking data and software used for phishing operations. (Source: INTERPOL) Authorities identified 3,867 victims and seized 53 servers. … More → The post 201 arrested in INTERPOL disruption of phishing and fraud networks appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWV8

The AI backdoor your security stack is not built to see

Enterprises deploying LLMs have spent the past two years building defenses around a reasonable assumption: malicious behavior leaves a trace in the input. Scan for suspicious tokens, filter unusual characters, watch for prompt injection patterns. New research from Microsoft and the Institute of Science Tokyo demonstrates that this defensive posture has a blind spot, and the cost of that blind spot could be measured in leaked proprietary data and regulatory exposure. The attack, called MetaBackdoor, … More → The post The AI backdoor your security stack is not built to see appeared first on Help Net Security.
http://news.poseidon-us.com/TSbWTZ