433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Phishing reclaims the top initial access spot, attackers experiment with AI tools

Phishing returned as the leading method attackers used to break into organizations in the first quarter of 2026, accounting for over a third of engagements where initial access could be determined, according to Cisco Talos. It is the first quarter phishing has led the category since Q2 2025, when exploitation of public-facing applications took over following widespread attacks against on-premises Microsoft SharePoint servers. That SharePoint exploitation wave, collectively tracked as ToolShell, drove public-facing application exploitation … More → The post Phishing reclaims the top initial access spot, attackers experiment with AI tools appeared first on Help Net Security.
http://news.poseidon-us.com/TS98Ly

OneDrive updates focus on AI, access control, and compliance

Microsoft OneDrive’s recent updates focus on improving intelligence, collaboration, and administrative control. “Last year, we made a promise: your files should work for you, not the other way around. That meant reimagining OneDrive not just as a place to store files, but as an intelligent layer that surfaces what matters, eliminates busy work, and enables seamless collaboration across your organization. OneDrive became smarter, more collaborative, and more central to how work flows across Microsoft 365,” … More → The post OneDrive updates focus on AI, access control, and compliance appeared first on Help Net Security.
http://news.poseidon-us.com/TS98HF

AI just revealed ocean currents we’ve never been able to see

A new AI-driven method called GOFLOW is turning weather satellite images into highly detailed maps of ocean currents. By tracking how temperature patterns shift over time, it can reveal fast-moving, small-scale currents that were previously impossible to observe directly. These currents are key to understanding climate, marine ecosystems, and carbon storage. The breakthrough works using satellites already in orbit, making it both powerful and cost-effective.
http://news.poseidon-us.com/TS95KL

This donut-shaped discovery just shattered a 150-year math rule

A 150-year-old rule in geometry has been proven wrong. Mathematicians found two different doughnut-shaped surfaces that look identical when measured locally but are actually different overall. For decades, researchers suspected this might be possible but couldn’t prove it—until now. The breakthrough reshapes how mathematicians understand the relationship between local measurements and global form.
http://news.poseidon-us.com/TS95JZ

PentAGI: Open-source autonomous AI penetration testing system

Penetration testers have long relied on collections of specialized tools, manual coordination, and documented runbooks to work through a target assessment. PentAGI, an open-source project from VXControl, attempts to automate that entire workflow using a multi-agent AI system that plans, researches, and executes penetration tests with minimal human direction. How the agent system works PentAGI organizes work into a hierarchy of flows, tasks, subtasks, and actions. An orchestrator agent receives a goal and coordinates three … More → The post PentAGI: Open-source autonomous AI penetration testing system appeared first on Help Net Security.
http://news.poseidon-us.com/TS90BL

Apple Intelligence flaw kept stolen tokens reusable on another device

Apple claims that Apple Intelligence, a GenAI service provided on its operating systems, is designed with an extra focus on user security and privacy through a two-stage authentication and authorization system using anonymous access tokens. However, researchers from The Ohio State University have identified vulnerabilities in this design, demonstrated on macOS 26.0 (Tahoe), that allow attackers to steal and reuse these tokens. Service infrastructure The system offloads complex requests to cloud servers using Private Cloud … More → The post Apple Intelligence flaw kept stolen tokens reusable on another device appeared first on Help Net Security.
http://news.poseidon-us.com/TS90BC

Shadow AI, deepfakes, and supply chain compromise are rewriting the financial sector threat playbook

Financially motivated attacks continued to drive the bulk of cyber incidents against banks, insurers, and payment processors in 2025. Approximately 90% of breaches affecting financial institutions carried a financial motive, with data breaches accounting for roughly 64% of incidents and ransomware making up the remaining 36%. The average cost of a data breach in the sector reached $5.56 million per incident, placing finance second among all industries by breach cost. Personal data was the most … More → The post Shadow AI, deepfakes, and supply chain compromise are rewriting the financial sector threat playbook appeared first on Help Net Security.
http://news.poseidon-us.com/TS909T

Thunderbird 150 arrives with encrypted message search and OpenPGP improvements

Released today, Thunderbird 150.0 brings eight new features, a round of bug fixes, and security patches that cover the web engine underlying the email client. Thunderbird 150.0 runs on Windows 10 or later, macOS 10.15 or later, and Linux with GTK+ 3.14 or higher. Encrypted email gets more useful Two of the most notable additions in this release touch how users interact with encrypted mail. Thunderbird 150.0 adds message body search for OpenPGP and S/MIME … More → The post Thunderbird 150 arrives with encrypted message search and OpenPGP improvements appeared first on Help Net Security.
http://news.poseidon-us.com/TS8gRd