433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

AI boosts efficacy of cancer treatment, but doctors remain key

A new study shows that artificial intelligence (AI) can help doctors make better decisions when treating cancer. However, it also highlights challenges in how doctors and AI work together. The study focused on AI-assisted radiotherapy for non-small cell lung cancer and hepatocellular carcinoma (liver cancer).
http://news.poseidon-us.com/THhlDj

Study using virtual breathing coach indicates it is as effective as a human trainer

A study suggests that a computer-generated breathing coach could be as effective as sessions with a human trainer.
http://news.poseidon-us.com/THhlCV

Patient monitors with backdoor are sending info to China, CISA warns

Contec CMS8000, a patient monitor manufactured by a Chinese company, and Epsimed MN-120, which is the same monitor but relabeled, exfiltrate patients’ data to a hard-coded IP address and have a backdoor that can be used to download and execute unverified files, the US Cybersecurity and Infrastructure Security Agency confirmed. “CISA assesses the inclusion of this backdoor in the firmware of the monitor can create conditions which may allow remote code execution and device modification … More → The post Patient monitors with backdoor are sending info to China, CISA warns appeared first on Help Net Security.
http://news.poseidon-us.com/THhkB0

AI to reshape 2025 tech talent strategies

The technology’s rise put a spotlight on enterprise skill gaps, realigning IT talent sourcing priorities.
http://news.poseidon-us.com/THhg2X

CyberArk Identity Bridge manages user access and authentication for Linux environments

CyberArk announced Identity Bridge, an endpoint identity security capability that will support identity and privilege sprawl reduction on Linux machines. Identity Bridge will enable organizations to authenticate to Linux systems using centralized accounts, minimizing dependence on outdated authentication methods. This helps modernize Identity and Access Management (IAM) without leaving Linux environments behind. Like all critical IT infrastructure, Linux systems are prime targets for cyberattacks, particularly via identity compromise. Managing identity and access on Linux systems … More → The post CyberArk Identity Bridge manages user access and authentication for Linux environments appeared first on Help Net Security.
http://news.poseidon-us.com/THhPxq

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could intercept models in transit, manipulate inputs to degrade performance, or even reverse-engineer AI systems to use them against their creators. In this Help Net Security interview, Jags Kandasamy, CEO at Latent AI, discusses the technical and strategic measures necessary to safeguard AI models, the balance between security and performance in constrained … More → The post Deploying AI at the edge: The security trade-offs and how to manage them appeared first on Help Net Security.
http://news.poseidon-us.com/THhLCT

Platformization is key to reduce cybersecurity complexity

Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according to a report by IBM and Palo Alto Networks. It also shows 7 out of 10 surveyed companies with a high degree of security platformization report their cybersecurity investments have helped business outcomes such as operational efficiencies and revenue generation. The rising threat of sophisticated cyberattacks In the study, 52% of surveyed executives note fragmentation … More → The post Platformization is key to reduce cybersecurity complexity appeared first on Help Net Security.
http://news.poseidon-us.com/THhLBN

To Simulate or Replicate: Crafting Cyber Ranges, (Fri, Jan 31st)

The Good Stuff First This tool is being shared (calling it a tool is generous) due to the number of times last year I had to create fake internet domains. It adds domains and zones to Windows DNS. This was to help with the many student cyber ranges that got ‘sploited [1] in the name of learning.
http://news.poseidon-us.com/THhKGd

Nine out of ten emails are spam

Now, more than ever, users can fall prey to word-perfect AI-created phishing campaigns, subtle BEC messages that sound remarkably like the sender, and highly convincing ploys from trusted vendors with legitimate-looking websites and clean domains, according to VIPRE Security Group. Spam emails overwhelm inboxes The report is based on an analysis of 7.2 billion emails globally in 2024. 9 out of 10 emails were categorised as spam – i.e., unsolicited, unwanted emails or those sent … More → The post Nine out of ten emails are spam appeared first on Help Net Security.
http://news.poseidon-us.com/THhJkY

Infosec products of the month: January 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Atsign, authID, BackBox, BioConnect, BitSight, BreachLock, Cisco, Commvault, Compliance Scorecard, DataDome, Hiya, IT-Harvest, Lookout, McAfee, Netgear, Oasis Security, and Swimlane. authID PrivacyKey protects users’ biometric identities authID’s Proof solution for onboarding users captures images of physical identification documents and faces, validates both for liveness and authenticity, then matches up the facial images for positive identification. PrivacyKey also features … More → The post Infosec products of the month: January 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/THhJjg