433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)

There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last week. “All users running an SSH server based on the Erlang/OTP SSH library are likely to be affected by this vulnerability. If your application uses Erlang/OTP SSH to provide remote access, assume you are affected,” Ruhr University Bochum researchers, who discovered and reported the flaw, said. About CVE-2025-32433 Erlang/OTP SSH is a set of libraries … More → The post PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433) appeared first on Help Net Security.
http://news.poseidon-us.com/TKJJ6K

A cool fix for hot chips: Advanced thermal management technology for electronic devices

Researchers have demonstrated a significant performance increase in cooling technology for high-power electronic devices. They designed novel capillary geometries that push the boundaries of thermal transfer efficiency. This study could play a crucial role in the development of next-generation technology.
http://news.poseidon-us.com/TKJDDG

EPA’s ‘environmental justice’ employees face layoffs this summer

EPA Administrator Lee Zeldin defended the cancellation of environmental justice grants in a press conference at the EPA’s headquarters on Monday. The post EPA’s ‘environmental justice’ employees face layoffs this summer first appeared on Federal News Network.
http://news.poseidon-us.com/TKJ9Rl

Stellar Cyber boosts security operations with human-augmented Autonomous SOC

At the upcoming RSAC 2025 Conference in San Francisco, Stellar Cyber will unveil the next evolution of modern SecOps: the human-augmented Autonomous SOC, powered by its breakthrough Agentic AI framework. See the human-augmented Autonomous SOC in action at Booth 343 in the South Hall, or book a personalized demo here. See everything. Know everything. Act fast Security isn’t about man vs. machine—it’s about man with machine. Stellar Cyber’s new Autonomous SOC brings clarity to chaos … More → The post Stellar Cyber boosts security operations with human-augmented Autonomous SOC appeared first on Help Net Security.
http://news.poseidon-us.com/TKJ8R8

StrikeReady Security Command Center v2 accelerates threat response

For years, security teams have operated in reactive mode, contending with siloed tools, fragmented intelligence, and a never-ending backlog of alerts. Traditional Security Operations platforms were supposed to unify data and streamline response—but they often introduced their own complexity, requiring heavy customization and manual oversight. ‘Hyper automation’ delivered much of the same empty promises, leaving most security teams firefighting today’s incidents with limited bandwidth to proactively manage tomorrow’s risks. StrikeReady is introducing its next-generation Security Command … More → The post StrikeReady Security Command Center v2 accelerates threat response appeared first on Help Net Security.
http://news.poseidon-us.com/TKHzJ8

BigID unveils AI Privacy Risk Posture Management

BigID launched AI Privacy Risk Posture Management to help organizations manage data privacy risks across the AI lifecycle. With automated assessments and actionable privacy controls, BigID empowers enterprises to govern AI responsibly while staying ahead of fast-evolving regulations. As AI adoption accelerates, so do the risks. New frameworks like the EU AI Act, NIST AI RMF, and U.S. state-level laws are reshaping expectations around transparency, accountability, and privacy protections in AI systems. Organizations must now … More → The post BigID unveils AI Privacy Risk Posture Management appeared first on Help Net Security.
http://news.poseidon-us.com/TKHzGV

xorsearch.py: “Ad Hoc YARA Rules”, (Tue, Apr 22nd)

In diary entry “xorsearch.py: Searching With Regexes” I showed how one can let xorsearch.py generate a YARA rule with a given regular expression.
http://news.poseidon-us.com/TKHwjZ

CSI announces two AI-powered AML compliance and fraud detection solutions

CSI launched its AI-powered AML compliance and fraud detection solutions: TruDetect and TruProtect. The solutions are powered by DATASEERS, a data-driven B2B SaaS company specialized in harnessing data, automating manual processes and providing real-time insight for risk, fraud, compliance and operations. According to Celent, over 95% of AML alerts are false positives, leading to wasted time and inefficiency in investigations. AML analysts can also spend between 30 and 70 minutes per alert, according to a … More → The post CSI announces two AI-powered AML compliance and fraud detection solutions appeared first on Help Net Security.
http://news.poseidon-us.com/TKHwT8

The legal blind spot of shadow IT

Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance violations, expose sensitive data, or break contracts. Let’s look at where the legal landmines are and what CISOs can do to stay ahead of them. Understanding the legal risks of shadow IT When employees use unapproved tools, they may inadvertently violate laws and regulations designed to protect sensitive information. For instance, the GDPR mandates strict … More → The post The legal blind spot of shadow IT appeared first on Help Net Security.
http://news.poseidon-us.com/TKHwSx