433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)

On Tuesday, CISA added two vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2025-11371, which affects Gladinet’s CentreStack and Triofox file-sharing and remote access platforms, and CVE-2025-48703, a vulnerability in Control Web Panel (CWP), a web hosting control panel designed for managing servers running CentOS or CentOS-based distributions. While active exploitation of CVE-2025-11371 has been reported on since early October 2025, exploitation attempts involving CVE-2025-48703, though detected by cybersecurity professionals, have so far been less widespread … More → The post Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703) appeared first on Help Net Security.
http://news.poseidon-us.com/TP59Ln

18 arrested in €300 million global credit card fraud scheme

A coordinated international operation has led to 18 arrests in a massive credit card fraud case worth at least €300 million. The effort, led by Eurojust, targeted a network of suspects accused of running fake online subscription services for dating, pornography, and streaming sites. Among those detained were five executives from four German payment service providers. Authorities said the fraud affected several million credit card users across 193 countries and involved 19 million accounts. Investigators … More → The post 18 arrested in €300 million global credit card fraud scheme appeared first on Help Net Security.
http://news.poseidon-us.com/TP55z0

New ExtraHop capabilities target malicious PowerShell use across enterprise environments

ExtraHop has announced new capabilities to detect the malicious use of PowerShell. These enhancements provide the visibility needed to disrupt the attack kill chain and deliver insight to stop lateral movement in its tracks. Remote management tools like PowerShell have become a notable weapon for attackers, like the Qilin Ransomware-as-a-Service (RaaS) operation, which has hit many high-value organizations globally including several UK hospitals. Threat actors often use PowerShell for living-off-the-land to go under the radar … More → The post New ExtraHop capabilities target malicious PowerShell use across enterprise environments appeared first on Help Net Security.
http://news.poseidon-us.com/TP4xjX

Deepwatch NEXA platform transforms MDR collaboration with agentic AI

Deepwatch has released Deepwatch NEXA, a collaborative agentic AI ecosystem that delivers outcome-focused agents to transform how MDR providers and customers work together. NEXA combines natural language interaction with agentic AI to provide real-time visibility, context, and actionable insights across the entire security lifecycle. This enables MDR providers and customers to detect, investigate, and respond to threats faster while shifting from reactive defense to proactive, business-aligned protection. Six intelligent agents, one unified ecosystem Deepwatch NEXA, … More → The post Deepwatch NEXA platform transforms MDR collaboration with agentic AI appeared first on Help Net Security.
http://news.poseidon-us.com/TP4xgV

ZEDEDA introduces Edge Kubernetes App Flows to automate edge application lifecycle

ZEDEDA has released a full-stack edge Kubernetes-as-a-Service solution that extends a cloud-native deployment experience to distributed edge environments. ZEDEDA Edge Kubernetes App Flows automates the edge application lifecycle, from packaging and configuration to delivery and observability, eliminating the need to manage cluster and application orchestration infrastructure. Edge Kubernetes App Flows supports the bare-metal and GPU compute required for edge AI applications, such as automated detection of manufacturing flaws and predictive maintenance. Built on ZEDEDA’s edge … More → The post ZEDEDA introduces Edge Kubernetes App Flows to automate edge application lifecycle appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nNB

Veeam App for Microsoft Sentinel brings backup intelligence directly into the SOC

Veeam Software launched its new Veeam App for Microsoft Sentinel. The solution provides advanced integration with Veeam Data Platform and empowers organizations to detect, investigate, and respond to cyber threats and backup anomalies, delivering data resilience and operational efficiency across SOC. As cyberattacks increasingly target backup environments, many SOC teams face a critical visibility gap in their security posture ecosystem, leaving organizations vulnerable to attacks on their last line of defense – their backups. The … More → The post Veeam App for Microsoft Sentinel brings backup intelligence directly into the SOC appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nN4

Veza Access AuthZ automates identity governance

Veza announced Access AuthZ, a new product that automates how organizations grant and revoke access across enterprise systems to address the “last mile” of identity governance. Built on the power of Veza Access Graph and Access Profiles, Access AuthZ unifies access control and access automation in a simplified way even with organizations relying on existing lifecycle management processes. Designed for scale and interoperability, it extends provisioning beyond traditional lifecycle management tools to include legacy platforms, … More → The post Veza Access AuthZ automates identity governance appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nMm

New Relic unveils Logs Intelligence to accelerate root cause analysis with AI

New Relic has announced Logs Intelligence, a series of AI-strengthened capabilities that automate the time and effort required to reduce mean time to resolution (MTTR) and extract critical insights from logs. Featured key innovations, like AI Log Alerts Summarization, transform how teams work with log data by providing automated analysis to generate a rapid hypothesis, accelerating time to root cause understanding and incident response. “Distributed systems and AI tools generate logs at an unprecedented rate,” … More → The post New Relic unveils Logs Intelligence to accelerate root cause analysis with AI appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nMS