433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)

Attackers are exploiting a recently revealed vulnerability (CVE-2025-59718) to bypass authentication on Fortinet’s FortiGate firewalls, and are leveraging the achieved access to export their system configuration files, Arctic Wolf researchers warned on Tuesday. Configuration files can expose information about the underlying network and infrastructure, firewall and security policies, encrypted/hashed passwords, and more. Some of this data can come in handy for executing successfuly attacks at a later date. CVE-2025-59718 and CVE-2025-59719 Fortinet discovered CVE-2025-59718 and … More → The post Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718) appeared first on Help Net Security.
http://news.poseidon-us.com/TPsqQy

Trellix advances NDR to close the OT-IT threat detection-to-response gap

Trellix announced Trellix NDR innovations, strengthening OT-IT security with integrated visibility across complex environments, enhanced detection capabilities, and automated investigation and response to reduce the threat detection-to-response gap. “We know cybercriminals are increasingly targeting the OT-IT boundary, where threats can hide in the absence of complete visibility,” said Rohit Unnikrishnan, SVP Product Management, Trellix. “To keep pace, organizations must prioritize proactive defense with enhanced perimeter visibility and enriched intelligence extending across environments for greater resilience … More → The post Trellix advances NDR to close the OT-IT threat detection-to-response gap appeared first on Help Net Security.
http://news.poseidon-us.com/TPsTpF

XM Cyber bridges external attack surface management with validated internal attack paths

XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the gap between what’s exposed outside and what exists inside. By bridging these two worlds, XM Cyber now allows security teams to instantly see not just what is externally exposed, but also gain a strategic view on how external exposures chain together with internal, exploitable vulnerabilities to threaten critical business assets. These enhancements provide a seamless, … More → The post XM Cyber bridges external attack surface management with validated internal attack paths appeared first on Help Net Security.
http://news.poseidon-us.com/TPsP5F

Hadrian launches offensive agentic AI to expose vulnerabilities before attackers

Hadrian launched the latest iteration of its offensive Agentic AI Platform, designed to take an offensive approach to find external exposures and test them for exploitability. Instead of waiting for attacks to happen, Hadrian’s AI agents act like hackers themselves, probing, testing, and exploiting vulnerabilities before malicious actors ever get the chance. Hackers turn to AI Recent research shows that hackers are increasingly deploying AI and AI agents to carry out attacks. From ransomware gangs … More → The post Hadrian launches offensive agentic AI to expose vulnerabilities before attackers appeared first on Help Net Security.
http://news.poseidon-us.com/TPsP5D

Vectra AI redefines hybrid resilience across the attack lifecycle

Vectra AI redefines hybrid attack resilience across the full attack lifecycle by unifying controls pre-and-post compromise within the Vectra AI Platform. Vectra AI’s control philosophy empowers defenders with continuous control through proactive threat exposure management, 360 degree response, and posture reporting. The Vectra AI Platform gives security teams consistent, measurable control across the full hybrid attack lifecycle, from eliminating attack exposures before compromise, to executing decisive response actions as active attacks unfold, to proving resilience … More → The post Vectra AI redefines hybrid resilience across the attack lifecycle appeared first on Help Net Security.
http://news.poseidon-us.com/TPsP54

Why vulnerability reports stall inside shared hosting companies

Security teams keep sending vulnerability notifications, and the same pattern keeps repeating. Many alerts land, few lead to fixes. A new qualitative study digs into what happens after those reports arrive and explains why remediation so often stops short. The research comes from the Center for Information Security Saarbrücken and is based on in depth interviews with 24 hosting provider organizations across shared hosting, VPS services, and web agencies. The researchers focused on how providers … More → The post Why vulnerability reports stall inside shared hosting companies appeared first on Help Net Security.
http://news.poseidon-us.com/TPsP4q

Banks built rules for yesterday’s crime and RegTech is trying to fix that

Criminals are moving money across borders faster, and financial institutions are feeling the squeeze. Compliance teams feel this strain every day as they try to keep up with schemes that shift through accounts, intermediaries, and digital channels. A new academic review of regulatory technology, or RegTech, shows how this pressure is reshaping compliance work and why research in this field is gaining new weight. What RegTech means in practice RegTech refers to digital tools that … More → The post Banks built rules for yesterday’s crime and RegTech is trying to fix that appeared first on Help Net Security.
http://news.poseidon-us.com/TPsJdm

Zabbix: Open-source IT and OT observability solution

Zabbix is an open source monitoring platform designed to track the availability, performance, and integrity of IT environments. It monitors networks along with servers, virtual machines, applications, services, databases, websites, and cloud resources. For cybersecurity professionals, this visibility matters because operational issues and security incidents often overlap. Early signs of compromise can surface as performance changes, service failures, or unusual system behavior that monitoring tools detect first. At its core, Zabbix collects data from many … More → The post Zabbix: Open-source IT and OT observability solution appeared first on Help Net Security.
http://news.poseidon-us.com/TPsJcm