FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Help Net Security

20 articles

Help Net Security Campaigns Apple 8h ago

ClickFix campaign delivers Mac malware via fake Apple page

Security researchers at Jamf have uncovered a new ClickFix-style attack targeting Mac users via a fake Apple-themed webpage offering instructions on how to “...

T1204

Help Net Security →

Help Net Security Campaigns Microsoft 10h ago

Poisoned “Office 365” search results lead to stolen paychecks

A financially motivated hacking group is targeting Canadian employees with a sophisticated campaign designed to covertly redirect their salary payments into ...

T1566 T1557 T1189

Help Net Security →

Help Net Security General Google Apple 12h ago

Gmail’s end-to-end encryption comes to mobile, no extra apps required

Google has expanded Gmail client-side encryption to Android and iOS devices, allowing users to engage with their organization’s most sensitive data on mobile...

Help Net Security →

Help Net Security Malware Google 13h ago

To counter cookie theft, Chrome ships device-bound session credentials

Cookie theft follows a well-established pattern. Infostealer malware infiltrates a device, extracts authentication cookies, and exfiltrates them to an attack...

T1078 T1041 T1598

Help Net Security →

Help Net Security General Apple Linux 13h ago

Little Snitch for Linux shows what your apps are connecting to

Network monitoring on Linux has long been a gap for users who want per-process visibility into outbound connections. Existing tools either operate at the com...

Help Net Security →

Help Net Security General Microsoft Apple Linux 13h ago

Apiiro CLI turns AI coding assistants into full-stack security engineers

The Apiiro CLI brings the Apiiro platform to your terminal and to your AI coding assistants, giving them six native security capabilities: scanning, risk man...

Help Net Security →

Help Net Security Advisory 14h ago

April 2026 Patch Tuesday forecast: Spring-cleaning of a preview

I just blinked and the first quarter of the year is GONE. Where does the time go?

Help Net Security →

Help Net Security General Amazon 16h ago

What vibe hunting gets right about AI threat hunting, and where it breaks down

In this Help Net Security interview, Aqsa Taylor, Chief Security Evangelist, Exaforce, explains vibe hunting, an AI-driven approach to threat detection that ...

Help Net Security →

Help Net Security General 17h ago

Health insurance lead sites sell personal data within seconds of form submission

Lead generation websites that offer health insurance quotes collect sensitive personal data and sell it to multiple buyers within seconds of a user clicking ...

Help Net Security →

Help Net Security General 17h ago

Product showcase: Session, a messenger without phone numbers or metadata

Instant messaging has been around for decades, but it became widely adopted with the emergence of smartphones. Earlier, communication was limited to basic te...

T1598

Help Net Security →

Help Net Security General Intel 18h ago

New infosec products of the week: April 10, 2026

Here’s a look at the most interesting products from the past week, featuring releases from Advenica, Intruder, Mallory, and Secureframe. Mallory brings conte...

Help Net Security →

Help Net Security General Check Point 1d ago

Claude Managed Agents bring execution and control to AI agent workflows

Anthropic’s Claude Managed Agents are a suite of composable APIs for building and deploying cloud-hosted agents at scale, handling sandboxed code execution, ...

Help Net Security →

Help Net Security Data Breach 1d ago

113,000 explicit prompts from AI girlfriend platform exposed, many linked to user IDs

MyLovely.AI, an AI girlfriend platform, suffered a data breach that exposed over 100,000 users.

Help Net Security →

Help Net Security Ransomware Apache 1d ago

Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)

In the latest demonstration of how AI assistants can help with bug hunting, Horizon3.ai researcher Naveen Sunkavally used Claude to unearth CVE-2026-34197, a...

T1190 1 IOC

Help Net Security →

Help Net Security General Intel 1d ago

Mallory brings contextual threat intelligence to security operations

Mallory is launching an AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day: What are th...

Help Net Security →

Help Net Security General 1d ago

OPSWAT adds predictive AI engine to MetaDefender for pre-execution threat detection

OPSWAT has announced OPSWAT Predictive Alin AI, its first proprietary AI-based threat detection engine for the MetaDefender Platform. This AI-based innovatio...

Help Net Security →

Help Net Security Zero-Day Adobe 1d ago

Acrobat Reader zero-day exploited in the wild for many months

Unknown attackers have exploited a zero-day Adobe Acrobat Reader vulnerability since November 2025 and possibly even earlier, security researcher Haifei Li h...

Help Net Security →

Help Net Security General Microsoft Google Amazon Docker 1d ago

Intruder expands cloud security with agentless container image scanning

Intruder has announced the release of Container Image Scanning, a new upgrade to its cloud security capabilities that automatically scans container images fo...

Help Net Security →

Help Net Security Vulnerability Disclosure Apple 1d ago

Advenica’s File Scanner Kiosk scans USB media for malware

Advenica announced the File Scanner Kiosk, a system that scans USB media for malware and helps businesses reduce infection risk. With the reliance on externa...

Help Net Security →

Help Net Security General SAP 1d ago

WhatsApp brings long-awaited privacy control over who can contact you

After years of waiting, WhatsApp is set to roll out a username feature that will allow people to connect and communicate without sharing their phone numbers....

T1598

Help Net Security →

1 2 3 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA