FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Help Net Security

20 articles

Help Net Security General Intel 1d ago

Meta’s Muse Spark takes AI a step closer to personal superintelligence

Meta Superintelligence Labs has introduced Muse Spark, a natively multimodal reasoning model with support for tool use, visual chain of thought, and multi-ag...

Help Net Security →

Help Net Security General 1d ago

AI agent intent is a starting point, not a security strategy

In this Help Net Security video, Itamar Apelblat, CEO of Token Security, walks through findings from the company’s research, which shows that 65% of agentic ...

Help Net Security →

Help Net Security General 1d ago

Asqav: Open-source SDK for AI agent governance

AI agents are executing consequential tasks autonomously, often across multiple systems and with little record of what they did or why. Asqav, a Python SDK r...

Help Net Security →

Help Net Security Phishing Cisco Atlassian GitHub 1d ago

Phishers sneak through using GitHub and Jira’s own mail delivery infrastructure

Attackers are abusing the notification systems of SaaS platforms like GitHub and Jira to send phishing and spam emails, Cisco Talos researchers are warning. ...

T1566 T1598

Help Net Security →

Help Net Security General Apple 1d ago

Prompt injection tags along as GenAI enters daily government use

Routine use of GenAI has moved into daily operations in state and territorial government environments, placing new security risks within common workflows. A ...

Help Net Security →

Help Net Security Data Breach Microsoft GitHub 2d ago

BlueHammer: Windows zero-day exploit leaked

A buggy but functional proof-of-concept (PoC) exploit for an unpatched Windows local privilege escalation vulnerability dubbed BlueHammer has been published ...

T1548 T1068

Help Net Security →

Help Net Security General 2d ago

Trellix strengthens data security for the GenAI era

Trellix announced enhanced data security capabilities and a strategic framework designed to help organizations confidently adopt generative AI while protecti...

Help Net Security →

Help Net Security Advisory Microsoft Apple 2d ago

Social engineering attacks on open source developers are escalating

North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microso...

T1204

Help Net Security →

Help Net Security Advisory 2d ago

Iranian cyber activity hits US energy, water, and government networks

U.S.

Help Net Security →

Help Net Security Malware Linux 2d ago

Chaos malware expands from routers to Linux cloud servers

Chaos, Go-based malware first documented by Lumen’s Black Lotus Labs, has historically targeted routers and edge devices. A new variant observed in March 202...

Help Net Security →

Help Net Security CVE Amazon Linux 2d ago

Flatpak 1.16.4 fixes sandbox escape and three other security flaws

Flatpak, a Linux application sandboxing and distribution framework, released version 1.16.

2 IOCs

Help Net Security →

Help Net Security General 2d ago

Secureframe expands Comply with User Access Reviews for automated governance

Secureframe has announced the launch of User Access Reviews, a new capability within Secureframe Comply. Access reviews are the primary mechanism organizatio...

Help Net Security →

Help Net Security Ransomware 2d ago

What managing partners should ask AI vendors before signing any contract

In this Help Net Security interview, Kumar Ravi is the Chief Security & Resilience Officer at TMF Group, argues that over-privileged access and weak workflow...

T1598

Help Net Security →

Help Net Security TTPs 2d ago

6G network design puts AI at the center of spectrum, routing, and fault management

Wireless network operators are preparing for a generation of infrastructure where AI is built into the architecture from the start. Sixth-generation networks...

Help Net Security →

Help Net Security CVE 2d ago

OpenSSL 3.6.2 lands with eight CVE fixes

OpenSSL 3.6.

3 IOCs

Help Net Security →

Help Net Security Campaigns Intel 2d ago

Cybercriminals move deeper into networks, hiding in edge infrastructure

Attack activity is moving toward infrastructure outside endpoint visibility. Proxy networks support a wide range of operations, edge devices serve as initial...

Help Net Security →

Help Net Security Zero-Day 2d ago

Anthropic’s new AI model finds and exploits zero-days across every major OS and browser

Automated vulnerability discovery tools have existed for decades, and the gap between finding a bug and building a working exploit has always slowed attacker...

Help Net Security →

Help Net Security Vulnerability Disclosure 2d ago

Cybersecurity jobs available right now: April 8, 2026

Application Security Engineer Liebherr Group | Germany | On-site – View job details As an Application Security Engineer, you will implement security testing ...

Help Net Security →

Help Net Security General 3d ago

Cybercrime losses break the $20 billion mark

Online crime continues to generate rising financial losses, with totals reaching $20.877 billion in 2025.

Help Net Security →

Help Net Security Campaigns Intel 3d ago

Russian hackers hijack internet traffic using vulnerable routers

The Russian state cyber group APT28 has been compromising routers to hijack web traffic and spy on victims, the UK’s The National Cyber Security Centre (NCSC...

Help Net Security →

« Prev 1 2 3 4 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA