FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Help Net Security

20 articles

Help Net Security CVE Amazon Mar 27

CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation

The US Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2026-330...

T1195 2 IOCs

Help Net Security →

Help Net Security Data Breach Mar 27

Ajax data breach exposed season tickets, supporter bans open to tampering

AFC Ajax, the Dutch football club from Amsterdam, disclosed that an unknown hacker gained access to parts of its IT systems and obtained the email addresses ...

Help Net Security →

Help Net Security General GitHub Mar 27

AI frenzy feeds credential chaos, secrets spread through code, tools, and infrastructure

Code keeps moving through pipelines, and credentials continue to surface alongside it. GitGuardian’s State of Secrets Sprawl 2026 puts the count at 28.

Help Net Security →

Help Net Security Vulnerability Disclosure Mar 27

Make OpenAI’s models misbehave and earn a reward

OpenAI’s public Safety Bug Bounty program focuses on AI abuse and safety risks across its products. The goal is to support safe and secure systems and reduce...

Help Net Security →

Help Net Security General Mar 26

Top product launches at RSAC 2026

RSAC 2026 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs in i...

Help Net Security →

Help Net Security General Mar 26

Tails 7.6 ships automatic Tor bridge retrieval and a new password manager

Tails 7.6 is out, and for users operating on networks that block Tor, the most consequential addition is built-in bridge retrieval.

Help Net Security →

Help Net Security Malware Mar 26

Second RedLine infostealer operator ends up in US custody

Hambardzum Minasyan, an Armenian man extradited to the United States, is accused of conspiring with others to develop and operate the RedLine infostealer mal...

Help Net Security →

Help Net Security General Rapid7 Mar 26

Researchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks

Telecommunications providers around the world have been dealing with the burrowing efforts of the China-linked APTs for many years now. To help them identify...

Help Net Security →

Help Net Security General GitHub Mar 26

GitHub jumps on the bandwagon and will use your data to train AI

GitHub updated how it uses data to improve AI-powered coding assistance. Starting April 24, interaction data from Copilot Free, Pro, and Pro+ users may be us...

Help Net Security →

Help Net Security General Mar 26

Mission to smuggle $170 million worth of AI tech to China collapsed for three men

Three individuals, Stanley Yi Zheng, Matthew Kelly, and Tommy Shad English, have been charged with conspiracy to commit smuggling and export control violatio...

Help Net Security →

Help Net Security General Mar 26

Reddit declares war on bad bot activity

Reddit is introducing changes to support interactions between people. The company is taking a bottom-up approach to help users understand when they are engag...

Help Net Security →

Help Net Security General Google Mar 26

Google races to secure encryption before quantum threats arrive

Google is preparing for the quantum era, a turning point in digital security, with a 2029 timeline for post-quantum cryptography (PQC) migration. Security pr...

T1598

Help Net Security →

Help Net Security General Intel Mar 26

DataBahn brings AI-driven intelligence into the security pipeline

DataBahn.ai has announced Autonomous In-Stream Data Intelligence (AIDI), a new operating model for security data pipelines in which data is continuously inte...

Help Net Security →

Help Net Security General Google Amazon Mar 26

AI SOC vendors are selling a future that production deployments haven’t reached yet

Vendors selling AI-powered security operations platforms have built their pitches around a consistent set of promises: autonomous threat investigation, drama...

Help Net Security →

Help Net Security Malware Mar 26

A nearly undetectable LLM attack needs only a handful of poisoned samples

Prompt engineering has become a standard part of how large language models are deployed in production, and it introduces an attack surface most organizations...

T1598

Help Net Security →

Help Net Security Supply Chain Mar 26

Your facilities run on fragile supply chains and nobody wants to admit it

In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building...

Help Net Security →

Help Net Security General Mar 26

Who owns AI agent access? At most companies, nobody knows

AI agents are operating across production enterprise environments at scale, and the identity infrastructure managing their access has not kept up with their ...

Help Net Security →

Help Net Security General Oracle Linux Intel Mar 26

Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair

Many enterprise Linux deployments rely on hardware-level memory isolation to protect sensitive workloads from co-tenants and compromised hypervisors. Oracle’...

Help Net Security →

Help Net Security Ransomware Mar 25

Botnet operator behind $14 million in ransomware extortion payments gets 24 months behind bars

A Russian national has been sentenced to 24 months in prison after admitting he managed a botnet used to launch ransomware attacks against dozens of U.S.

Help Net Security →

Help Net Security General Mar 25

Vorlon adds forensics and response to secure AI agents

Vorlon has unveiled AI Agent Flight Recorder and AI Agent Action Center, adding forensics and coordinated response to secure enterprise agentic ecosystems an...

T1598

Help Net Security →

« Prev 1 ... 5 6 7 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA