FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Help Net Security

19 articles

Help Net Security Malware Mar 26

A nearly undetectable LLM attack needs only a handful of poisoned samples

Prompt engineering has become a standard part of how large language models are deployed in production, and it introduces an attack surface most organizations...

T1598

Help Net Security →

Help Net Security Supply Chain Mar 26

Your facilities run on fragile supply chains and nobody wants to admit it

In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building...

Help Net Security →

Help Net Security General Mar 26

Who owns AI agent access? At most companies, nobody knows

AI agents are operating across production enterprise environments at scale, and the identity infrastructure managing their access has not kept up with their ...

Help Net Security →

Help Net Security General Oracle Linux Intel Mar 26

Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair

Many enterprise Linux deployments rely on hardware-level memory isolation to protect sensitive workloads from co-tenants and compromised hypervisors. Oracle’...

Help Net Security →

Help Net Security Ransomware Mar 25

Botnet operator behind $14 million in ransomware extortion payments gets 24 months behind bars

A Russian national has been sentenced to 24 months in prison after admitting he managed a botnet used to launch ransomware attacks against dozens of U.S.

Help Net Security →

Help Net Security General Mar 25

Vorlon adds forensics and response to secure AI agents

Vorlon has unveiled AI Agent Flight Recorder and AI Agent Action Center, adding forensics and coordinated response to secure enterprise agentic ecosystems an...

T1598

Help Net Security →

Help Net Security General Mar 25

DigiCert Document Trust Manager enhancements improve document security and compliance

DigiCert has announced enhancements to its Document Trust Manager solution to help organisations combat rising document fraud, simplify global compliance, an...

Help Net Security →

Help Net Security General Google Intel Mar 25

Gemini picks up criminal activity buried in dark web noise

To help teams make faster and more accurate decisions on emerging threats, Google has introduced a dark web intelligence capability in Google Threat Intellig...

Help Net Security →

Help Net Security Supply Chain Mar 25

LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks

A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose t...

T1195

Help Net Security →

Help Net Security General Akamai Mar 25

Akamai Brand Guardian detects and removes AI-driven brand impersonation

Akamai has introduced Akamai Brand Guardian, an evolution of Brand Protector that uses AI to identify and manage brand impersonation at scale. Scammers are e...

Help Net Security →

Help Net Security General Mar 25

Njordium AI blocks fake invoices and fraudulent payments

Njordium Cyber Group has launched its new AI Fraud Detection Module, a self-learning AI engine integrated into the recently released Vendor Management System...

Help Net Security →

Help Net Security General Microsoft Apple Mar 25

Microsoft hands Entra ID users new option for MFA

Organizations rely on MFA to enforce identity checks before granting access to systems and services. Microsoft has made external MFA generally available in M...

Help Net Security →

Help Net Security General Mar 25

Anthropic trims action approval loop, lets Claude Code make the call

Auto mode is a new permissions feature in the Claude Code system that allows the AI to make approval decisions on a user’s behalf while safeguards review act...

Help Net Security →

Help Net Security General Linux Mar 25

Codenotary introduces AgentX for autonomous Linux infrastructure security

Codenotary has announced the availability of AgentX, an autonomous platform designed to manage, secure, and protect large-scale Linux infrastructure in the c...

Help Net Security →

Help Net Security General Intel Mar 25

Spur Intelligence delivers deeper visibility into anonymized infrastructure

Spur Intelligence has announced new enhancements to its IP intelligence platform, designed to give security and fraud teams deeper visibility into anonymized...

Help Net Security →

Help Net Security Vulnerability Disclosure Tenable Intel Mar 25

Tenable Hexa AI automates exposure management and security workflows

Tenable has revealed Tenable Hexa AI, the agentic AI engine of the Tenable One Exposure Management Platform that automates security workflows and transforms ...

Help Net Security →

Help Net Security General Barracuda Mar 25

Barracuda strengthens cyber resilience with BarracudaONE platform updates

Barracuda Networks has announced advancements to the BarracudaONE cybersecurity platform and Barracuda Partner Success Program. The latest innovations streng...

Help Net Security →

Help Net Security General Microsoft Google Mar 25

Google’s TurboQuant cuts AI memory use without losing accuracy

Large language models carry a persistent scaling problem. As context windows grow, the memory required to store key-value (KV) caches expands proportionally,...

Help Net Security →

Help Net Security General Juniper Mar 25

HPE enhances security to support AI and distributed enterprise environments

HPE has unveiled new security innovations designed to help organizations scale distributed operations, reduce cyber risk, and maintain consistent governance ...

Help Net Security →

« Prev 1 ... 3 4 5
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA