<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Help Net Security</title>
	<atom:link href="https://www.helpnetsecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.helpnetsecurity.com/</link>
	<description>Daily information security news with a focus on enterprise security.</description>
	<lastBuildDate>Mon, 04 May 2026 14:58:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093400/cropped-hns2-32x32.png</url>
	<title>Help Net Security</title>
	<link>https://www.helpnetsecurity.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670)</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/critical-moveit-automation-auth-bypass-vulnerability-fixed-cve-2026-4670/</link>
		
		<dc:creator><![CDATA[Zeljka Zorz]]></dc:creator>
		<pubDate>Mon, 04 May 2026 14:58:24 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[file-sharing]]></category>
		<category><![CDATA[Progress]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369180</guid>

					<description><![CDATA[<p>Progress Software has fixed a critical authentication bypass (CVE-2026-4670) and a privilege escalation (CVE-2026-5174) vulnerability in MOVEit Automation, exploitation of which &#8220;may lead to unauthorized access, administrative control, and data exposure.&#8221; The vulnerabilities were reported privately by Airbus researchers and there&#8217;s no mention of them being leveraged by attackers in the wild. Still, performing an upgrade to a fixed version is &#8220;strongly&#8221; advised. CVE-2026-4670 and CVE-2026-5174 Progress Software&#8217;s MOVEit Transfer, an enterprise managed file transfer &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/critical-moveit-automation-auth-bypass-vulnerability-fixed-cve-2026-4670/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/critical-moveit-automation-auth-bypass-vulnerability-fixed-cve-2026-4670/">Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670)</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Penske Logistics launches platform for real-time supply chain visibility</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/penske-logistics-supply-chain-insight-platform/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 04 May 2026 13:49:57 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369148</guid>

					<description><![CDATA[<p>Penske Logistics has announced the launch of Supply Chain Insight, a secure technology platform and mobile application that provides customers with a real-time view of their supply chain operations across transportation and warehousing. Supply chain leaders are under increased pressure to drive greater operational efficiency in the face of rising fuel costs, evolving regulations and economic challenges. Organizations are looking for a competitive edge to navigate uncertain times and achieve measurable cost savings and efficiencies. &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/penske-logistics-supply-chain-insight-platform/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/penske-logistics-supply-chain-insight-platform/">Penske Logistics launches platform for real-time supply chain visibility</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>DigiCert breached via malicious screensaver file</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/digicert-breach-code-signing-certificates-malware/</link>
		
		<dc:creator><![CDATA[Sinisa Markovic]]></dc:creator>
		<pubDate>Mon, 04 May 2026 13:46:15 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[DigiCert]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Microsoft Defender]]></category>
		<category><![CDATA[Social engineering]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369023</guid>

					<description><![CDATA[<p>A targeted social engineering attack against DigiCert’s support channel led to the compromise of internal systems and the unauthorized issuance of EV Code Signing certificates. DigiCert is a global Certificate Authority (CA) providing digital trust services, specializing in TLS/SSL certificates, PKI management, and IoT security. According to DigiCert’s incident report, a threat actor contacted the support team via a customer chat channel and delivered a malicious ZIP file disguised as a customer screenshot, which contained &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/digicert-breach-code-signing-certificates-malware/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/digicert-breach-code-signing-certificates-malware/">DigiCert breached via malicious screensaver file</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Operant AI Endpoint Protector secures AI agents and MCP tools</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/operant-ai-endpoint-protector-secures-ai-agents-and-mcp-tools/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 04 May 2026 13:34:04 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369137</guid>

					<description><![CDATA[<p>Operant AI has launched Operant Endpoint Protector, a new addition to its AI Defense Platform that enables enterprise IT and security teams to discover, detect, and defend against threats across every AI tool, coding agent, and Model Context Protocol (MCP)-connected workflow used by employees, directly at the endpoint where most consequential AI activity takes place. Securing the endpoint Across every enterprise, employees in HR, finance, legal, customer service, engineering, and operations are interacting with AI &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/operant-ai-endpoint-protector-secures-ai-agents-and-mcp-tools/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/operant-ai-endpoint-protector-secures-ai-agents-and-mcp-tools/">Operant AI Endpoint Protector secures AI agents and MCP tools</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Owl IRD enables one-way forensic data transfer for incident response teams</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/owl-cyber-defense-incident-response-diode-ird/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 04 May 2026 13:22:27 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<category><![CDATA[Owl Cyber Defense Solutions]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369128</guid>

					<description><![CDATA[<p>Owl Cyber Defense has announced the launch of its Incident Response Diode (IRD), a pocket-sized protocol filtering diode (PFD) designed for incident response and forensics teams. The Owl IRD was developed to help users securely move evidence from compromised endpoints into trusted analysis environments without adding risk. The Owl IRD will be made available to select customers for field testing. When an endpoint is compromised, responders must race against the clock to pull critical data &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/owl-cyber-defense-incident-response-diode-ird/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/owl-cyber-defense-incident-response-diode-ird/">Owl IRD enables one-way forensic data transfer for incident response teams</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Multiple threat actors actively exploit cPanel vulnerability (CVE-2026-41940)</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/multiple-threat-actors-actively-exploit-cpanel-vulnerability-cve-2026-41940/</link>
		
		<dc:creator><![CDATA[Zeljka Zorz]]></dc:creator>
		<pubDate>Mon, 04 May 2026 13:02:54 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Censys]]></category>
		<category><![CDATA[cPanel]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Shadowserver]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[web hosting]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369095</guid>

					<description><![CDATA[<p>The situation around the critical cPanel authentication bypass vulnerability (CVE-2026-41940) has deteriorated significantly since our initial coverage. Exploratory probing has evolved into multi-actor exploitation, leading to disrupted websites, ransomware and malware deployment, and targeted attacks. &#8220;Sorry&#8221; ransomware Attackers have taken advantage of CVE-2026-41940 to mass-exploit vulnerable internet-facing cPanel instances to breach servers, deface websites and encrypt data. The ransomware used in some of the attacks is a Go(Lang)-based Linux encryptor that encrypts files and appends &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/multiple-threat-actors-actively-exploit-cpanel-vulnerability-cve-2026-41940/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/multiple-threat-actors-actively-exploit-cpanel-vulnerability-cve-2026-41940/">Multiple threat actors actively exploit cPanel vulnerability (CVE-2026-41940)</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Blend Autopilot MCP brings AI agent orchestration to lending platforms</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/blend-autopilot-mcp-brings-ai-agent-orchestration-to-lending-platforms/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 04 May 2026 12:50:25 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369094</guid>

					<description><![CDATA[<p>Blend Labs has announced the launch of Autopilot MCP, a server built on the Model Context Protocol, an emerging open standard for AI agent connectivity, that gives authorized agents secure, programmatic access to the Blend platform. For lenders and partners, Autopilot MCP introduces a new category of capability: the ability to build and deploy AI agents tailored to their workflows, guidelines, and borrower experiences without rebuilding underlying infrastructure. Solving the orchestration problem in lending Before &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/blend-autopilot-mcp-brings-ai-agent-orchestration-to-lending-platforms/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/blend-autopilot-mcp-brings-ai-agent-orchestration-to-lending-platforms/">Blend Autopilot MCP brings AI agent orchestration to lending platforms</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Two cybersecurity pros get prison time for helping ransomware gang</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/cybersecurity-experts-alphv-blackcat-ransomware-sentenced/</link>
		
		<dc:creator><![CDATA[Anamarija Pogorelec]]></dc:creator>
		<pubDate>Mon, 04 May 2026 11:08:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[arrest]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[US DoJ]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=369033</guid>

					<description><![CDATA[<p>Two American cybersecurity professionals were sentenced to four years in prison for facilitating BlackCat ransomware attacks in 2023. They pleaded guilty in December 2025 to one count of conspiracy to obstruct, delay, or affect commerce, or the movement of any article or commodity in commerce, by extortion. According to court documents, Ryan Goldberg, Kevin Martin, and their co-conspirator Angelo Martino deployed ALPHV/BlackCat ransomware between April and December 2023 against multiple victims across the United States. &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/cybersecurity-experts-alphv-blackcat-ransomware-sentenced/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/cybersecurity-experts-alphv-blackcat-ransomware-sentenced/">Two cybersecurity pros get prison time for helping ransomware gang</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Claude Security enters public beta with Opus 4.7 vulnerability scanning and patching</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/anthropic-claude-security-public-beta/</link>
		
		<dc:creator><![CDATA[Anamarija Pogorelec]]></dc:creator>
		<pubDate>Mon, 04 May 2026 09:30:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[code analysis]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patching]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=368976</guid>

					<description><![CDATA[<p>Claude Security, previously called Claude Code Security, is in public beta for Claude Enterprise customers. Available in Claude.ai, the capability scans codebases for security vulnerabilities and suggests targeted patches for review, helping teams identify and fix issues that might otherwise be missed. Admins can enable it in the admin console. Access for Claude Team and Max customers is expected to follow. Organizations can use the Claude Opus 4.7 model across their codebases to detect vulnerabilities &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/anthropic-claude-security-public-beta/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/anthropic-claude-security-public-beta/">Claude Security enters public beta with Opus 4.7 vulnerability scanning and patching</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>15-year-old detained over massive data breach at French government agency</title>
		<link>https://www.helpnetsecurity.com/2026/05/04/france-titres-data-breach-teen-suspect/</link>
		
		<dc:creator><![CDATA[Sinisa Markovic]]></dc:creator>
		<pubDate>Mon, 04 May 2026 08:31:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[government]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=368967</guid>

					<description><![CDATA[<p>French authorities have detained a 15-year-old suspected of involvement in a data breach at France Titres, the government agency responsible for issuing official documents. &#8220;Between 12 and 18 million data records were reportedly being offered for sale on cybercriminal forums by a hacker known as “breach3d,“ the Paris Prosecutor’s Office said in a press release. ANTS detected suspicious activity on its network on April 13 and confirmed the authenticity of the data being sold. The &#8230; <a href="https://www.helpnetsecurity.com/2026/05/04/france-titres-data-breach-teen-suspect/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/05/04/france-titres-data-breach-teen-suspect/">15-year-old detained over massive data breach at French government agency</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
