<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Help Net Security</title>
	<atom:link href="https://www.helpnetsecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.helpnetsecurity.com/</link>
	<description>Daily information security news with a focus on enterprise security.</description>
	<lastBuildDate>Thu, 23 Apr 2026 14:15:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093400/cropped-hns2-32x32.png</url>
	<title>Help Net Security</title>
	<link>https://www.helpnetsecurity.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hacker with a special interest in breaching sports institutions ends behind bars</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/france-hacker-arrested-data-breaches-sports-federations/</link>
		
		<dc:creator><![CDATA[Sinisa Markovic]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 14:13:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[law enforcement]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367710</guid>

					<description><![CDATA[<p>French police have arrested a suspected hacker linked to a series of data breaches affecting organizations in the country. Citing authorities, Le Parisien reported that the suspect, a 20-year-old man using the alias ‘HexDex,’ was taken into custody on April 22, 2026, in the Vendée region, western France. The suspect admitted to using the alias ‘HexDex,’ which he used to claim the leaks online and repost the data on forums such as BreachForum and Darkforum, &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/france-hacker-arrested-data-breaches-sports-federations/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/france-hacker-arrested-data-breaches-sports-federations/">Hacker with a special interest in breaching sports institutions ends behind bars</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>IP Fabric MCP server adds governance and control to enterprise AIOps workflows</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/ip-fabric-mcp-server/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 13:00:12 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367734</guid>

					<description><![CDATA[<p>IP Fabric has launched a new Model Context Protocol (MCP) server that removes key barriers to enterprise AIOps adoption, combining secure in-platform deployment with a built-in prompt library for network operations. While MCP servers and AI integrations are increasingly common, most fall short in enterprise environments where security, control and trusted data are non-negotiable. IP Fabric eliminates these barriers to enterprise AIOps adoption with a purpose-built solution that delivers a practical and governed path to &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/ip-fabric-mcp-server/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/ip-fabric-mcp-server/">IP Fabric MCP server adds governance and control to enterprise AIOps workflows</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Aqua Compass MCP server enables real-time investigation and containment of runtime threats</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/aqua-security-compass/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 12:48:19 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<category><![CDATA[Aqua Security]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367728</guid>

					<description><![CDATA[<p>Aqua Security has announced Aqua Compass, a Model Context Protocol (MCP) server that enables agentic investigation, containment and remediation of runtime incidents, and new runtime risk dashboards. These capabilities help security teams move beyond identifying risk and focus on containing threats in running applications. The announcement builds on Aqua’s Secure AI capabilities, extending the company’s AI innovation from protecting AI applications to applying AI directly to runtime security operations. Cloud native development and AI-generated code &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/aqua-security-compass/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/aqua-security-compass/">Aqua Compass MCP server enables real-time investigation and containment of runtime threats</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Google brings instant email verification to Android, no OTP needed</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/android-verified-email-credentials-feature/</link>
		
		<dc:creator><![CDATA[Anamarija Pogorelec]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 12:01:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[identity verification]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367583</guid>

					<description><![CDATA[<p>Google has introduced cryptographically verified email credentials for Android through the Credential Manager API. This API aligns with the W3C Digital Credential API standard. It provides a unified way for apps to request and retrieve user credentials for authentication and authorization. “By integrating the new verified email via the Credential Manager API, you can reduce onboarding friction and provide a more streamlined and secure authentication flow. This reflects a shift toward a future where verification &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/android-verified-email-credentials-feature/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/android-verified-email-credentials-feature/">Google brings instant email verification to Android, no OTP needed</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>If cyber espionage via HDMI worries you, NCSC built a device to stop it</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/ncsc-silentglass-cybersecurity-tool-hdmi-displayport/</link>
		
		<dc:creator><![CDATA[Sinisa Markovic]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 11:16:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367646</guid>

					<description><![CDATA[<p>A new cybersecurity device developed by the National Cyber Security Centre (NCSC) should be a helpful solution for protecting governments and businesses from malicious activity carried through display connections. Called SilentGlass, the plug-and-play tool is designed to protect HDMI and DisplayPort links from potential cyberattacks. The NCSC warns that monitors are an attractive target for cyber attackers as they can process and store sensitive data, and are highly likely to be exploited to gain access &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/ncsc-silentglass-cybersecurity-tool-hdmi-displayport/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/ncsc-silentglass-cybersecurity-tool-hdmi-displayport/">If cyber espionage via HDMI worries you, NCSC built a device to stop it</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/cve-2026-28950-iphone-vulnerability-notifications-signal/</link>
		
		<dc:creator><![CDATA[Zeljka Zorz]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 11:15:27 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367689</guid>

					<description><![CDATA[<p>Apple has rolled out security updates for iPhones and iPads that fix CVE-2026-28950, a logging issue in Notification Services that made devices unexpectedly retain notifications marked for deletion. The vulnerability was patched following a recent report about the FBI accessing a suspect&#8217;s Signal message notification content on their iPhone, despite Signal being deleted from the device. As usual, Apple did not offer more details about the flaw; it just said that the issue was addressed &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/cve-2026-28950-iphone-vulnerability-notifications-signal/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/cve-2026-28950-iphone-vulnerability-notifications-signal/">Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>GopherWhisper APT group hides command and control traffic in Slack and Discord</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/gopherwhisper-apt-group/</link>
		
		<dc:creator><![CDATA[Anamarija Pogorelec]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 09:00:10 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367338</guid>

					<description><![CDATA[<p>Attackers continue to lean on everyday collaboration platforms to hide command and control traffic inside normal enterprise noise. A newly identified China-aligned APT group pushes that trend further, running its operations through Slack workspaces, Discord servers, Outlook drafts, and the file.io sharing service. GopherWhisper toolset overview ESET researchers have named the group GopherWhisper and tied it to an intrusion at a Mongolian governmental entity. The name draws on two elements: most of the group&#8217;s tooling &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/gopherwhisper-apt-group/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/gopherwhisper-apt-group/">GopherWhisper APT group hides command and control traffic in Slack and Discord</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>OpenAI tackles a bad habit people have when interacting with AI</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/openai-privacy-filter-personally-identifiable-information/</link>
		
		<dc:creator><![CDATA[Sinisa Markovic]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 08:42:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367577</guid>

					<description><![CDATA[<p>Since people tend to paste personal data into AI tools such as ChatGPT, OpenAI has released Privacy Filter, an open-weight model designed to detect and redact personally identifiable information (PII) in text. The model is available under the Apache 2.0 license on Hugging Face and GitHub. “This release is part of our broader effort to support a more resilient software ecosystem by providing developers with practical infrastructure for building with AI safely, including tools and &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/openai-privacy-filter-personally-identifiable-information/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/openai-privacy-filter-personally-identifiable-information/">OpenAI tackles a bad habit people have when interacting with AI</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>A year in, Zoom&#8217;s CISO reflects on balancing security and business</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/sandra-mcleod-zoom-ciso-leadership/</link>
		
		<dc:creator><![CDATA[Mirko Zorz]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 05:30:34 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Features]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[opinion]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367324</guid>

					<description><![CDATA[<p>In this Help Net Security interview, Sandra McLeod, CISO at Zoom, reflects on her first year in the role. She talks about moving from reactive firefighting to business strategy, and what she heard from engineers, the board, and customers during her early months. McLeod discusses how she prepared for incident management, the dual job of handling crises and explaining them afterward, and her experience as a woman in technical leadership at Zoom. She closes with &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/sandra-mcleod-zoom-ciso-leadership/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/sandra-mcleod-zoom-ciso-leadership/">A year in, Zoom&#8217;s CISO reflects on balancing security and business</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Scenario: Open-source framework for automated AI app red-teaming</title>
		<link>https://www.helpnetsecurity.com/2026/04/23/scenario-open-source-framework-for-automated-ai-app-red-teaming/</link>
		
		<dc:creator><![CDATA[Mirko Zorz]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 05:00:54 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[framework]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[LLMs]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=367414</guid>

					<description><![CDATA[<p>Enterprises running customer service bots, data analytics agents, and other AI-driven applications in production handle sensitive records and connect to core business systems every day. LangWatch has released Scenario, an open-source framework that runs automated red-team exercises against AI agents using multi-turn attack techniques that mirror how adversaries operate in the wild. Multi-turn attacks replace single-shot testing Single-prompt penetration tests have long been the standard approach for probing LLMs. Models often hold firm against a &#8230; <a href="https://www.helpnetsecurity.com/2026/04/23/scenario-open-source-framework-for-automated-ai-app-red-teaming/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://www.helpnetsecurity.com/2026/04/23/scenario-open-source-framework-for-automated-ai-app-red-teaming/">Scenario: Open-source framework for automated AI app red-teaming</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
