Help Net Security

Help Net Security Daily information security news with a focus on enterprise security.

  • ClickFix campaign delivers Mac malware via fake Apple page
    by Zeljka Zorz on April 10, 2026 at 1:29 pm

    Security researchers at Jamf have uncovered a new ClickFix-style attack targeting Mac users via a fake Apple-themed webpage offering instructions on how to “reclaim disk space on your Mac”. The malicious page (Source: Jamf) ClickFix for everybody ClickFix is a social engineering technique that cons victims into running malicious commands on their own machine, usually by pretending the commands are needed to fix a problem or perform routine upkeep. This technique was initially aimed at … More → The post ClickFix campaign delivers Mac malware via fake Apple page appeared first on Help Net Security.

  • Poisoned “Office 365” search results lead to stolen paychecks
    by Zeljka Zorz on April 10, 2026 at 11:30 am

    A financially motivated hacking group is targeting Canadian employees with a sophisticated campaign designed to covertly redirect their salary payments into attacker-controlled bank accounts, Microsoft researchers discovered. SEO poisoning and malvertising + phishing + AiTM The group, which Microsoft tracks as Storm-2755, begins by poisoning search engine results and running malicious ads against generic queries like “Office 365”, or even common misspellings like “Office 265.” Victims who click through land on a convincing but fake … More → The post Poisoned “Office 365” search results lead to stolen paychecks appeared first on Help Net Security.

  • Gmail’s end-to-end encryption comes to mobile, no extra apps required
    by Anamarija Pogorelec on April 10, 2026 at 9:53 am

    Google has expanded Gmail client-side encryption to Android and iOS devices, allowing users to engage with their organization’s most sensitive data on mobile devices while ensuring data remains compliant with sovereignty and compliance requirements. This feature is available for Enterprise Plus users with the Assured Controls or Assured Controls Plus add-on. Composing a E2EE message in Gmail (Source: Google) With this update, users can compose, send, and read encrypted messages directly in the Gmail app. … More → The post Gmail’s end-to-end encryption comes to mobile, no extra apps required appeared first on Help Net Security.

  • To counter cookie theft, Chrome ships device-bound session credentials
    by Mirko Zorz on April 10, 2026 at 9:21 am

    Cookie theft follows a well-established pattern. Infostealer malware infiltrates a device, extracts authentication cookies, and exfiltrates them to an attacker-controlled server. Because cookies often have extended lifetimes, attackers can access accounts without passwords, then bundle and sell the stolen credentials. Once malware gains access to a machine, it can read the local files and memory where browsers store authentication cookies. What DBSC does Google’s Device Bound Session Credentials (DBSC) is now entering public availability for … More → The post To counter cookie theft, Chrome ships device-bound session credentials appeared first on Help Net Security.

  • Little Snitch for Linux shows what your apps are connecting to
    by Mirko Zorz on April 10, 2026 at 8:36 am

    Network monitoring on Linux has long been a gap for users who want per-process visibility into outbound connections. Existing tools either operate at the command line or were designed for server security rather than desktop privacy. Objective Development, the Austrian company behind the macOS firewall utility Little Snitch, released a Linux version of the tool. It is free and, according to the company, will remain so. Architecture choices The kernel component uses eBPF for traffic … More → The post Little Snitch for Linux shows what your apps are connecting to appeared first on Help Net Security.

  • Apiiro CLI turns AI coding assistants into full-stack security engineers
    by Industry News on April 10, 2026 at 8:33 am

    The Apiiro CLI brings the Apiiro platform to your terminal and to your AI coding assistants, giving them six native security capabilities: scanning, risk management, remediation, an AI security analyst (via Apiiro Guardian Agent), AI Threat Modeling, and prompt enrichment. It installs in seconds on macOS, Linux, and Windows via brew, direct download, or RPM. Apiiro CLI ships with agent skills, structured capability definitions that AI coding assistants like Claude Code and Cursor can read … More → The post Apiiro CLI turns AI coding assistants into full-stack security engineers appeared first on Help Net Security.

  • April 2026 Patch Tuesday forecast: Spring-cleaning of a preview
    by Help Net Security on April 10, 2026 at 7:22 am

    I just blinked and the first quarter of the year is GONE. Where does the time go? I looked back at my article from last month where I touched on the use of AI and some of the vulnerabilities associated with it and realized it was good precursor to some themes at RSAC this year. AI was certainly the focus this year, with almost everyone having some form of AI connection to their products (some … More → The post April 2026 Patch Tuesday forecast: Spring-cleaning of a preview appeared first on Help Net Security.

  • What vibe hunting gets right about AI threat hunting, and where it breaks down
    by Mirko Zorz on April 10, 2026 at 5:30 am

    In this Help Net Security interview, Aqsa Taylor, Chief Security Evangelist, Exaforce, explains vibe hunting, an AI-driven approach to threat detection that inverts traditional hypothesis-driven methods. Instead of analysts defining attack vectors upfront, the AI scans datasets for anomalous patterns and surfaces potential threats. Taylor draws a firm line on responsibility: analysts must be able to explain their reasoning. When they cannot, the AI is steering the hunt. She also addresses enrichment, junior analyst development, … More → The post What vibe hunting gets right about AI threat hunting, and where it breaks down appeared first on Help Net Security.

  • Health insurance lead sites sell personal data within seconds of form submission
    by Mirko Zorz on April 10, 2026 at 5:00 am

    Lead generation websites that offer health insurance quotes collect sensitive personal data and sell it to multiple buyers within seconds of a user clicking submit. A study by researchers at UC Davis, Stanford University, and Maastricht University mapped this process across 105 health insurance lead generation sites and monitored what happened to the data over 60 days. The researchers created 210 synthetic user profiles, each with a unique phone number and email address, and submitted … More → The post Health insurance lead sites sell personal data within seconds of form submission appeared first on Help Net Security.

  • Product showcase: Session, a messenger without phone numbers or metadata
    by Anamarija Pogorelec on April 10, 2026 at 4:30 am

    Instant messaging has been around for decades, but it became widely adopted with the emergence of smartphones. Earlier, communication was limited to basic text messages. Messaging expanded to include photos, videos, and video calls without relying on telecom networks, as long as there is a reliable data connection. Privacy and metadata concerns With the growth of communication, privacy and security concerns became more prominent. Companies responded by encrypting message content to protect user data. End-to-end … More → The post Product showcase: Session, a messenger without phone numbers or metadata appeared first on Help Net Security.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.