FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Schneier on Security General 3d ago

Cybersecurity in the Age of Instant Software

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant...

T1598

Schneier on Security →

Cyberscoop General 3d ago

Cybercrime losses jumped 26% to $20.9 billion in 2025

The FBI’s annual report on digital crimes exposes a worsening environment. Yet, an unknown number of victims still suffer in the shadows never reporting the ...

Cyberscoop →

SC Media General 3d ago

Acquisition reform is materializing, but the harder test still lies ahead

The Pentagon is finally getting serious about procurement reform, but the proof will be in the pudding.

SC Media →

SecurityWeek General 3d ago

Trent AI Emerges From Stealth With $13 Million in Funding

The startup has created a layered security solution aiming to secure AI agents throughout their entire lifecycle. The post Trent AI Emerges From Stealth With...

SecurityWeek →

The Record General Intel 3d ago

National security veterans warn against delays in FISA 702 reauthorization

The missive, obtained by Recorded Future News, arrives days before policymakers return from recess next week and aim for a quick extension Section 702 of the...

The Record →

The Record General 3d ago

Massachusetts hospital turning ambulances away after cyberattack

Signature Healthcare and Signature Healthcare Brockton Hospital said on Monday that the cyber incident is impacting many of their information systems.

The Record →

Qualys Blog General 3d ago

Signals from the Cloud Security Forecast 2026: Cloud Risk Is Scaling through Design, Not Disruption

Key Takeaways Cloud Risk Is No Longer Unpredictable. It Is Settling Into a Pattern.

Qualys Blog →

SC Media General 3d ago

Businesses risk significant losses due to IT incidents, PagerDuty research reveals

Research from PagerDuty indicates that beyond lost revenue, businesses face substantial risks including reputational damage (cited by 53%), lost productivity...

SC Media →

SC Media General 3d ago

Uffizi Galleries cyberattack: Data stolen, backups restore archive

Hackers targeted the Uffizi Galleries in February 2026, allegedly stealing the museum's entire photographic archive.

T1041

SC Media →

BleepingComputer General 3d ago

Why Your Automated Pentesting Tool Just Hit a Wall

Automated pentesting tools deliver strong early results, then quickly plateau. Picus Security explains how the "PoC cliff" leaves major attack surfaces untes...

BleepingComputer →

The Record General 3d ago

UK exposes Russian cyber unit hacking home routers to hijack internet traffic

Officials said the activity centers on compromising small office and home office routers and similar network devices exposed to the internet, often because o...

T1598

The Record →

SecurityWeek General 3d ago

GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data

By targeting Grafana’s AI components, attackers can point to external resources and inject indirect prompts to bypass safeguards. The post GrafanaGhost: Atta...

SecurityWeek →

Security Affairs General 3d ago

Major outage cripples Russian banking apps and metro payments nationwide

A major outage hit Russian banking apps and payments, blocking card use, cash withdrawals, and mobile access for hours. A widespread outage disrupted banking...

Security Affairs →

Cyberscoop General 3d ago

‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace

Noma Security researchers used indirect prompt injection to turn Grafana's own AI into an unwitting courier for sensitive corporate data. The post ‘GrafanaGh...

Cyberscoop →

Help Net Security General 3d ago

Acronis MDR by TRU brings 24/7 managed detection and response to MSPs

Acronis has announced the launch of Acronis MDR by Acronis TRU, a globally available 24/7/365 managed detection and response (MDR) service. Built specificall...

Help Net Security →

SecurityWeek General 3d ago

Webinar Today: Why Automated Pentesting Alone Is Not Enough

Join the live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation dis...

SecurityWeek →

Help Net Security General Google Cloudflare 3d ago

Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day

Cloudflare announced it is targeting 2029 to complete post-quantum security across its entire product suite, including post-quantum authentication. The compa...

Help Net Security →

CSO Online General 3d ago

Zero‑click Grafana AI attack can enable enterprise data exfiltration

Indirect prompt injection is possible on AI-powered dashboards, allowing exfiltration of sensitive enterprise data without user authentication. Security rese...

T1041

CSO Online →

GBHackers General Amazon Docker Kubernetes 3d ago

Kubernetes Flaws Let Hackers Jump From Containers to Cloud Accounts

Hackers are increasingly abusing Kubernetes misconfigurations to jump from containers into high‑value cloud accounts, turning a single compromised pod into f...

GBHackers →

The Hacker News General 3d ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet th...

The Hacker News →

« Prev 1 ... 8 9 10 11 12 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA