FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

HackRead General 3d ago

AI Agents and Non-Human Identities Creating Critical Security Gaps, Report

New research from Keeper Security, reveals non-human identities and automated system-to-system interactions are becoming the top security risk for businesses...

T1598

HackRead →

Infosecurity Magazine General 3d ago

Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI

Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI

Infosecurity Magazine →

GBHackers General 3d ago

Fake Gemini npm Package Steals AI Tool Tokens

Hackers are abusing a fake Gemini-themed npm package to steal tokens and secrets from developers using AI coding tools like Claude, Cursor, Windsurf, PearAI,...

GBHackers →

SecurityWeek General 3d ago

GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack 

Researchers have demonstrated that GPU Rowhammer attacks can be used to escalate privileges. The post GPUBreach: Root Shell Access Achieved via GPU Rowhammer...

SecurityWeek →

Trail of Bits General SAP 3d ago

What we learned about TEE security from auditing WhatsApp's Private Inference

WhatsApp’s new “Private Inference” feature represents one of the most ambitious attempts to combine end-to-end encryption with AI-powered capabilities, such ...

Trail of Bits →

SC Media General 3d ago

North Korea recruits Iranian workers for IT job fraud

Internal records reveal how North Korean facilitators scout and coach workers.

SC Media →

Schneier on Security General 3d ago

Hong Kong Police Can Force You to Reveal Your Encryption Keys

According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you ar...

Schneier on Security →

Help Net Security General GitHub 3d ago

GitHub Copilot CLI gets a second-opinion feature built on cross-model review

Coding agents make decisions in sequence: a plan is drafted, implemented, then tested. Any error introduced early compounds as subsequent steps build on the ...

Help Net Security →

Information Security Buzz General 3d ago

Why the cybersecurity skills gap is partly self-inflicted

The cybersecurity skills gap is usually framed as a hiring problem. Organizations respond by expanding recruitment pipelines, investing in certifications, an...

Information Security Buzz →

CSO Online General 3d ago

The rise of proactive cyber: Why defense is no longer enough

For more than two decades, cybersecurity has been built on a reactive model: detect intrusions, patch vulnerabilities, respond to incidents, and repeat. That...

CSO Online →

CSO Online General 3d ago

The noisy tenants: Engineering fairness in multi-tenant SIEM solutions

I recently had the opportunity to review five popular SIEM solutions as part of a judging panel for a Security award. While each platform had its own unique ...

CSO Online →

SC Media General Apple 3d ago

AppSec News Roundup on Claude Code Leak, Axios NPM Compromise, Secure Design - Idan Plotnik, Raj Mallempati - ASW #377

SC Media →

WeLiveSecurity General 3d ago

As breakout time accelerates, prevention-first cybersecurity takes center stage

Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.

WeLiveSecurity →

Graham Cluley General 3d ago

Life imprisonment for Cambodian scam compound operators – but will it make a difference?

Cambodia has taken a dramatic step in its fight against scam compounds that have imprisoned innocent people, and forced them to work as virtual slaves defrau...

Graham Cluley →

Help Net Security General 3d ago

Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR

Getting a startup through a SOC 2 audit has long meant months of manual evidence collection, policy writing, and repeated back-and-forth with auditors. A gro...

Help Net Security →

Help Net Security General 3d ago

OpenAI opens applications for an external AI safety research fellowship

OpenAI is accepting applications for a paid fellowship program that will fund external researchers to work on safety and alignment questions related to advan...

Help Net Security →

SecurityWeek General 3d ago

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration says the FY2027 budget refocuses CISA on its core mission: protecting federal agencies and critical infrastructure. The post White H...

SecurityWeek →

Information Security Buzz General 3d ago

The Quiet Revolt: What the World Happiness Report 2026 Tells Security Professionals

Something the World Happiness Report 2026 reveals deserves more attention than it has received outside wellbeing circles. In Western Europe and English-speak...

Information Security Buzz →

CrowdStrike Blog General 4d ago

Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

T1598

CrowdStrike Blog →

Help Net Security General Google 4d ago

Google study finds LLMs are embedded at every stage of abuse detection

Online platforms are running large language models at every stage of LLM content moderation, from generating training data to auditing their own systems for ...

Help Net Security →

« Prev 1 ... 9 10 11 12 13 ... 65 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA