FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

CSO Online General Apr 1

6 metrics IT leaders can’t afford to ignore for business resilience

If you’re in IT, you know: what we don’t measure puts business resilience at risk. In the face of rising threat volumes, scaling complexity, and board-level ...

CSO Online →

CSO Online General Apr 1

5 critical steps to achieve business resilience in cybersecurity

What does it really take to keep your organization running when attackers strike? The answer is business resilience—being able to detect, contain, and recove...

CSO Online →

Schneier on Security General Apr 1

Is “Hackback” Official US Cybersecurity Strategy?

The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive to...

Schneier on Security →

SecurityWeek General Apr 1

Depthfirst Raises $80 Million in Series B Funding

The startup will expand its AI research team, train additional security models, and scale enterprise adoption. The post Depthfirst Raises $80 Million in Seri...

SecurityWeek →

Help Net Security General Apr 1

Cybercriminals take aim at Hasbro, weeks of recovery ahead

Hasbro, an American toy maker with more than 5,000 employees, confirmed a cyberattack and proactively took certain systems offline. The intrusion was detecte...

Help Net Security →

The Record General Amazon Apr 1

Cambodia extradites alleged cyber scam linchpin to China as crackdown intensifies

Li Xiong was the head of Huione Group, whose branded entities at one time included an online banking arm, cryptocurrency exchange and online marketplace whic...

The Record →

The Record General Apr 1

Hasbro takes some systems offline after cybersecurity incident

The company filed a notice with the Securities Exchange Commission (SEC) on Wednesday warning investors that its IT team discovered unauthorized access on Ma...

The Record →

SC Media General Apr 1

Report: Americans concerned about government management of personal data

StateScoop reports that the majority of Americans seek more control over data sharing across the U.S.

SC Media →

SC Media General Apr 1

AI implementation influenced by cybersecurity risks, survey shows

A KPMG poll found that cybersecurity is one of the main risks impacting corporate executives' decisions about adopting AI, according to Cybersecurity Dive.

SC Media →

SC Media General CrowdStrike Apr 1

Joint offering combines CrowdStrike's Falcon with HCLTech's AI Force

CrowdStrike and HCLTech have expanded their partnership with a new continuous threat exposure management service combining CrowdStrike's Falcon platform with...

SC Media →

SecurityWeek General Apr 1

Toy Giant Hasbro Hit by Cyberattack

The company is investigating the full scope of the incident, including whether any files have been compromised. The post Toy Giant Hasbro Hit by Cyberattack ...

SecurityWeek →

HackRead General Apr 1

Anthropic Leaks 512,000 Lines of Claude AI Code in Major Blunder

Human error exposed 512,000+ lines of Anthropic Claude AI Code, revealing KAIROS and Capybara secrets, pushing users to switch to the Native Installer.

HackRead →

Infosecurity Magazine General Google Apr 1

Google Introduces Android Dev Verification Amid Openness Debate

Android requires dev identity verification for sideloaded apps; phased global rollout from September

Infosecurity Magazine →

SC Media General Apr 1

Proton launches privacy-focused video conferencing service

Proton Meet utilizes the Messaging Layer Security (MLS) protocol for end-to-end encryption, ensuring that all media and chat are encrypted client-side.

SC Media →

SC Media General Intel Apr 1

UAE faces surge in AI-powered cyberattacks

Hostile actors, including state-linked entities, are leveraging artificial intelligence tools such as ChatGPT and other platforms to conduct cyber operations.

SC Media →

SC Media General Google Apr 1

Google paper reveals quantum computing threat to cryptocurrency

A paper published by Google indicates that a quantum computer with 500,000 qubits could be used to steal cryptocurrency, a significantly lower threshold than...

SC Media →

SC Media General Apr 1

FCC bans import of new foreign-made consumer routers due to security risks

The FCC has added all foreign-produced consumer-grade routers to its Covered List, prohibiting their marketing and sale in the U.S.

SC Media →

BleepingComputer General Apr 1

Routine Access Is Powering Modern Intrusions, a New Threat Report Finds

Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, ...

T1204

BleepingComputer →

SC Media General Apr 1

FBI warns Americans about data risks in foreign-developed mobile apps

The FBI's public service announcement details how certain mobile apps may continuously collect user data, even when permissions are granted only for active use.

SC Media →

SecurityWeek General Apr 1

FBI Warns of Data Security Risks From China-Made Mobile Apps

The agency has not named the problematic foreign-made applications, but TikTok and Temu come to mind. The post FBI Warns of Data Security Risks From China-Ma...

SecurityWeek →

« Prev 1 ... 18 19 20 21 22 ... 64 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA