FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Recorded Future General Apr 1

Industrialization of the Fraud Ecosystem Blog

Payment fraud has industrialized, and that's a defensive advantage. Learn how standardized attack infrastructure creates detectable patterns that financial i...

Recorded Future →

Recorded Future General Apr 1

The Shift: An Era of Quantum Geopolitics

The expanding conflict around Iran signals a deeper shift.

Recorded Future →

BleepingComputer General Google Mar 31

Google now allows you to change your @gmail.com address

Google is rolling out a new feature in the U.S.

1 IOC

BleepingComputer →

BleepingComputer General Microsoft Google Zoom Mar 31

Proton launches new "Meet" privacy-focused conferencing platform

Proton has announced a new video conferencing service named Meet and positioned it as a privacy-focused alternative to mainstream services like Google Meet, ...

BleepingComputer →

BleepingComputer General Mar 31

GIGABYTE Control Center vulnerable to arbitrary file write flaw

The GIGABYTE Control Center is vulnerable to an arbitrary file-write flaw that could allow a remote, unauthenticated attacker to access files on vulnerable h...

BleepingComputer →

SC Media General Mar 31

Beyond the Hype: Cyber Readiness, Zero Trust, and an Unscripted Conversation - Rob Allen, Gibb Witham - SWN #568

SC Media →

SC Media General Amazon Mar 31

OkCupid, Match Group settle with FTC over unlawful data sharing with AI firm

Dating app OkCupid and its parent company Match Group Americas have reached a settlement with the Federal Trade Commission, following the latter's lawsuit th...

SC Media →

SC Media General Apple Mar 31

New macOS feature seeks to avert ClickFix compromise

Apple has released a new mechanism for macOS Tahoe 26.4 that stops the execution of potentially harmful commands in Terminal and warns the user about related...

SC Media →

AWS Security Blog General Amazon Mar 31

New compliance guide available: ISO/IEC 27001:2022 on AWS

We’re excited to announce the release of our latest compliance guide, ISO/IEC 27001:2022 on AWS, which provides practical guidance for organizations designin...

T1598

AWS Security Blog →

SC Media General Mar 31

US bounty on Iranian hackers reissued

Multiple U.S.

SC Media →

SC Media General Citrix Mar 31

Citrix NetScaler ADC bug added to CISA list of known exploits

Security agency gives federal agencies until April 2, 2026, to make the patch.

SC Media →

Help Net Security General Google Mar 31

Crypto industry may be running out of time to prepare for quantum attacks

Google’s latest research suggests the cryptocurrency industry may have less time than expected to prepare for quantum computing. In a whitepaper, Google exam...

Help Net Security →

The Hacker News General Google Mar 31

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google on Monday said it's officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful a...

The Hacker News →

The Record General Mar 31

US indicts Maryland man for 2021 theft of $54 million from Uranium Finance

U.S.

The Record →

SC Media General Mar 31

Dutch Ministry of Finance portal offline after cyberattack

The cyberattack, detected after a third-party alert, led to unauthorized access to internal systems within the policy department.

SC Media →

SC Media General Mar 31

Maryland man charged in $53 million Uranium Finance crypto heist

Spalletta is accused of exploiting vulnerabilities in Uranium Finance's smart contracts on two separate occasions in April 2021.

SC Media →

Microsoft Security Blog General Microsoft Intel Mar 31

The threat to critical infrastructure has changed. Has your readiness?

Five facts critical infrastructure (CI) leaders need to act on in 2026, grounded in what Microsoft Threat Intelligence is observing across sectors right now....

Microsoft Security Blog →

Help Net Security General Mar 31

Pondurance MDR Essentials uses autonomous SOC to tackle AI-driven attacks

Pondurance announced MDR Essentials, MDR Essentials, an MDR service providing an autonomous SOC that reduces the time from threat detection to containment by...

T1598

Help Net Security →

Cyberscoop General Apple Mar 31

Attack on axios software developer tool threatens widespread compromises

Researchers at numerous firms are sounding warnings about the supply-chain attack on an open-source project with 100 million weekly downloads. The post Attac...

Cyberscoop →

AWS Security Blog General Microsoft Google Amazon Mar 31

AWS Security Agent on-demand penetration testing now generally available

AWS Security Agent on-demand penetration testing is now generally available, enabling you to run comprehensive security tests across all your applications, n...

AWS Security Blog →

« Prev 1 ... 21 22 23 24 25 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA