FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Help Net Security General Apple Linux 16h ago

Little Snitch for Linux shows what your apps are connecting to

Network monitoring on Linux has long been a gap for users who want per-process visibility into outbound connections. Existing tools either operate at the com...

Help Net Security →

Help Net Security General Microsoft Apple Linux 16h ago

Apiiro CLI turns AI coding assistants into full-stack security engineers

The Apiiro CLI brings the Apiiro platform to your terminal and to your AI coding assistants, giving them six native security capabilities: scanning, risk man...

Help Net Security →

GBHackers General Google Intel 16h ago

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action

9th, 2026, CyberNewswire Built by a veteran security team and led by a former Google and Mandiant executive, Mallory delivers intelligence that drives action...

GBHackers →

The Hacker News General Microsoft Google Apple 16h ago

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the...

The Hacker News →

SecurityWeek General Google 16h ago

Google Rolls Out Cookie Theft Protections in Chrome

New Device Bound Session Credentials render stolen session cookies unusable by cryptographically binding authentication. The post Google Rolls Out Cookie The...

SecurityWeek →

Security Affairs General 17h ago

Bitcoin Depot hack leads to $3.6M Bitcoin theft via stolen credentials

Hackers breached Bitcoin Depot, stole credentials, and took about 50 BTC worth $3.6M from its wallets after a March 23 intrusion.

T1078

Security Affairs →

GBHackers General Intel 18h ago

ChatGPT, Claude, and Gemini Among 11 AI Models Vulnerable to One-Line Jailbreak

A newly discovered jailbreak technique named “sockpuppeting” successfully forces 11 leading artificial intelligence models, including ChatGPT, Claude, and Ge...

GBHackers →

Help Net Security General Amazon 19h ago

What vibe hunting gets right about AI threat hunting, and where it breaks down

In this Help Net Security interview, Aqsa Taylor, Chief Security Evangelist, Exaforce, explains vibe hunting, an AI-driven approach to threat detection that ...

Help Net Security →

Help Net Security General 19h ago

Health insurance lead sites sell personal data within seconds of form submission

Lead generation websites that offer health insurance quotes collect sensitive personal data and sell it to multiple buyers within seconds of a user clicking ...

Help Net Security →

GBHackers General SAP 19h ago

WhatsApp Adds Username Feature to Boost Privacy and Reduce Number Sharing

For years, WhatsApp required users to share their personal phone numbers to communicate. This is finally changing.

GBHackers →

Help Net Security General 20h ago

Product showcase: Session, a messenger without phone numbers or metadata

Instant messaging has been around for decades, but it became widely adopted with the emergence of smartphones. Earlier, communication was limited to basic te...

T1598

Help Net Security →

Help Net Security General Intel 20h ago

New infosec products of the week: April 10, 2026

Here’s a look at the most interesting products from the past week, featuring releases from Advenica, Intruder, Mallory, and Secureframe. Mallory brings conte...

Help Net Security →

CSO Online General 21h ago

Was CISOs von Moschusochsen lernen können

Von Moschusochsen können sich CISOs eine Scheibe abschneiden – wenn es nach unserem Autor geht. Wirestock Creators – shutterstock.

1 IOC

CSO Online →

Exploit Database General 1d ago

[webapps] D-Link DIR-650IN - Authenticated Command Injection

D-Link DIR-650IN - Authenticated Command Injection

T1059

Exploit Database →

SC Media General 1d ago

The case for funding a strong, engaged CISA  

The U.S.

SC Media →

SC Media General 1d ago

Back to the beginning: A new model for secure SaaS access

Binding access to devices offers a practical way to secure modern cloud environments.

SC Media →

Cyberscoop General Google 1d ago

Why is the timeline to quantum-proof everything constantly shrinking?

Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroughs are pushing Google and others to call for speedier mig...

Cyberscoop →

SC Media General 1d ago

Misconfiguration spills over 40M SMTP records linked to major firms

Cybernews reports that more than 40 million SMTP records, including email addresses and traffic metadata from leading corporations DHL, L'Oreal, Renault, and...

SC Media →

SC Media General 1d ago

AI Makes All Bug Shallow? - PSW #921

SC Media →

SC Media General 1d ago

Iranian cyberattacks to continue amid ceasefire

Iranian hacking group Handala has declared continuous cyberattacks against Israel and an imminent resumption of cyber operations against the U.S.

SC Media →

« Prev 1 2 3 4 5 ... 64 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA