FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet GitHub Linux Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SC Media General IBM Intel Mar 27

IBM's Srinivas Tummalapenta: Building the cyber risk intelligence layer

Padraic O’Reilly and Srinivas Tummalapenta explore how cybersecurity is evolving from fragmented data collection to a unified cyber risk intelligence layer.

SC Media →

SC Media General Mar 27

SC Awards Finalist: Best Professional Certification Program - ISACA - Mary Carmichael - SCA26 #1

SC Media →

SC Media General IBM Mar 27

IBM's Evelyn Anderson: Enabling autonomous cyber risk programs

Matt Alderman and Evelyn Anderson explore how autonomous security programs are reshaping cyber governance.

SC Media →

SC Media General Mar 27

Hack the Box's Gibb Witham: Measuring cyber readiness in the age of AI

Gibb Witham explains why organizations must move beyond assumed AI capability toward measurable, validated cyber readiness for both humans and AI systems.

SC Media →

SC Media General Mar 27

SC Awards Finalist: Best Application Security Solution - RoonCyber - Gene Fay - SCA26 #1

SC Media →

The Record General Mar 27

European Parliament rejects extension of CSAM scanning rules for tech platforms

The 311 members of Parliament who voted against an extension did so despite strong support from law enforcement, children’s rights groups, German Chancellor ...

The Record →

SC Media General Mar 27

SC Awards Finalist: Best Enterprise Security Solution - Island - Michael Leland - SCA26 #1

SC Media →

HackRead General Google Mar 27

Google Sets 2029 Deadline as Quantum Computers Threaten Encryption

Google fast-tracks post-quantum cryptography with a 2029 deadline as researchers warn quantum computers could break current encryption sooner than expected.

HackRead →

SC Media General Mar 27

SC Awards Finalist: Best Identity Management Solution - Teleport - Diana Jovin - SCA26 #1

SC Media →

SC Media General Mar 27

ArmorCode's Mark Lambert: AI exposure management and governing shadow AI

Mark Lambert discusses the company's new AI Exposure Management (AIEM) solution.

SC Media →

SC Media General Microsoft Mar 27

Microsoft's Arunesh Chandra: The browser in the AI era

Arunesh Chandra discusses why security and IT teams are rethinking the role of the browser.

SC Media →

Cyberscoop General Mar 27

Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data

The FBI said it was aware of hackers targeting Patel’s personal email, and that no government information was taken. The post Iranian hackers, Handala, claim...

Cyberscoop →

The Record General Mar 27

UK weighs new limits on political donations as reports warn of hard-to-trace foreign interference

The parliamentary report warns that hostile actors are conducting sustained and increasingly sophisticated campaigns to interfere in democratic processes, ex...

The Record →

CSO Online General Mar 27

Lloyds Bank reveals how IT bug exposed transaction data

Lloyds Banking Group has identified the glitch that led to some of its customers being able to see details of other customers’ transactions on March 12. It r...

CSO Online →

The Hacker News General Apple Mar 27

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based attacks and urge the...

The Hacker News →

SC Media General Mar 27

Menlo's Ramin Farassat: Why the browser is the front line for agentic AI

Ramin Farassat discusses how a new approach to browser security is required to provide architectural immunity.

SC Media →

The Record General Mar 27

FBI confirms theft of director’s personal emails by Iran-linked hacking group

An FBI spokesperson told Recorded Future News that the information is “historical in nature and involves no government information,” adding that the agency h...

The Record →

SC Media General Mar 27

SC Awards Finalist: Best SASE Solution - Zenarmor - Murat Balaban - SCA26 #1

SC Media →

SecurityWeek General Mar 27

Pro-Iranian Hacking Group Claims Credit for Hack of FBI Director Kash Patel’s Personal Account

The group that it was making available for download emails and other documents from Patel’s account. The post Pro-Iranian Hacking Group Claims Credit for Hac...

SecurityWeek →

SC Media General Mimecast Mar 27

Mimecast's Rob Juncker: The attack surface just got a copilot

Rob Juncker explores why human behavior has become the defining variable in enterprise cybersecurity.

T1598

SC Media →

« Prev 1 ... 28 29 30 31 32 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA