FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SC Media General 1d ago

Cybercriminals use emojis to evade detection, Flashpoint warns

Flashpoint's report categorizes the emojis used by cybercriminals into several groups, including financial activity, access credentials, tools, automation, s...

SC Media →

The Record General 1d ago

FCC proposes new rule to further crackdown on illegal robocalls

The rule would force originating providers to gather more information from customers before they allow calls, verify the provided data more carefully and be ...

The Record →

Microsoft Security Blog General Microsoft 1d ago

The agentic SOC—Rethinking SecOps for the next decade

In the SOC of the future, autonomous defense moves at machine speed, agents add context and coordination, and humans focus on judgment, risk, and outcomes. T...

Microsoft Security Blog →

CSO Online General Google Cloudflare 1d ago

Cloudflare ‘actively adjusting’ quantum priorities in wake of Google warning

Google’s accelerated post-quantum encryption deadline has spurred other leaders in the industry, including Cloudflare, to consider pushing forward their own ...

T1598

CSO Online →

SC Media General 1d ago

Why real-time visibility is non-negotiable in an AI-driven world

In a world where attackers operate at machine speed, cybersecurity must follow suit.

SC Media →

Rapid7 Blog General Amazon 1d ago

What Project Glasswing Means for Security Leaders

Anthropic’s Project Glasswing matters because it offers an early look at how quickly software flaws may soon be found, validated, and potentially turned into...

T1598

Rapid7 Blog →

The Record General 1d ago

Treasury Department announces crypto industry cyber threat sharing initiative

Eligible U.S.

The Record →

Google Security Blog General Microsoft Google Apple 1d ago

Protecting Cookies with Device Bound Session Credentials

Posted by Ben Ackerman, Chrome team, Daniel Rubery, Chrome team and Guillaume Ehinger, Google Account Security team Following our April 2024 announcement, De...

Google Security Blog →

BleepingComputer General WordPress 1d ago

Smart Slider updates hijacked to push malicious WordPress, Joomla versions

Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [.

BleepingComputer →

Qualys Blog General 1d ago

Scaling Modern AppSec: Moving from Static Profiles to AI-Powered Scan Optimization

Key Highlights Security teams today are accountable for an ever-expanding estate of web applications and APIs. In large enterprises, that often means hundred...

Qualys Blog →

SC Media General 1d ago

5 ways to mitigate the risks of “cracked” software

Employees don’t always realize the full risks of going outside the IT department and downloading “free” software.

SC Media →

The Record General 1d ago

Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine

In a statement to state-owned media, the FSB said the suspect joined a Telegram channel controlled by the Security Service of Ukraine (SBU) and passed inform...

The Record →

Qualys Blog General Amazon 1d ago

12 Best Practices for Securing AWS Cloud in 2026

Key Takeaways What Securing the AWS Cloud Really Means in 2026 Amazon Web Services (AWS) cloud security is the discipline of protecting cloud infrastructure,...

Qualys Blog →

Help Net Security General Check Point 1d ago

Claude Managed Agents bring execution and control to AI agent workflows

Anthropic’s Claude Managed Agents are a suite of composable APIs for building and deploying cloud-hosted agents at scale, handling sandboxed code execution, ...

Help Net Security →

SC Media General 1d ago

Claude Mythos Preview identifies 27-year-old bug, finds 'thousands' of zero-days in weeks

Anthropic launched “Project Glasswing” to restrict the availability of the new model to selected organizations.

SC Media →

SecurityWeek General Apple Intel 1d ago

Apple Intelligence AI Guardrails Bypassed in New Attack

RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode manipulation. The post Apple Intelligence AI Guardrails Bypassed in New ...

SecurityWeek →

SecurityWeek General 1d ago

Can we Trust AI? No – But Eventually We Must

From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on probability rather than truth, yet enterprises are deploying it ...

SecurityWeek →

Help Net Security General Intel 1d ago

Mallory brings contextual threat intelligence to security operations

Mallory is launching an AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day: What are th...

Help Net Security →

HackRead General Intel 1d ago

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action

Austin, Texas, United States, 9th April 2026, CyberNewswire

HackRead →

Rapid7 Blog General Microsoft Rapid7 1d ago

What’s New in Rapid7 Products and Services: Q1 2026 in Review

If product releases had a runway moment, Q1 at Rapid7 would’ve walked out in Cloud Dancer; crisp, confident, and quietly powerful, before breaking into a ful...

Rapid7 Blog →

« Prev 1 2 3 4 5 6 ... 64 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA