FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SC Media General Mar 25

Delinea's Phil Calvin on redefining identity security for the agentic AI era

Phil Calvin discusses Delinea's recent of acquisition of StrongDM.

SC Media →

SC Media General Mar 25

Legion's Ely Abramovich on goal-oriented AI investigations

Ely Abramovich discusses how Legion Investigator bridges automated execution and human-level reasoning.

SC Media →

SC Media General Mar 25

BlueFlag Security's Raj Mallempati on why breaches start with identity

Raj Mallempati discusses why security teams need real-time visibility into who has access and what they're actually doing.

SC Media →

SANS ISC General Mar 25

ISC Stormcast For Wednesday, March 25th, 2026 https://isc.sans.edu/podcastdetail/9864, (Wed, Mar 25th)

1 IOC

SANS ISC →

SC Media General Mar 25

RSAC 2026 Trends: Agentic AI, AI Identity & The Future of Cybersecurity - RSAC26 #2

SC Media →

SC Media General Mar 25

Sekoia.io's Georges Bossert on avoiding making SOCs faster at being wrong

Georges Bossert explains why true autonomy relies on reliable context and structured runbooks, not just prompts.

1 IOC

SC Media →

SC Media General Intel Mar 25

Agentic AI and the Future of Threat Intelligence Operations - Sachin Jade - RSAC26 #2

SC Media →

SC Media General Mar 25

Know Your AI Agents Through Visibility, Control, and Accountability - Matt Immler - RSAC26 #2

SC Media →

HackRead General Mar 24

HackerOne, Mazda, Infinite Campus and Dutch Ministry Hit by Data Breaches

HackerOne, Mazda, Infinite Campus and the Dutch Ministry report data breaches, exposing employee and partner data across multiple sectors worldwide.

HackRead →

The Record General Mar 24

UK pilot program to test social media restrictions on families before government decides on ban

The U.K.

The Record →

BleepingComputer General Mar 24

Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens

The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have st...

BleepingComputer →

Cyberscoop General Apple GitHub Mar 24

DarkSword’s GitHub leak threatens to turn elite iPhone hacking into a tool for the masses

Cybersecurity researchers say the GitHub leak threatens to "democratize" iPhone exploits that were once reserved for nation-states, potentially putting hundr...

Cyberscoop →

Infosecurity Magazine General Mar 24

RSA Conference: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards

The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make software more secure

Infosecurity Magazine →

The Record General Mar 24

Vibe coding could reshape SaaS industry and add security risks, warns UK cyber agency

Britain’s National Cyber Security Centre warned that a rise in so-called “vibe coding” could reshape the software-as-a-service industry while introducing new...

The Record →

BleepingComputer General Mar 24

FCC bans new routers made outside the USA over security risks

The Federal Communications Commission has updated its Covered List to include all consumer routers made in foreign countries, banning the sale of new models ...

BleepingComputer →

SecurityWeek General Mar 24

DoE Publishes 5-Year Energy Security Plan

CESER’s Project Armor is a five year initiative to harden the US critical energy infrastructure, including strengthening energy systems ‘to prevent and recov...

SecurityWeek →

HackRead General Mar 24

All AI and Security Teams Need Transparent Data Pipelines

Transparent AI data pipelines help organizations verify sources, reduce errors, meet regulations, and build trust by making outputs auditable and reliable.

HackRead →

SecurityWeek General Mar 24

Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw

Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, The post Why Agentic AI Systems Need...

SecurityWeek →

The Record General Mar 24

‘Your Data Will Be Used Against You’: Author of new book on the dangers of a surveillance society

The author of a new book on surveillance discusses how an upcoming Supreme Court case could limit what data police can dig up showing individuals’ locations.

The Record →

Cyberscoop General Mar 24

Experts warn of a ‘loud and aggressive’ extortion wave following Trivy hack

Attackers compromised the open-source security tool and published malicious versions of the software. Mandiant warns the fallout could impact up to 10,000 do...

Cyberscoop →

« Prev 1 ... 39 40 41 42 43 ... 64 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA