FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Schneier on Security General Google Mar 18

Meta’s AI Glasses and Privacy

Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here.

Schneier on Security →

The Hacker News General Mar 18

Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

Security teams today are not short on tools or data. They are overwhelmed by both.

The Hacker News →

Infosecurity Magazine General Mar 18

AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner

Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response

Infosecurity Magazine →

Information Security Buzz General Mar 18

Delegated Trust Is Becoming the Largest Attack Surface in Modern Security

Over the next decade, the way we define security failures is going to change. No longer will it begin with an unpatched server or a careless employee clickin...

T1598

Information Security Buzz →

Information Security Buzz General Akamai Intel Mar 18

Cyberattacks Soar 245% as War Triggers Global Digital Offensive

Since the outbreak of the Middle East conflict on 28 February 2026, Akamai has seen a surge of 245% in cyberattacks against key businesses and institutions i...

Information Security Buzz →

CrowdStrike Blog General CrowdStrike Mar 18

Falcon Platform for Government Now Offers Falcon for XIoT to Secure Connected Assets

CrowdStrike Blog →

AWS Security Blog General Amazon Mar 17

AWS completes the second GDV community audit with participant insurers in Germany

We’re excited to announce that Amazon Web Services (AWS) has completed its second GDV (German Insurance Association) community audit with 36 members from the...

AWS Security Blog →

Infosecurity Magazine General Google Mar 17

Android OS-Level Attack Bypasses Mobile Payment Security

Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass

Infosecurity Magazine →

Infosecurity Magazine General Mar 17

'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution

Infosecurity Magazine →

Qualys Blog General Intel Mar 17

The New Era of Application Security: Reasoning-Based Agents, Runtime Reality, and Risk Intelligence

Key Takeaways Introduction Application security is entering a new phase. It is now an AI problem, an API problem, and a runtime risk problem.

Qualys Blog →

Tenable Blog General Tenable Mar 17

How to prepare for NERC CIP compliance deadlines in 2026 and beyond

Explore key cybersecurity requirements and implementation deadlines for electric power utilities included in the NERC CIP-003-9 standard for Low-Impact BES (...

Tenable Blog →

CISA Advisories General Mar 17

CODESYS in Festo Automation Suite

View CSAF Summary 3. TECHNICAL DETAILS The following versions of CODESYS in Festo Automation Suite are affected: FESTO Software Festo Automation Suite (versi...

3 IOCs

CISA Advisories →

Rapid7 Blog General Rapid7 Mar 17

PACT 2026: A Stronger, Simpler, More Profitable Path for Rapid7 Partners

The cybersecurity channel is evolving fast. Buying behaviors are shifting and customers are rethinking how they evaluate solutions.

Rapid7 Blog →

The Hacker News General Mar 17

AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Finds

A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the challenge, according to the AI and Adversar...

The Hacker News →

Infosecurity Magazine General Akamai Mar 17

Average Number of Daily API Attacks Up 113% Annually

Akamai says 87% of organizations suffered an API-related security incident last year

Infosecurity Magazine →

Infosecurity Magazine General Mar 17

UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch

The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership

Infosecurity Magazine →

Schneier on Security General Mar 17

South Korean Police Accidentally Post Cryptocurrency Wallet Password

An expensive mistake: Someone jumped at the opportunity to steal $4.4 million in crypto assets after South Korea’s National Tax Service exposed publicly the ...

Schneier on Security →

Unit 42 General Mar 17

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Unit 42 research unveils LLM guardrail fragility using genetic algorithm-inspired prompt fuzzing. Discover scalable evasion methods and critical GenAI securi...

Unit 42 →

Information Security Buzz General Mar 17

ShinyHunters Claims It Stole 1PB of Data from TELUS Digital

TELUS Digital has fallen victim to a security incident in which unsanctioned actors accessed its systems. Upon learning of this incident, the company said it...

Information Security Buzz →

Information Security Buzz General Intel Mar 17

Why OSINT deserves the same status as other intelligence disciplines

Open source intelligence (OSINT) still sits outside the intelligence mainstream. If you’re not acquainted with the intelligence profession, you might not hav...

Information Security Buzz →

« Prev 1 ... 45 46 47 48 49 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA