FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General Mar 12

Police Scotland Fined After Sharing Victim’s Phone Data

The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker

Infosecurity Magazine →

Cloudflare Blog General Cloudflare Mar 12

Announcing Cloudflare Account Abuse Protection: prevent fraudulent attacks from bots and humans

Blocking bots isn’t enough anymore. Cloudflare’s new fraud prevention capabilities — now available in Early Access — help stop account abuse before it starts.

Cloudflare Blog →

Recorded Future General Mar 12

February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January

February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate reme...

Recorded Future →

Rapid7 Blog General Rapid7 Mar 11

Rapid7 Detection Coverage for Iran-Linked Cyber Activity

The tension arising out of the conflict in Iran is beginning to show signs of expanding beyond a strictly regional crisis.

Rapid7 Blog →

Krebs on Security General Intel Mar 11

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technolog...

T1529

Krebs on Security →

Infosecurity Magazine General Mar 11

Infosecurity Europe Announces 2026 Keynote Line Up

Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and po...

Infosecurity Magazine →

Infosecurity Magazine General Google Amazon Mar 11

Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio

LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data

Infosecurity Magazine →

Infosecurity Magazine General Palo Alto Networks Mar 11

Researchers Discover Major Security Gaps in LLM Guardrails

Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools

Infosecurity Magazine →

Cloudflare Blog General Cloudflare Mar 11

Slashing agent token costs by 98% with RFC 9457-compliant error responses

Cloudflare now returns RFC 9457-compliant structured Markdown and JSON error payloads to AI agents, replacing heavyweight HTML pages with machine-readable in...

Cloudflare Blog →

Cloudflare Blog General Cloudflare Mar 11

AI Security for Apps is now generally available

Cloudflare AI Security for Apps is now generally available, providing a security layer to discover and protect AI-powered applications, regardless of the mod...

Cloudflare Blog →

Infosecurity Magazine General Check Point Mar 11

Cyber-Attacks on UK Firms Increase at Four Times Global Rate

Check Point data shows attack volumes are growing much faster in the UK than worldwide

Infosecurity Magazine →

AWS Security Blog General Amazon Mar 10

AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus seven ISO certifications

In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe entirely located within the E...

AWS Security Blog →

AWS Security Blog General Amazon Cisco Mar 10

Security is a team sport: AWS at RSAC 2026 Conference

The RSAC 2026 Conference brings together thousands of professionals, practitioners, vendors, and associations to discuss issues covering the entire spectrum ...

AWS Security Blog →

Infosecurity Magazine General Mar 10

OpenAI's Promptfoo Deal Plugs Agentic AI Testing Gap

OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity

Infosecurity Magazine →

Check Point Research General Check Point Mar 10

Iranian MOIS Actors & the Cyber Crime Connection

Key Points Iran-linked actors are increasingly engaging with the cyber crime ecosystem. Their activity suggests a growing reliance on criminal tools, service...

Check Point Research →

Rapid7 Blog General Mar 10

Purple Teaming in 2026: From Assumed Protection to Measurable Resilience

What is purple teaming? Purple teaming is often described as the collaboration between red teams and blue teams.

Rapid7 Blog →

Infosecurity Magazine General Mar 10

Only 24% Of organizations Test Identity Recovery Every Six Months

Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said

Infosecurity Magazine →

Graham Cluley General Mar 10

Twitter suspended 800 million accounts last year – so why does manipulation remain so rampant?

Elon Musk's social media site says it suspended 800 million accounts in a year for spam and manipulation - but with state-backed campaigns still flooding the...

Graham Cluley →

AWS Security Blog General Amazon Mar 10

AWS Security Hub is expanding to unify security operations across multicloud environments

After talking with many customers, one thing is clear: the security challenge has not gotten easier. Enterprises today operate across a complex mix of enviro...

AWS Security Blog →

SentinelOne Blog General Amazon Fortinet Mar 10

FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise

FortiGate SSO flaws allows attackers to steal configs, abuse AD creds, deploy RMM tools, and exfiltrate NTDS files.

T1041

SentinelOne Blog →

« Prev 1 ... 47 48 49 50 51 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA