FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Cloudflare Blog General Cloudflare Mar 5

Ending the "silent drop": how Dynamic Path MTU Discovery makes the Cloudflare One Client more resilient

The Cloudflare One Client now features the ability to actively probe and adjust packet sizes. This update eliminates the problems caused by tunnel layering a...

Cloudflare Blog →

Infosecurity Magazine General Amazon Cisco Mar 5

Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products

Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws

Infosecurity Magazine →

WeLiveSecurity General Mar 5

How SMBs use threat research and MDR to build a defensive edge

We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most pract...

WeLiveSecurity →

Google Project Zero General Mar 5

On the Effectiveness of Mutational Grammar Fuzzing

Mutational grammar fuzzing is a fuzzing technique in which the fuzzer uses a predefined grammar that describes the structure of the samples. When a sample ge...

Google Project Zero →

Cloudflare Blog General Mar 5

How Automatic Return Routing solves IP overlap

Automatic Return Routing (ARR) solves the common enterprise challenge of overlapping private IP addresses by using stateful flow tracking instead of traditio...

Cloudflare Blog →

Cloudflare Blog General Cloudflare Mar 5

A QUICker SASE client: re-building Proxy Mode

By transitioning the Cloudflare One Client to use QUIC streams for Proxy Mode, we eliminated the overhead of user-space TCP stacks, resulting in a 2x increas...

Cloudflare Blog →

AWS Security Blog General Amazon Mar 5

2025 ISO and CSA STAR certificates are now available with one additional service and one new region

Amazon Web Services (AWS) successfully completed the annual recertification audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 277...

AWS Security Blog →

AWS Security Blog General Amazon Mar 4

Enhanced access denied error messages with policy ARNs

To help you troubleshoot access denied errors, we recently added the Amazon Resource Name (ARN) of the denying policy to access denied error messages. This b...

AWS Security Blog →

Infosecurity Magazine General Mar 4

Coalition of Western Countries Launches 6G Cybersecurity Guidelines

A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards

Infosecurity Magazine →

Infosecurity Magazine General Mar 4

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict

Infosecurity Magazine →

WeLiveSecurity General Mar 4

Protecting education: How MDR can tip the balance in favor of schools

The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning...

WeLiveSecurity →

Check Point Research General Mar 4

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Key Findings Introduction As highlighted in the Cyber Security Report 2026, cyber operations have increasingly become an additional tool in interstate confli...

T1598

Check Point Research →

AWS Security Blog General Amazon Mar 3

2025 FINMA ISAE 3000 Type II attestation report available with 183 services in scope

Amazon Web Services (AWS) is pleased to announce the issuance of the Swiss Financial Market Supervisory Authority (FINMA) Type II attestation report with 183...

AWS Security Blog →

AWS Security Blog General Amazon Mar 3

2025 PiTuKri ISAE 3000 Type II attestation report available with 183 services in scope

Amazon Web Services (AWS) is pleased to announce the issuance of the Criteria to Assess the Information Security of Cloud Services (PiTuKri) Type II attestat...

AWS Security Blog →

Graham Cluley General Mar 3

They seized $4.8m in crypto… then gave the master key to the internet

South Korea's National Tax Service (NTS) has found itself in the middle of a deeply embarrassing - and costly - blunder after accidentally handing thieves th...

Graham Cluley →

Infosecurity Magazine General Cloudflare Mar 3

AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare

Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale

Infosecurity Magazine →

Infosecurity Magazine General Mar 3

Half of US CISOs Work the Equivalent of a Six-Day Week

Seemplicity finds US security leaders work 11 or more extra hours per week

Infosecurity Magazine →

Exploit Database General WordPress Mar 3

[webapps] WordPress Backup Migration 1.3.7 - Remote Command Execution

WordPress Backup Migration 1.3.

Exploit Database →

Exploit Database General Mar 3

[webapps] mailcow 2025-01a - Host Header Password Reset Poisoning

mailcow 2025-01a - Host Header Password Reset Poisoning

Exploit Database →

Exploit Database General Mar 3

[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)

Boss Mini v1.4.

Exploit Database →

« Prev 1 ... 49 50 51 52 53 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA