FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Check Point Research General Check Point Intel Mar 2

2nd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resor...

Check Point Research →

Infosecurity Magazine General Google Mar 2

Chrome Unveils Plan For Quantum-Safe HTTPS Certificates

Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS

Infosecurity Magazine →

AWS Security Blog General Amazon Mar 2

Understanding IAM for Managed AWS MCP Servers

As AI agents become part of your development workflows on Amazon Web Services (AWS), you want them to work with your existing AWS Identity and Access Managem...

T1598

AWS Security Blog →

Infosecurity Magazine General Mar 2

Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity

Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms

Infosecurity Magazine →

Palo Alto Networks General Palo Alto Networks Mar 2

Why Service Providers Must Become Secure AI Factories

Discover AI factories – the next evolution in data centers powering AI models. Understand their role, challenges and deployment best practices for 2026.

T1598

Palo Alto Networks →

SentinelOne Blog General Microsoft SentinelOne Intel Feb 28

SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

Iran-linked cyber activity may surge after strikes, targeting US and Israeli sectors; SentinelOne provides intel and urges vigilance.

SentinelOne Blog →

WeLiveSecurity General Feb 28

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools

WeLiveSecurity →

Google Security Blog General Google Feb 27

Cultivating a robust and efficient quantum-safe HTTPS

Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against quantum computers. T...

Google Security Blog →

WeLiveSecurity General Feb 27

Mobile app permissions (still) matter more than you may think

Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.

WeLiveSecurity →

Elastic Security Labs General Feb 27

Manage your Elastic security stack as code with the Elastic Stack Terraform provider

From detection rules to AI connectors - the latest Terraform provider releases bring security, observability, and ML capabilities to your infrastructure-as-c...

Elastic Security Labs →

Elastic Security Labs General Feb 27

Why 2026 is the Year to Upgrade to an Agentic AI SOC

Agentic AI SOCs differ from copilot-only models by autonomously prioritizing attacks over alerts, executing closed-loop containment, and providing traceable ...

Elastic Security Labs →

AWS Security Blog General Amazon Intel Feb 26

AWS successfully completed its first surveillance audit for ISO 42001:2023 with no findings

In November 2024, Amazon Web Services (AWS) was the first major cloud service provider to announce the ISO/IEC 42001 accredited certification for AI services...

AWS Security Blog →

AWS Security Blog General Amazon Feb 26

Inside AWS Security Agent: A multi-agent architecture for automated penetration testing

AI agents have traditionally faced three core limitations: they can’t retain learned information or operate autonomously beyond short periods, and they requi...

AWS Security Blog →

Graham Cluley General Feb 26

Your staff are your biggest security risk: AI is making it worse

A new report claims that the cost of insider security incidents has surged 20% in two years, reaching an average of US $19.5 million per organization annuall...

Graham Cluley →

Infosecurity Magazine General Feb 26

Exploitable Vulnerabilities Present in 87% of Organizations

Datadog report reveals two-fifths of services are affected by exploitable bugs

Infosecurity Magazine →

Infosecurity Magazine General Feb 26

UK's Data Watchdog Gets a Makeover to Match Growing Demands

The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up

Infosecurity Magazine →

Google Project Zero General Feb 26

A Deep Dive into the GetProcessHandleFromHwnd API

In my previous blog post I mentioned the GetProcessHandleFromHwnd API. This was an API I didn’t know existed until I found a publicly disclosed UAC bypass us...

T1548

Google Project Zero →

Recorded Future General Intel Feb 26

Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA

Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data...

Recorded Future →

Palo Alto Networks General Palo Alto Networks Feb 25

The SOC Is Now Agentic — Introducing the Next Evolution of Cortex

Agentic AI security is here. See how AI-powered agents, XDL 2.

Palo Alto Networks →

Google Security Blog General Google Feb 25

Staying One Step Ahead: Strengthening Android’s Lead in Scam Protection

Posted by Lyubov Farafonova, Product Manager, Phone by Google; Alberto Pastor Nieto, Sr. Product Manager Google Messages and RCS Spam and Abuse shared how An...

Google Security Blog →

« Prev 1 ... 50 51 52 53 54 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA