FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General Amazon IBM Feb 25

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws

Infosecurity Magazine →

SentinelOne Blog General SentinelOne Feb 25

From Access to Execution: Securing Identity in the Age of Autonomous Agents

SentinelOne secures human and non-human identities with continuous behavioral validation across AI, browsers, and endpoints.

SentinelOne Blog →

Infosecurity Magazine General Feb 25

Malicious NuGet Package Targets Stripe Developers

Malicious NuGet package mimicking Stripe's library targeted developers

Infosecurity Magazine →

Trail of Bits General Linux Feb 25

mquire: Linux memory forensics without external dependencies

If you’ve ever done Linux memory forensics, you know the frustration: without debug symbols that match the exact kernel version, you’re stuck. These symbols ...

T1598

Trail of Bits →

Infosecurity Magazine General Feb 25

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

A former general manager of a US defense contractor has been sentenced after selling zero days to Russia

Infosecurity Magazine →

Infosecurity Magazine General Feb 25

ICO’s £14m Reddit Fine Highlights Age Check Privacy Concerns

The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully

Infosecurity Magazine →

Graham Cluley General Amazon Feb 25

$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon

Amid a privacy backlash, a US $10,000 reward has been offered for anyone who can find a way to run Ring doorbell cameras locally, cutting off the flow of vid...

Graham Cluley →

Elastic Security Labs General Feb 25

Make The Most of Network Firewall Logs with Elastic Security

Make the most of your firewall logs. In Part 1 of our series, learn how to ingest and parse logs from any firewall with Elastic Agent and use the Network Pag...

Elastic Security Labs →

Infosecurity Magazine General Feb 24

Cost of Insider Incidents Surges 20% to Nearly $20m

DTEX claims insider incidents cost $19.

Infosecurity Magazine →

Palo Alto Networks General Palo Alto Networks ServiceNow Feb 24

A Joint Vision for Simplified SASE Management at Scale

Unlock simplified SASE management at scale. The Prisma SASE app on ServiceNow unifies security, automates deployment, and accelerates time to value.

Palo Alto Networks →

Infosecurity Magazine General Feb 24

AI Accelerates Attacker Breakout Time to Just Four Minutes

ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes

T1041

Infosecurity Magazine →

Infosecurity Magazine General Feb 24

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities

Infosecurity Magazine →

Infosecurity Magazine General CrowdStrike Feb 24

AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike

CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective

Infosecurity Magazine →

Elastic Security Labs General Intel Feb 24

Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Learn how Elastic's ES|QL COMPLETION command brings LLM reasoning directly into detection rules, enabling detection engineers to build intelligent alert tria...

Elastic Security Labs →

Check Point Research General Check Point Feb 23

2025: The Untold Stories of Check Point Research

Introduction Check Point Research (CPR) continuously tracks threats, following the clues that lead to major players and incidents in the threat landscape. Wh...

Check Point Research →

Infosecurity Magazine General Feb 23

Jackpotting Surge Costs Banks Over $20m, Warns FBI

A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone

Infosecurity Magazine →

WeLiveSecurity General Feb 23

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no.

WeLiveSecurity →

Graham Cluley General Feb 20

Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent

Spain's police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to €1,000 a night for ju...

Graham Cluley →

Elastic Security Labs General Linux Feb 20

The Immutable Illusion: Pwning Your Kernel with Cloud Files

Threat actors can abuse a class of vulnerabilities to bypass security restrictions and break trust chains.

Elastic Security Labs →

Google Security Blog General Google Feb 19

Keeping Google Play & Android app ecosystems safe in 2025

Posted by Vijaya Kaza, VP and GM, App & Ecosystem Trust Upgrading Google Play’s AI-powered, multi-layered user protections we prevented over 1.75 million pol...

Google Security Blog →

« Prev 1 ... 51 52 53 54 55 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA