FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General Microsoft Amazon Feb 19

Flaws in Popular Software Development App Extensions Allow Data Exfiltration

Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched

T1041

Infosecurity Magazine →

Infosecurity Magazine General Feb 19

Researchers Reveal Six New OpenClaw Vulnerabilities

Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw

Infosecurity Magazine →

WeLiveSecurity General Feb 19

Is Poshmark safe? How to buy and sell without getting scammed

Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.

WeLiveSecurity →

Graham Cluley General Feb 19

Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch

Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech soverei...

T1598

Graham Cluley →

SentinelOne Blog General SentinelOne Intel Feb 18

OneClaw: Discovery and Observability for the Agentic Era

Prompt Security from SentinelOne turns hidden agent activity into clear, actionable governance intelligence with the release of OneClaw.

SentinelOne Blog →

Trail of Bits General Feb 18

Carelessness versus craftsmanship in cryptography

Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bug...

Trail of Bits →

Graham Cluley General Feb 18

Dutch police arrest man for “hacking” after accidentally sending him confidential files

Police in The Netherlands say they have arrested a 40-year-old man on suspicion of hacking..

Graham Cluley →

SentinelOne Blog General SentinelOne Feb 17

Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users

SentinelOne secures AI from infrastructure to agents, delivering visibility, governance, and control at scale.

SentinelOne Blog →

Infosecurity Magazine General Google Feb 17

Android 17 Beta Introduces Secure-By-Default Architecture

Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development

Infosecurity Magazine →

Infosecurity Magazine General Apple Feb 17

Apple Expands RCS Encryption and Memory Protections in iOS 26.4

iOS 26.

Infosecurity Magazine →

Palo Alto Networks General Palo Alto Networks Feb 17

Securing the Agentic Endpoint

Secure the Agentic Endpoint. Traditional security misses the risk of AI agents.

Palo Alto Networks →

Infosecurity Magazine General Feb 17

Over-Privileged AI Drives 4.5 Times Higher Incident Rates

Teleport study reveals that organizations running over-privileged AI have a 76% incident rate

Infosecurity Magazine →

Palo Alto Networks General Palo Alto Networks Feb 17

Introducing Unit 42 Managed XSIAM 2.0

Unit 42 Managed XSIAM 2.0 delivers a 24/7 managed SOC with continuous detection, investigation, and full-cycle remediation.

Palo Alto Networks →

WeLiveSecurity General Feb 17

Is it OK to let your children post selfies online?

When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.

WeLiveSecurity →

AWS Security Blog General Amazon Intel Feb 16

Building an AI-powered defense-in-depth security architecture for serverless microservices

March 10, 2026: This post has been updated to note that Amazon Q Detector Library describes the detectors used during code reviews to identify security and q...

AWS Security Blog →

Infosecurity Magazine General Feb 16

Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords

Security researchers have challenged end-to-end encryption claims from popular commercial password managers

Infosecurity Magazine →

Infosecurity Magazine General Feb 16

SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns

NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations

Infosecurity Magazine →

Infosecurity Magazine General Feb 16

Crypto Payments to Human Traffickers Surges 85%

Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations

Infosecurity Magazine →

Recorded Future General Intel Feb 16

Network Intelligence: Your Questions, Global Answers

Learn how network intelligence gives security teams control over threat investigation with global visibility—no more drowning in generic, passive threat feeds.

Recorded Future →

Infosecurity Magazine General Feb 13

Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third

G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk

Infosecurity Magazine →

« Prev 1 ... 52 53 54 55 56 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA