FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Exploit Database General Feb 4

[webapps] OctoPrint 1.11.2 - File Upload

OctoPrint 1.11.

Exploit Database →

Exploit Database General Feb 4

[webapps] aiohttp 3.9.1 - directory traversal PoC

aiohttp 3.9.

Exploit Database →

Exploit Database General Docker Feb 4

[local] Docker Desktop 4.44.3 - Unauthenticated API Exposure

Docker Desktop 4.44.

Exploit Database →

Infosecurity Magazine General Feb 3

Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw

A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project

Infosecurity Magazine →

Infosecurity Magazine General Feb 3

UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery

UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform

Infosecurity Magazine →

Infosecurity Magazine General Feb 3

Cybercrime Unit of Paris Prosecutors Raid Elon Musk’s X Offices in France

Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026

Infosecurity Magazine →

Infosecurity Magazine General Feb 3

Vibe-Coded Moltbook Exposes User Data, API Keys and More

Wiz Security claims Moltbook misconfiguration allowed full read and write access

Infosecurity Magazine →

Krebs on Security General Feb 2

Please Don’t Feed the Scattered Lapsus ShinyHunters

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim fir...

Krebs on Security →

Infosecurity Magazine General Feb 2

NSA Publishes New Zero Trust Implementation Guidelines

NSA released new guidelines to help organizations achieve target-level Zero Trust maturity

Infosecurity Magazine →

WeLiveSecurity General Feb 2

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.

WeLiveSecurity →

Infosecurity Magazine General Google Feb 2

Former Google Engineer Found Guilty of Stealing AI Secrets

Linwei Ding, a former Google engineer, has been found guilty of stealing trade secrets for China

Infosecurity Magazine →

Recorded Future General Feb 1

Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future

This article explores how Recorded Future served as Customer Zero for Autonomous Threat Operations, testing the new solution within our own SOC to validate i...

Recorded Future →

AWS Security Blog General Microsoft Amazon Jan 30

Explore scaling options for AWS Directory Service for Microsoft Active Directory

You can use AWS Directory Service for Microsoft Active Directory as your primary Active Directory Forest for hosting your users’ identities. Your IT teams ca...

AWS Security Blog →

WeLiveSecurity General Jan 30

This month in security with Tony Anscombe – January 2026 edition

The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year

WeLiveSecurity →

Trail of Bits General Jan 30

Celebrating our 2025 open-source contributions

Last year, our engineers submitted over 375 pull requests that were merged into non–Trail of Bits repositories, touching more than 90 projects from cryptogra...

Trail of Bits →

Infosecurity Magazine General Jan 30

National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat

Cyber fraudsters targeting corporate finance departments costs businesses millions a year

Infosecurity Magazine →

WeLiveSecurity General Jan 30

DynoWiper update: Technical analysis and attribution

ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector

WeLiveSecurity →

AWS Security Blog General Amazon Jan 29

How to get started with security response automation on AWS

December 2, 2019: Original publication date of this post. At AWS, we encourage you to use automation.

AWS Security Blog →

Infosecurity Magazine General Google Jan 29

Google Disrupts Extensive Residential Proxy Networks

Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations

Infosecurity Magazine →

Infosecurity Magazine General Jan 29

US Data Breaches Hit Record High but Victim Numbers Decline

Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025

Infosecurity Magazine →

« Prev 1 ... 54 55 56 57 58 ... 64 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA