FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Recorded Future General Dec 10

Implications of Russia-India-China Trilateral Cooperation

Examines Russia-India-China trilateral cooperation, U.S.

Recorded Future →

Google Security Blog General Google Dec 9

Further Hardening Android GPUs

Posted by Liz Prucka, Hamzeh Zawawy, Rishika Hooda, Android Security and Privacy Team Last year, Google's Android Red Team partnered with Arm to conduct an i...

Google Security Blog →

WeLiveSecurity General Dec 9

The big catch: How whaling attacks target top executives

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.

WeLiveSecurity →

Recorded Future General Dec 9

GrayBravo’s CastleLoader Activity Clusters Target Multiple Industries

Recorded Future →

Recorded Future General Amazon Fortinet Dec 9

November 2025 CVE Landscape: 10 Critical Vulnerabilities Show 69% Drop from October

November 2025 CVE landscape: 10 exploited critical vulnerabilities, a 69% drop from October, and why Fortinet and Samsung flaws need urgent patching.

Recorded Future →

Google Security Blog General Google Dec 8

Architecting Security for Agentic Capabilities in Chrome

Posted by Nathan Parker, Chrome security team Chrome has been advancing the web’s security for well over 15 years, and we’re committed to meeting new challen...

Google Security Blog →

Recorded Future General Intel Dec 8

When the Digital World Turns Physical: The Expanding Role of Threat Intelligence in Executive Protection

Discover how converged threat intelligence protects executives from deepfakes, doxxing, and cyber-enabled physical threats with Recorded Future.

Recorded Future →

Exploit Database General Dec 8

[webapps] Pluck 4.7.7-dev2 - PHP Code Execution

Pluck 4.7.

Exploit Database →

Recorded Future General Oracle Dec 5

The Bug That Won't Die: 10 Years of the Same Mistake

Explore a decade of deserialization vulnerabilities, from Java to React/Next.js CVEs, and learn how to harden apps and stay ahead with Recorded Future.

Recorded Future →

Recorded Future General Intel Dec 5

The Hidden Cascade: Why Law Firm Breaches Destroy More than Data

Discover how law firm breaches expose decades of M&A intelligence, client data, and privileged strategy—and how to reduce cascading vendor risk before it hits.

Recorded Future →

Google Security Blog General Google Dec 3

Android expands pilot for in-call scam protection for financial apps

Posted by Aden Haussmann, Associate Product Manager and Sumeet Sharma, Play Partnerships Trust & Safety Lead Android uses the best of Google AI and our advan...

Google Security Blog →

Recorded Future General Intel Dec 3

The Maturity Gap: The Next Frontier in Threat Intelligence

Learn what advanced threat intelligence maturity really means and how to close the gap between current capabilities and predictive, autonomous operations.

Recorded Future →

Exploit Database General Dec 3

[webapps] phpMyFAQ 2.9.8 - Cross-Site Request Forgery(CSRF)

phpMyFAQ 2.9.

Exploit Database →

Exploit Database General Dec 3

[webapps] phpMyFAQ 2.9.8 - Cross-Site Request Forgery (CSRF)

phpMyFAQ 2.9.

Exploit Database →

Exploit Database General Dec 3

[webapps] phpMyFaq 2.9.8 - Cross Site Request Forgery (CSRF)

phpMyFaq 2.9.

Exploit Database →

Exploit Database General Dec 3

[webapps] phpIPAM 1.4 - SQL-Injection

phpIPAM 1.

Exploit Database →

Exploit Database General Dec 3

[webapps] OpenRepeater 2.1 - OS Command Injection

OpenRepeater 2.

T1059

Exploit Database →

Exploit Database General Dec 3

[webapps] PluckCMS 4.7.10 - Unrestricted File Upload

PluckCMS 4.7.

Exploit Database →

Trail of Bits General Dec 2

Introducing constant-time support for LLVM to protect cryptographic code

Trail of Bits has developed constant-time coding support for LLVM, providing developers with compiler-level guarantees that their cryptographic implementatio...

Trail of Bits →

Recorded Future General Dec 2

Inside the CopyCop Playbook: How to Fight Back in the Age of Synthetic Media

Uncover how Russia’s CopyCop network uses AI-generated news and fake media sites to influence global audiences—and learn the key defenses against synthetic m...

Recorded Future →

« Prev 1 ... 58 59 60 61 62 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA