FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General 2d ago

Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities

Anthropic launches Project Glasswing, using its Claude Mythos Preview AI to autonomously identify and fix undiscovered vulnerabilities in critical software

Infosecurity Magazine →

The Hacker News General Intel 2d ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly frag...

T1598

The Hacker News →

Security Affairs General 2d ago

Project Glasswing powered by Claude Mythos: defending software before hackers do

Anthropic unveiled Claude Mythos, a powerful AI for cybersecurity that could also be misused to enhance cyberattacks. Anthropic has unveiled Claude Mythos, a...

Security Affairs →

CSO Online General 2d ago

LLM-generated passwords are indefensible. Your codebase may already prove it

Two independent research programs, one from AI security firm Irregular, one from Kaspersky, have now converged on the same conclusion: Every frontier LLM gen...

CSO Online →

SC Media General Docker 2d ago

Docker fixes AuthZ bypass bug that created containers with excessive privileges

A crafted HTTP request can make restricted containers invisible to AuthZ plugins.

SC Media →

GBHackers General Amazon IBM 2d ago

IBM Security Verify Access Flaws Let Remote Attackers Access Sensitive Data

IBM has issued an urgent security bulletin addressing a slew of vulnerabilities impacting IBM Verify Identity Access and IBM Security Verify Access. These fl...

T1041

GBHackers →

CSO Online General Microsoft 2d ago

Microsoft’s new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft has quietly introduced the Agent Governance Toolkit, an open-source project designed to monitor and control AI agents during execution as enterpris...

CSO Online →

CSO Online General 2d ago

The tabletop exercise grows up

In the early 1800s, Prussian officers began rehearsing battles around sand tables. They called it Kriegsspiel, and it worked because it forced them to make h...

T1598

CSO Online →

SC Media General 2d ago

Zero Trust Readiness and Two RSAC 2026 Interviews from Fenix24 and Absolute Security - John Bruggeman, John Anthony Smith, Christy Wyatt - BSW #442

SC Media →

Help Net Security General 2d ago

Secureframe expands Comply with User Access Reviews for automated governance

Secureframe has announced the launch of User Access Reviews, a new capability within Secureframe Comply. Access reviews are the primary mechanism organizatio...

Help Net Security →

Infosecurity Magazine General 2d ago

Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets

CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms

Infosecurity Magazine →

BleepingComputer General Microsoft 2d ago

Microsoft rolls out fix for broken Windows Start Menu search

Microsoft has pushed a server-side fix for a known issue that broke the Windows Start Menu search feature on some Windows 11 23H2 devices. [.

BleepingComputer →

GBHackers General 2d ago

Fiber Optic Cables Turned Into Hidden Microphones to Spy on Private Conversations

Internet users worldwide rely on fiber optic cables for blazing-fast and secure web connections. However, a groundbreaking discovery reveals that these very ...

GBHackers →

CSO Online General 2d ago

Tipps für CISOs, die die Branche wechseln wollen

Tipps für CISOs mit “Vertical-Switch-Ambitionen”. FotoDax | shutterstock.

1 IOC

CSO Online →

SANS ISC General 3d ago

ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)

1 IOC

SANS ISC →

Exploit Database General 3d ago

[local] SQLite 3.50.1 - Heap Overflow

SQLite 3.50.

Exploit Database →

Exploit Database General Microsoft 3d ago

[local] Microsoft MMC MSC EvilTwin - Local Admin Creation

Microsoft MMC MSC EvilTwin - Local Admin Creation

Exploit Database →

Exploit Database General 3d ago

[local] 7-Zip 24.00 - Directory Traversal

7-Zip 24.

Exploit Database →

Cyberscoop General Microsoft 3d ago

Feds quash widespread Russia-backed espionage network spanning 18,000 devices

Forest Blizzard, a threat group attributed to Russia’s GRU, hijacked network traffic to steal credentials and tokens for Microsoft accounts and other service...

Cyberscoop →

Unit 42 General Amazon 3d ago

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore's sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in the ...

T1572

Unit 42 →

« Prev 1 ... 6 7 8 9 10 ... 66 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA