FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Defense

20 articles

Graham Cluley General 3d ago

Life imprisonment for Cambodian scam compound operators – but will it make a difference?

Cambodia has taken a dramatic step in its fight against scam compounds that have imprisoned innocent people, and forced them to work as virtual slaves defrau...

Graham Cluley →

SC Media General 4d ago

1Kosmos achieves DoD Impact Level 4 authorization for identity platform

1Kosmos has secured U.S.

SC Media →

The Record Ransomware 4d ago

German police unmask two suspects linked to REvil ransomware gang

The suspects were named as Daniil Shchukin, a 31-year-old Russian national believed to have used the alias UNKN (UNKNOWN), and Anatoly Kravchuk, a 43-year-ol...

The Record →

BleepingComputer Data Breach 4d ago

Why Simple Breach Monitoring is No Longer Enough

Infostealers are harvesting credentials and session cookies at scale, bypassing traditional defenses. Lunar explains why simple breach monitoring alone can't...

BleepingComputer →

GBHackers Ransomware 4d ago

Alleged REvil Leader ‘UNKN’ Identified by German Authorities in New Takedown Effort

German authorities have officially put a face to one of the most notorious names in cybercrime. The German Federal Criminal Police (BKA) recently identified ...

GBHackers →

GBHackers TTPs Microsoft 4d ago

ResokerRAT Hijacks Telegram API to Command Infected Windows PCs

A newly identified Windows malware dubbed ResokerRAT abuses Telegram’s Bot API as its main command-and-control (C2) channel to remotely monitor and control i...

T1071 T1598

GBHackers →

Help Net Security General 4d ago

Residential proxies make a mockery of IP-based defenses

Attack traffic moved through ordinary home and mobile connections in ways that limited the usefulness of IP reputation on its own. GreyNoise observed 4 billi...

Help Net Security →

Security Affairs TTPs Apr 3

Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies

Iran-linked hackers claim to have breached Israeli air defence contractor PSK Wind, which develops command and control systems. Pro-Iran Handala group announ...

T1071

Security Affairs →

GBHackers Data Breach Apr 3

Qilin Ransomware Deploys Malicious DLL to Disable Most EDR Defenses

The Qilin ransomware group has developed a highly sophisticated infection chain that targets and disables over 300 endpoint detection and response (EDR) solu...

GBHackers →

SC Media Campaigns Apr 2

New Chinese cyberespionage campaigns strike Europe

Chinese state-sponsored threat operation TA416 has reemerged from a two-year hiatus to compromise European governments in a series of cyberespionage campaign...

SC Media →

Schneier on Security Vulnerability Disclosure Apr 2

US Bans All Foreign-Made Consumer Routers

This is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduc...

Schneier on Security →

Rapid7 Blog TTPs Rapid7 Linux Apr 2

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Executive Overview Advanced persistent threats (APTs) are constantly and consistently changing tactics as network defenders plug holes in defenses. Static in...

Rapid7 Blog →

Rapid7 Blog TTPs Rapid7 Linux Apr 2

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Executive Overview Advanced persistent threats (APTs) are constantly and consistently changing tactics as network defenders plug holes in defenses. Static in...

Rapid7 Blog →

GBHackers Data Breach Apr 2

Iranian Hacker Group Handal Claims Breach of Israeli Defense Firm

The international cybersecurity community was alerted to a major data breach involving Israeli military infrastructure. Handala, a recognized Iranian nation-...

GBHackers →

Schneier on Security Data Breach Google Apple Apr 2

Possible US Government iPhone Hacking Tool Leaked

Wired writes (alternate source): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated...

Schneier on Security →

Information Security Buzz General Intel Apr 2

Enterprise AI security: weighing the benefits and risks in 2026

The integration of artificial intelligence into core business systems, better known as enterprise AI, is moving fast, along with the threats around it. Secur...

Information Security Buzz →

GBHackers Campaigns Apr 2

TA416 Broadens Europe Spy Campaign With Web Bugs and Malware

China-aligned threat actor TA416 has resumed large-scale espionage against European governments. It is now expanding to Middle Eastern diplomatic targets, co...

T1592

GBHackers →

GBHackers Phishing Microsoft Apr 2

Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools

Remcos RAT operators are abusing obfuscated scripts and trusted Windows binaries to deliver a stealthy, largely fileless infection chain that runs almost ent...

T1566

GBHackers →

Cyberscoop Campaigns Proofpoint Apr 1

European-Chinese geopolitical issues drive renewed cyberespionage campaign

Proofpoint researchers say the group behind the surge, TA416, had turned away from Europe for a few years. The post European-Chinese geopolitical issues driv...

Cyberscoop →

The Record General Apr 1

Romania under daily barrage of cyberattacks, defense minister says

Romanian government institutions are facing thousands of cyberattack attempts every day targeting a wide range of public institutions, Defense Minister Radu ...

The Record →

« Prev 1 2 3 4 5 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA