FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Legal

14 articles

The Record General 1d ago

FCC proposes new rule to further crackdown on illegal robocalls

The rule would force originating providers to gather more information from customers before they allow calls, verify the provided data more carefully and be ...

The Record →

CSO Online Campaigns Microsoft 1d ago

Questions raised about how LinkedIn uses the petabytes of data it collects

Through LinkedIn’s more than one billion business users, the Microsoft unit has access to a vast array of personally-identifiable information, including data...

CSO Online →

Help Net Security Ransomware 2d ago

What managing partners should ask AI vendors before signing any contract

In this Help Net Security interview, Kumar Ravi is the Chief Security & Resilience Officer at TMF Group, argues that over-privileged access and weak workflow...

T1598

Help Net Security →

Schneier on Security General 4d ago

New Mexico’s Meta Ruling and Encryption

Mike Masnick points out that the recent New Mexico court ruling against Meta has some bad implications for end-to-end encryption, and security in general: If...

Schneier on Security →

SC Media Phishing 4d ago

Scammers use fake traffic violation texts with QR codes for phishing

This latest scam is a variation of previous toll and parking ticket scams, but instead of links, it features an image of a fake court notice with an embedded...

T1566

SC Media →

Infosecurity Magazine General Mar 31

Employee Data Breaches Surge to Seven-Year High

Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches

Infosecurity Magazine →

Help Net Security General Intel Mar 30

Diligent automates time-consuming steps in third-party reviews

Diligent launched of Third-Party Risk Intel, an agentic due diligence and intelligence solution that automates the most time-consuming steps of third-party r...

Help Net Security →

The Record General Mar 27

Dutch court threatens xAI with fines over Grok's nonconsensual nude images

Grok — which is owned by Elon Musk’s xAI — will be forced to pay damages of €100,000 ($115,000) a day if it does not comply, according to the ruling.

The Record →

The Record General Mar 25

UK cyber chief urges ‘full court press’ to counter rising cyber threats

In a keynote speech at the RSA Conference, National Cyber Security Centre (NCSC) CEO Richard Horne said cyber risks are now “of greater consequence than ever...

The Record →

The Record General Mar 24

‘Your Data Will Be Used Against You’: Author of new book on the dangers of a surveillance society

The author of a new book on surveillance discusses how an upcoming Supreme Court case could limit what data police can dig up showing individuals’ locations.

The Record →

The Hacker News TTPs Mar 20

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

The U.S.

T1498

The Hacker News →

Mandiant Blog General Google Intel Jan 28

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Introduction This week Google and partners took action to disrupt what we believe is one of the largest residential proxy networks in the world, the IPIDEA p...

Mandiant Blog →

Infosecurity Magazine Data Breach Amazon Jan 26

Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline

The US law firm Hagens Berman will lead a class action lawsuit against Coupang over security failures that led to a June 2025 data breach

Infosecurity Magazine →

Recorded Future General Intel Dec 5

The Hidden Cascade: Why Law Firm Breaches Destroy More than Data

Discover how law firm breaches expose decades of M&A intelligence, client data, and privileged strategy—and how to reduce cascading vendor risk before it hits.

Recorded Future →

FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA