FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Media

20 articles

SC Media General NEW 2h ago

Apiiro launches CLI to integrate application security into AI development workflows

Apiiro argues that current security workflows are reactive, relying on scanning and remediation after code is written, a model unsustainable with AI's speed.

SC Media →

CSO Online CVE Docker NEW 3h ago

Old Docker authorization bypass pops up despite previous patch

Researchers warn about a new vulnerability that allows attackers to bypass authorization plug-ins in Docker Engine and gain root-level access to host systems...

1 IOC

CSO Online →

Qualys Blog Vulnerability Disclosure Qualys NEW 4h ago

The Mythos Inflection Point: Dealing With the Upcoming Vulnerability Disclosure Avalanche and Compressed Exploitation Window

Having spent years at Qualys working on vulnerability risk and remediation management, I have watched the disclosure and remediation cycles from every angle....

Qualys Blog →

BleepingComputer General Amazon Qualys 8h ago

Analysis of one billion CISA KEV remediation records exposes limits of human-scale security

Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before de...

BleepingComputer →

The Record General 1d ago

Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine

In a statement to state-owned media, the FSB said the suspect joined a Telegram channel controlled by the Security Service of Ukraine (SBU) and passed inform...

The Record →

Help Net Security Data Breach 1d ago

113,000 explicit prompts from AI girlfriend platform exposed, many linked to user IDs

MyLovely.AI, an AI girlfriend platform, suffered a data breach that exposed over 100,000 users.

Help Net Security →

Help Net Security General 1d ago

OPSWAT adds predictive AI engine to MetaDefender for pre-execution threat detection

OPSWAT has announced OPSWAT Predictive Alin AI, its first proprietary AI-based threat detection engine for the MetaDefender Platform. This AI-based innovatio...

Help Net Security →

GBHackers CVE Cisco 1d ago

Technical Details Released for Critical Cisco SSM Command Execution Vulnerability

Security researchers have published technical details regarding a highly critical vulnerability in the Cisco Smart Software Manager On-Prem (SSM On-Prem). Tr...

1 IOC

GBHackers →

Help Net Security Vulnerability Disclosure Apple 1d ago

Advenica’s File Scanner Kiosk scans USB media for malware

Advenica announced the File Scanner Kiosk, a system that scans USB media for malware and helps businesses reduce infection risk. With the reliance on externa...

Help Net Security →

GBHackers Campaigns 1d ago

Silver Fox Campaign Spreads ValleyRAT via Fake Chinese Telegram Language Pack

New analysis of a fake Telegram installer uploaded to MalwareBazaar shows Silver Fox expanding its ValleyRAT operations with a fresh delivery chain that hide...

GBHackers →

GBHackers Advisory GitLab 1d ago

GitLab Addresses Multiple Vulnerabilities Linked to DoS and Code Injection

GitLab has rolled out a crucial security update to fix multiple vulnerabilities across its Community Edition (CE) and Enterprise Edition (EE) platforms. Orga...

1 IOC

GBHackers →

Infosecurity Magazine Vulnerability Disclosure WordPress 2d ago

Critical Vulnerability in Ninja Forms Exposes WordPress Sites

Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.

Infosecurity Magazine →

GBHackers General Amazon IBM 2d ago

IBM Security Verify Access Flaws Let Remote Attackers Access Sensitive Data

IBM has issued an urgent security bulletin addressing a slew of vulnerabilities impacting IBM Verify Identity Access and IBM Security Verify Access. These fl...

T1041

GBHackers →

GBHackers CVE Amazon 2d ago

Multiple OpenSSL Flaws Expose Sensitive Data in RSA KEM Handling

A newly disclosed flaw in OpenSSL could allow attackers to access sensitive data stored in application memory. Tracked as CVE-2026-31790, this moderate-sever...

1 IOC

GBHackers →

GBHackers Vulnerability Disclosure Amazon 3d ago

Windmill Developer Platform Flaws Expose Users to RCE Attacks, Proof-of-Concept Published

Cybersecurity researchers have discovered critical vulnerabilities in the Windmill developer platform and Nextcloud Flow, an integration embedding the Windmi...

T1041

GBHackers →

GBHackers CVE WordPress 3d ago

50,000 WordPress Sites Running Ninja Forms Vulnerable to Critical File Upload RCE

A severe security flaw has been discovered in the Ninja Forms File Upload plugin, a widely utilized WordPress add-on that allows website administrators to ac...

1 IOC

GBHackers →

Cyberscoop Zero-Day Fortinet 4d ago

Fortinet customers confront actively exploited zero-day, with a full patch still pending

Two critical defects in FortiClient EMS have been exploited in the past couple weeks. Experts push for users to apply an immediate hotfix.

Cyberscoop →

GBHackers General Google 4d ago

Google Brings Lazy Loading to Media Files in New Chrome Release

Google has announced a significant update for its Chrome browser, extending native lazy loading capabilities to audio and video elements. This highly anticip...

GBHackers →

Help Net Security Zero-Day Fortinet 6d ago

FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)

Defused Cyber has spotted a critical Fortinet FortiClient Endpoint Management Server (EMS) zero-day vulnerability (CVE-2026-35616) being exploited in the wil...

1 IOC

Help Net Security →

SC Media Malware Linux Apr 3

Chaos malware now targeting 64-bit Linux servers

Analysis of China-nexus groups also discovers double-pronged strategy, one on immediacy, the other around long dwell times.

SC Media →

1 2 3 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA