FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Transportation

20 articles

Wordfence Blog Vulnerability Disclosure Intel WordPress Feb 19

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 9, 2026 to February 15, 2026)

Last week, there were 174 vulnerabilities disclosed in 139 WordPress Plugins and 28 WordPress Themes that have been added to the Wordfence Intelligence Vulne...

Wordfence Blog →

Graham Cluley General Feb 19

Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch

Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech soverei...

T1598

Graham Cluley →

Infosecurity Magazine Ransomware Feb 18

Record Number of Ransomware Victims and Groups in 2025

Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025

Infosecurity Magazine →

Recorded Future Campaigns WordPress Feb 18

GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack

GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures t...

Recorded Future →

Infosecurity Magazine General Feb 17

Over-Privileged AI Drives 4.5 Times Higher Incident Rates

Teleport study reveals that organizations running over-privileged AI have a 76% incident rate

Infosecurity Magazine →

Wordfence Blog Vulnerability Disclosure Intel WordPress Feb 12

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 2, 2026 to February 8, 2026)

📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $31,200 per vulnera...

Wordfence Blog →

Mandiant Blog Campaigns Google Intel Feb 12

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use

Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (A...

T1204 T1592

Mandiant Blog →

Infosecurity Magazine General Feb 12

AI Skills Represent Dangerous New Attack Surface, Says TrendAI

New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts

Infosecurity Magazine →

Recorded Future Ransomware Intel Feb 12

State of Security Report | Recorded Future

Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored oper...

Recorded Future →

Krebs on Security Malware Feb 11

Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentraliz...

Krebs on Security →

Infosecurity Magazine Ransomware Jan 29

Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups

Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report

Infosecurity Magazine →

Infosecurity Magazine Phishing Okta Jan 26

Okta Flags Customized, Reactive Vishing Attacks Which Bypass MFA

Threat actors posing as IT support teams use phishing kits to generate fake login sites in real-time to trick victims into handing over credentials

T1566

Infosecurity Magazine →

Google Project Zero General Microsoft Jan 26

Bypassing Windows Administrator Protection

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

Google Project Zero →

Infosecurity Magazine General Jan 21

Report Fraud Promises to Streamline Fight Against Economic Crime

City of London Police has launched the UK’s national Report Fraud service

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'

Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report

Infosecurity Magazine →

Infosecurity Magazine General Jan 16

Account Compromise Surged 389% in 2025, Says eSentire

An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025

T1078

Infosecurity Magazine →

Google Project Zero Vulnerability Disclosure Google Jan 14

A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?

While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our e...

T1598

Google Project Zero →

WeLiveSecurity General Dec 16

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

WeLiveSecurity →

Exploit Database Vulnerability Disclosure Dec 16

[webapps] Summar Employee Portal 3.98.0 - Authenticated SQL Injection

Summar Employee Portal 3.98.

Exploit Database →

Mandiant Blog CVE Google Intel Dec 12

Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)

Written by: Aragorn Tseng, Robert Weiner, Casey Charrier, Zander Work, Genevieve Stark, Austin Larsen Introduction On Dec. 3, 2025, a critical unauthenticate...

T1190 1 IOC

Mandiant Blog →

« Prev 1 ... 12 13 14 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA