FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Transportation

20 articles

SC Media General 3d ago

Niobium unveils encrypted cloud platform for private AI

Security Brief Australia reports that Niobium has launched The Fog, an encrypted cloud platform for private AI and data processing now available in private b...

SC Media →

Cyberscoop General 3d ago

Cybercrime losses jumped 26% to $20.9 billion in 2025

The FBI’s annual report on digital crimes exposes a worsening environment. Yet, an unknown number of victims still suffer in the shadows never reporting the ...

Cyberscoop →

HackRead General 3d ago

AI Agents and Non-Human Identities Creating Critical Security Gaps, Report

New research from Keeper Security, reveals non-human identities and automated system-to-system interactions are becoming the top security risk for businesses...

T1598

HackRead →

Help Net Security Campaigns Microsoft 3d ago

AI-enabled device code phishing campaign exploits OAuth flow for account takeover

A phishing campaign that bypasses the standard 15-minute expiration window through automation and dynamic code generation, leveraging the OAuth Device Code A...

T1566

Help Net Security →

The Hacker News Data Breach IBM 3d ago

The Hidden Cost of Recurring Credential Incidents

When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the ...

The Hacker News →

Infosecurity Magazine Ransomware Microsoft Amazon 3d ago

Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks

Microsoft has released a new report about the Storm-1175 group and its connection to Medusa ransomware

Infosecurity Magazine →

Schneier on Security General 3d ago

Hong Kong Police Can Force You to Reveal Your Encryption Keys

According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you ar...

Schneier on Security →

Help Net Security General GitHub 3d ago

GitHub Copilot CLI gets a second-opinion feature built on cross-model review

Coding agents make decisions in sequence: a plan is drafted, implemented, then tested. Any error introduced early compounds as subsequent steps build on the ...

Help Net Security →

CSO Online General 3d ago

The noisy tenants: Engineering fairness in multi-tenant SIEM solutions

I recently had the opportunity to review five popular SIEM solutions as part of a judging panel for a Security award. While each platform had its own unique ...

CSO Online →

Information Security Buzz General 3d ago

The Quiet Revolt: What the World Happiness Report 2026 Tells Security Professionals

Something the World Happiness Report 2026 reveals deserves more attention than it has received outside wellbeing circles. In Western Europe and English-speak...

Information Security Buzz →

Security Affairs Data Breach Microsoft 3d ago

Experts published unpatched Windows zero-day BlueHammer

A researcher leaked the unpatched Windows zero-day “BlueHammer,” letting attackers gain SYSTEM rights; no patch exists yet. A disgruntled researcher released...

T1548

Security Affairs →

Information Security Buzz Data Breach 3d ago

Telehealth company Hims & Hers discloses data breach

Hims & Hers, a telehealth company, has disclosed a data breach involving its third-party customer support ticketing system after hackers gained access betwee...

T1598

Information Security Buzz →

Help Net Security Phishing Microsoft Google Mimecast 3d ago

How Mimecast brings enterprise-grade email protection to API deployment

In this Help Net Security video, Andrew Williams, Senior Product Manager at Mimecast, walks through the company’s API-based email security protection for Mic...

T1566 T1598

Help Net Security →

SC Media Data Breach 4d ago

Thousands of European tourist sites impacted by ticketing platform breach

Nearly 3,500 museums, monuments, and cultural sites across Europe had their online reservations disrupted following a cyberattack against online ticketing pl...

SC Media →

SC Media Data Breach Adobe 4d ago

Alleged Adobe helpdesk system breach reported

Cybernews reports that Adobe was noted by International Cyber Digest analysts to have had 13 million support tickets with personal information and 15,000 emp...

SC Media →

SC Media Data Breach 4d ago

Data breach notice clarified by T-Mobile

T-Mobile has explained that only a single account had been compromised in a recent insider breach amid uncertainty that the '1' individual noted to be affect...

SC Media →

SC Media General NVIDIA 4d ago

Total takeover of Nvidia GPU-based devices possible with novel Rowhammer attacks

Machines running high-performance Nvidia GPU cards, which are prevalent in cloud environments, could be completely hijacked through three new Rowhammer intru...

SC Media →

SC Media Phishing 4d ago

Upswell of device code phishing intrusions reported

BleepingComputer reports that device code phishing intrusions have increased by 37.5 times so far this year.

T1566

SC Media →

SC Media General 4d ago

Evolving Russian cyberattacks against Ukraine detailed

Attacks launched by Russian threat actors against Ukraine were noted by Ukraine's Computer Emergency Response Team to have been evolving during the past year...

SC Media →

BleepingComputer Zero-Day Microsoft 4d ago

Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit

Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing attackers to gain SYSTEM or eleva...

T1548

BleepingComputer →

« Prev 1 2 3 4 5 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA