FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

CSO Online

20 articles

CSO Online General Docker 2d ago

Yael Nardi joins Minimus as Chief Business Officer to drive hyper-growth

New York, NY: Minimus, a provider of hardened container images and secure container images designed to reduce CVE risk, today announced the appointment of Ya...

CSO Online →

CSO Online Vulnerability Disclosure Oracle 2d ago

Hackers exploit a critical Flowise flaw affecting thousands of AI workflows

Threat actors have found a way to inject arbitrary JavaScript into the Flowise low-code platform for building custom LLM and agentic systems. The code inject...

CSO Online →

CSO Online Operational Technology 2d ago

Iran‑linked PLC attacks cause real‑world disruption at critical US infra sites

As the US and Iran agreed to a ceasefire on Tuesday, six US federal agencies have warned that Iran-affiliated threat actors have compromised internet-exposed...

CSO Online →

CSO Online General 2d ago

LLM-generated passwords are indefensible. Your codebase may already prove it

Two independent research programs, one from AI security firm Irregular, one from Kaspersky, have now converged on the same conclusion: Every frontier LLM gen...

CSO Online →

CSO Online Campaigns Microsoft Intel 2d ago

Forest Blizzard leverages router compromises to launch AiTM attacks, target Outlook sessions

Russian threat actor Forest Blizzard has been exploiting unsecured home and small-office internet equipment, such as routers, to redirect traffic through att...

T1557

CSO Online →

CSO Online Zero-Day 2d ago

The zero-day timeline just collapsed. Here’s what security leaders do next

A zero-day is not frightening because it is sophisticated. It is frightening because it is unknown.

T1598

CSO Online →

CSO Online General Microsoft 2d ago

Microsoft’s new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft has quietly introduced the Agent Governance Toolkit, an open-source project designed to monitor and control AI agents during execution as enterpris...

CSO Online →

CSO Online General 2d ago

The tabletop exercise grows up

In the early 1800s, Prussian officers began rehearsing battles around sand tables. They called it Kriegsspiel, and it worked because it forced them to make h...

T1598

CSO Online →

CSO Online General 2d ago

Tipps für CISOs, die die Branche wechseln wollen

Tipps für CISOs mit “Vertical-Switch-Ambitionen”. FotoDax | shutterstock.

1 IOC

CSO Online →

CSO Online Vulnerability Disclosure Microsoft Google Apple Amazon Linux 3d ago

What Anthropic Glasswing reveals about the future of vulnerability discovery

AI giant Anthropic has unveiled Project Glasswing, a cybersecurity initiative built around Claude Mythos Preview, a model it describes as “cybersecurity in t...

CSO Online →

CSO Online Zero-Day Fortinet 3d ago

Fortinet releases emergency hotfix for FortiClient EMS zero-day flaw

Hackers have been exploiting a critical vulnerability in FortiClient Endpoint Management Server (FortiClient EMS) since at least the end of March. Fortinet h...

1 IOC

CSO Online →

CSO Online General 3d ago

5 practical steps to strengthen attack resilience with attack surface management

Every asset you manage expands your attack surface. Internet‑facing applications, cloud workloads, credentials, endpoints, and third‑party integrations all r...

CSO Online →

CSO Online Supply Chain 3d ago

5 steps to strengthen supply chain security and improve cyber resilience

Supply chain attacks have rapidly become one of the most damaging and difficult threats facing IT and security teams. When an adversary compromises a trusted...

T1195 T1598

CSO Online →

CSO Online General 3d ago

5 ways to strengthen identity security and improve attack resilience

Identity compromise has become one of the most effective ways for attackers to infiltrate business systems. Firewalls, endpoint protection, and monitoring to...

T1598

CSO Online →

CSO Online General 3d ago

Zero‑click Grafana AI attack can enable enterprise data exfiltration

Indirect prompt injection is possible on AI-powered dashboards, allowing exfiltration of sensitive enterprise data without user authentication. Security rese...

T1041

CSO Online →

CSO Online Ransomware Microsoft 3d ago

Microsoft says Medusa-linked Storm-1175 is speeding ransomware attacks

Microsoft has warned that Storm-1175, a cybercrime group linked to Medusa ransomware, is exploiting vulnerable web-facing systems in fast-moving attacks, at ...

T1041

CSO Online →

CSO Online Supply Chain 3d ago

Supply chain security is now a board-level issue: Here’s what CSOs need to know

For many years, supply chain security was viewed purely as a technical concern. However, with high-profile vulnerabilities and regulations, it is now a board...

CSO Online →

CSO Online General 3d ago

The rise of proactive cyber: Why defense is no longer enough

For more than two decades, cybersecurity has been built on a reactive model: detect intrusions, patch vulnerabilities, respond to incidents, and repeat. That...

CSO Online →

CSO Online General 3d ago

The noisy tenants: Engineering fairness in multi-tenant SIEM solutions

I recently had the opportunity to review five popular SIEM solutions as part of a judging panel for a Security award. While each platform had its own unique ...

CSO Online →

CSO Online TTPs Microsoft Fortinet GitHub 4d ago

North Korean hackers abuse LNKs and GitHub repos in ongoing campaign

DPRK-linked threat actors are preferring stealth over sophistication in targeting South Korean organizations, as researchers report the use of weaponized Win...

T1027

CSO Online →

« Prev 1 2 3 4 ... 6 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA