FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media General Apr 2

Rethinking identity security for a borderless attack surface

Identity is the heart of modern security. Here's how to reshape your identity environment accordingly.

SC Media →

SC Media Campaigns Microsoft Amazon SAP Apr 1

Campaign combines WhatsApp with legit cloud platforms to deliver malicious VBS files

Attackers continue to evade defenders by using legitimate platforms like AWS and Microsoft utilities.

SC Media →

SC Media General Apr 1

Report: Americans concerned about government management of personal data

StateScoop reports that the majority of Americans seek more control over data sharing across the U.S.

SC Media →

SC Media General Apr 1

AI implementation influenced by cybersecurity risks, survey shows

A KPMG poll found that cybersecurity is one of the main risks impacting corporate executives' decisions about adopting AI, according to Cybersecurity Dive.

SC Media →

SC Media Ransomware Apr 1

Cyberattacks powered by stolen credentials on the rise

Cybersecurity incidents are increasingly centered on identity abuse, where stolen login credentials serve as the primary entry point for attackers, and the g...

T1078 T1598

SC Media →

SC Media Data Breach Apr 1

Claude Code source code inadvertently leaked

Anthropic, the firm behind Claude Code, has accidentally included an unobfuscated TypeScript source in the AI coding tool's npm package, exposing over 500,00...

SC Media →

SC Media Ransomware Apr 1

Monetization of ransomware-stolen data touted by new cybercrime service

Affiliates and customers are being sought by the new Leak Bazaar cybercrime service, which was reported by Flare researchers to be promoted across the dark w...

T1041

SC Media →

SC Media Campaigns Apr 1

Bogus LinkedIn message alerts enable credential siphoning

Malicious actors have been distributing fraudulent LinkedIn alert messages for potential job opportunities to facilitate credential exfiltration in a new phi...

T1566 T1041

SC Media →

SC Media Campaigns Apr 1

Report sheds more light on Phantom Stealer

Attacks involving the .NET-based Phantom Stealer, which has been bundled with a crypter and a remote access tool under the Phantom Project cybercrime kit, ha...

T1566

SC Media →

SC Media Zero-Day Apr 1

Attacks with TrueConf zero-day hit Southeast Asian governments

Suspected China-linked threat actors have weaponized a high-severity zero-day flaw in the TrueConf client video conferencing software, tracked as CVE-2026-35...

1 IOC

SC Media →

SC Media Campaigns Microsoft Apr 1

Widespread Microsoft 365 account compromise sought by Iran-linked hackers

Widespread Microsoft 365 account compromise sought by Iran-linked hackers More than 300 organizations in Israel, over 25 others in the United Arab Emirates, ...

T1110

SC Media →

SC Media Vulnerability Disclosure Cisco Apr 1

Trivy supply chain intrusion reportedly compromises Cisco source code

Cisco was reported to have had its source code stolen by threat actors following an attack linked to the recent supply chain attack against Aqua Security's T...

T1195

SC Media →

SC Media Campaigns Apple Amazon Apr 1

AWS environments targeted by TeamPCP

Threat operation TeamPCP, also known as PCPcat, DeadCatx3, and ShellForce, has tapped credentials siphoned from its sweeping supply chain attacks against Tri...

T1041 T1195

SC Media →

SC Media Campaigns Google Apple Intel Apr 1

North Korean hackers blamed for axios supply chain hack

North Korean threat operation UNC1069 was noted by the Google Threat Intelligence Group to have perpetrated the npm supply chain attack against the widely us...

T1195

SC Media →

SC Media General CrowdStrike Apr 1

Joint offering combines CrowdStrike's Falcon with HCLTech's AI Force

CrowdStrike and HCLTech have expanded their partnership with a new continuous threat exposure management service combining CrowdStrike's Falcon platform with...

SC Media →

SC Media General Apr 1

Proton launches privacy-focused video conferencing service

Proton Meet utilizes the Messaging Layer Security (MLS) protocol for end-to-end encryption, ensuring that all media and chat are encrypted client-side.

SC Media →

SC Media General Intel Apr 1

UAE faces surge in AI-powered cyberattacks

Hostile actors, including state-linked entities, are leveraging artificial intelligence tools such as ChatGPT and other platforms to conduct cyber operations.

SC Media →

SC Media Supply Chain Apr 1

AI startup Mercor confirms security incident linked to LiteLLM supply chain attack

The incident at Mercor is believed to stem from malicious code injected into the LiteLLM project, an open-source tool used by numerous companies to manage AI...

T1195

SC Media →

SC Media General Google Apr 1

Google paper reveals quantum computing threat to cryptocurrency

A paper published by Google indicates that a quantum computer with 500,000 qubits could be used to steal cryptocurrency, a significantly lower threshold than...

SC Media →

SC Media Ransomware Google Apr 1

Google Drive enhances ransomware protection with AI

The AI model, which has seen significant improvements since its beta phase, can now detect 14 times more ransomware infections at a faster rate.

SC Media →

« Prev 1 ... 8 9 10 11 12 ... 20 Next »
FreeIntelHub ยท Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA