FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media General Mar 30

AI's potential to disrupt cyber operations highlighted by cyber leaders

AI was emphasized by multiple cybersecurity leaders at RSAC 2026 to possibly unsettle cybersecurity operations, which could result in a major industry upheav...

SC Media →

SC Media General WordPress Mar 30

Widespread compromise possible with Smart Slider WordPress plugin flaw

BleepingComputer reports that at least 500,000 WordPress sites are vulnerable to attacks involving a medium-severity flaw in the Smart Slider 3 plugin, which...

SC Media →

SC Media General Amazon GitHub Mar 30

Major services accessible via exposed API keys, report finds

Nearly 2,000 API credentials enabling access to AWS, OpenAI, GitHub, and Stripe have been observed by Stanford University researchers to be exposed across 10...

SC Media →

SC Media Campaigns Mar 30

ShinyHunters marks BreachForums departure with user database leak

Infamous cybercrime marketplace BreachForums had its latest database impacting over 300,000 users exposed by the ShinyHunters threat operation as it exited t...

T1598

SC Media →

SC Media Data Breach Mar 30

Sterling Seacrest Pritchard breach hits over 7K

Sterling Seacrest Pritchard, a leading U.S.

SC Media →

SC Media Vulnerability Disclosure Mar 30

More than 447K compromised by Lloyds IT glitch

Major UK retail and commercial financial services provider had information from over 447,000 customers using its mobile banking apps inadvertently exposed by...

SC Media →

SC Media Malware Apple Mar 30

Apple: Spyware compromise prevented by Lockdown Mode

TechCrunch reports that Apple has touted that all of its devices with the Lockdown Mode activated have not been impacted by spyware intrusions.

SC Media →

SC Media Malware Microsoft Mar 30

Clandestine BlankGrabber malware examined

Windows systems have been more stealthily compromised by the BlankGrabber malware through the exploitation of a counterfeit certificate holder for multi-stag...

SC Media →

SC Media Supply Chain Mar 30

PwC: Identity compromise a supply chain for attackers

PwC's "Cyber threats in motion" report warns that AI is giving attackers added sophistication, speed, and scale, but identity remains the fulcrum of entry, a...

SC Media →

SC Media General Mar 30

How to secure real‑time carbon tracking in factories

Time to start treating sustainability telemetry as OT data.

SC Media →

SC Media General Mar 30

Oops, all Interviews: Switching to Cyber, CISO Reflections, and the State of TPCRM - Lenny Zeltser, Helen Patton, Alexandre Sieira - ESW #452

SC Media →

SC Media Ransomware Mar 29

BSides SF: SaaS, cloud assets vulnerable to identity-based ransomware attacks

It's easy to mount ransomware attacks upon SaaS and cloud assets, a researcher said at the BSides SF 2026 hacker conference.

SC Media →

SC Media General Mar 29

Wormsign, RSAC 2026: More auto-updating supply-chain attacks on the way

The Shai-Hulud worms that exploited automatic updates in open-source software repositories may be only the beginning, two researchers said at RSAC 2026.

SC Media →

SC Media General Mar 27

RSAC 2026: Treat AI like a ‘junior developer’ to catch coding errors

OX Security found AI coding assistants make the same common mistakes as humans.

SC Media →

SC Media General Mar 27

Scam Baiting, AI, and the New Grift Economy, Part 2 - Rinoa Poison - SWN #567

SC Media →

SC Media General Mar 27

Critical Langflow AI bug exploited within 20 hours added to CISA list

Experts warn that the timeframe between disclosure and exploitation will continue to shrink, so teams must prepare.

SC Media →

SC Media General IBM Intel Mar 27

IBM's Srinivas Tummalapenta: Building the cyber risk intelligence layer

Padraic O’Reilly and Srinivas Tummalapenta explore how cybersecurity is evolving from fragmented data collection to a unified cyber risk intelligence layer.

SC Media →

SC Media General Mar 27

SC Awards Finalist: Best Professional Certification Program - ISACA - Mary Carmichael - SCA26 #1

SC Media →

SC Media General IBM Mar 27

IBM's Evelyn Anderson: Enabling autonomous cyber risk programs

Matt Alderman and Evelyn Anderson explore how autonomous security programs are reshaping cyber governance.

SC Media →

SC Media General Mar 27

Hack the Box's Gibb Witham: Measuring cyber readiness in the age of AI

Gibb Witham explains why organizations must move beyond assumed AI capability toward measurable, validated cyber readiness for both humans and AI systems.

SC Media →

« Prev 1 ... 11 12 13 14 15 ... 20 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA