FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media Phishing Google 1d ago

Actor tied to Raccoon targets 'several dozen' companies by exploiting BPOs and helpdesks

Google says UNC6783 leverages social engineering and phishing campaigns to gain entry to the BPOs.

T1566 T1204

SC Media →

SC Media General 1d ago

Why real-time visibility is non-negotiable in an AI-driven world

In a world where attackers operate at machine speed, cybersecurity must follow suit.

SC Media →

SC Media General 1d ago

5 ways to mitigate the risks of “cracked” software

Employees don’t always realize the full risks of going outside the IT department and downloading “free” software.

SC Media →

SC Media Data Breach 1d ago

Sensitive LAPD documents reportedly leaked online by World Leaks

The breach, attributed to the extortion gang World Leaks, reportedly exposed approximately 7.7 terabytes of data, including over 337,000 files.

SC Media →

SC Media Malware 1d ago

Chaos malware evolves to target cloud misconfigurations

First documented in September 2022, Chaos is a cross-platform malware that can run remote shell commands, deploy additional modules, propagate via SSH brute-...

T1498

SC Media →

SC Media Ransomware 1d ago

Dutch healthcare software vendor ChipSoft hit by ransomware attack

The cyberattack, confirmed by Z-CERT, the Netherlands' computer emergency response team for healthcare, occurred on April 7, 2026.

SC Media →

SC Media Malware 1d ago

Masjesu botnet: Stealthy DDoS-for-hire service targets IoT devices

Masjesu, also known as XorBot due to its use of XOR encryption, prioritizes low visibility and persistence, deliberately avoiding high-profile targets like D...

SC Media →

SC Media Malware Apple 1d ago

Atomic Stealer malware abuses macOS Script Editor in new ClickFix attack

The attackers leverage the applescript:// URL scheme to launch Script Editor with pre-filled malicious code.

SC Media →

SC Media General 1d ago

Claude Mythos Preview identifies 27-year-old bug, finds 'thousands' of zero-days in weeks

Anthropic launched “Project Glasswing” to restrict the availability of the new model to selected organizations.

SC Media →

SC Media General Linux 1d ago

Rethinking Linux security operations

Tool sprawl weakens Linux security — unified, AI-driven ops boost speed, context, and resilience.

SC Media →

SC Media General 2d ago

Report highlights automation, NHI security risks

HackRead reports that automation in systems and the adoption of non-human identities in enterprises were noted by Keeper Security researchers to be contribut...

SC Media →

SC Media Data Breach 2d ago

Over 21K Wynn Resorts employees affected by breach

Major luxury hotel and casino operator Wynn Resorts had information from 21,775 of its employees exfiltrated in a ShinyHunters-claimed attack, which was init...

T1041

SC Media →

SC Media Data Breach 2d ago

Minnesota county breach prompts emergency support declaration

Minnesota's Winona County will be receiving support from the state's National Guard in responding to a cyberattack earlier this week that has significantly c...

SC Media →

SC Media General 2d ago

Cyberattack disrupts Massachusetts hospital's operations

Several information systems at Signature Healthcare and Signature Healthcare Brockton Hospital in Massachusetts have been impacted by a recent cyberattack, a...

SC Media →

SC Media DDoS 2d ago

Russian state-run telco subjected to disruptive DDoS intrusion

Cybernews reports that major Russian state-run telecommunications firm Rostelecom has disclosed being subjected to a large-scale distributed denial-of-servic...

SC Media →

SC Media Malware 2d ago

Novel BPFDoor malware variants uncovered

Increasingly stealthy compromise of major telecommunication networks has been enabled by seven new variants of the BPFDoor malware, which have gained statele...

SC Media →

SC Media Campaigns Microsoft Apple 2d ago

Infostealers deployed via fraudulent TradingView Premium posts on Reddit

Inauthentic Reddit posts offering free access to the popular charting platform TradingView have been published using multiple aged and compromised accounts t...

SC Media →

SC Media Campaigns 2d ago

Nascent extortion campaign underpinned by social engineering

Dozens of organizations across several industries have been extorted by the financially motivated hacking operation UNC6783, which is suspected to be linked ...

T1204

SC Media →

SC Media General 2d ago

Feds grade themselves high despite legacy gaps

Federal agency leaders are exhibiting a striking disconnect between their self-assessed cybersecurity posture and the persistent reality of outdated infrastr...

SC Media →

SC Media Ransomware 2d ago

Malaysia faces structural shift in cyber threats

Malaysia's cyber threat landscape is undergoing a significant structural transformation as rapid digitization across critical sectors outpaces defensive capa...

SC Media →

« Prev 1 2 3 4 5 ... 20 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA