FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media CVE 3d ago

Active exploitation of max severity Flowise bug threatens broad compromise

More than 12,000 internet-exposed instances of open-source AI agent builder Flowise could be compromised by the ongoing exploitation of the maximum-severity ...

T1190 1 IOC

SC Media →

SC Media Zero-Day Fortinet 3d ago

Immediate remediation of Fortinet FortiClient EMS bug ordered by CISA

BleepingComputer reports that the Cybersecurity and Infrastructure Security Agency has called on federal civilian executive agencies to remediate Fortinet Fo...

1 IOC

SC Media →

SC Media Vulnerability Disclosure Linux 3d ago

New CUPS vulnerabilities threaten RCE, network breaches

Attackers could combine a pair of newly discovered vulnerabilities in the Common Unix Printing System used by Linux and other Unix-like systems to facilitate...

T1190

SC Media →

SC Media General 3d ago

AI agent compromise via illicit web content detailed

SecurityWeek reports that AI agents could be vulnerable to half a dozen attacks involving malicious web content that enables illicit command injection and un...

T1059

SC Media →

SC Media Malware Microsoft 3d ago

Novel ResokerRAT malware exploits Telegram API to target Windows systems

Windows systems are being subjected to intrusions involving the newly emergent ResokerRAT malware, which leverages Telegram Bot API to facilitate remote trac...

SC Media →

SC Media Data Breach WordPress 3d ago

Malware distributed via ILSpy WordPress domain breach

Malicious actors have breached the official WordPress site for open-source decompiler ILSpy to compromise developers with malware as part of a new supply cha...

T1195

SC Media →

SC Media General 3d ago

Malicious PyPI package enables Claude prompt, data compromise

Malicious PyPI package enables Claude prompt, data compromise GBHackers News reports that threat actors have been distributing the illicit PyPI package 'herm...

T1041

SC Media →

SC Media Ransomware 3d ago

Cyber-enabled fraud, ransomware losses spike, FBI reports

Americans were noted by the FBI's Internet Crime Complaint Center to have reported significantly higher losses from increasingly prevalent cyber-enabled frau...

SC Media →

SC Media Malware Google Palo Alto Networks 3d ago

Palo Alto weaponizes Vertex AI agents as double agents

Palo Alto Networks researchers demonstrated how AI agents built on Google Cloud's Vertex AI platform could be compromised and turned into double agents, enab...

T1041

SC Media →

SC Media General Apple Fortinet 3d ago

Cthullu, BlueHammer, NK, CUPs, Axios, Fortinet, Cognitive Surrender, Aaran Leyland - SWN #570

SC Media →

SC Media General 3d ago

Niobium unveils encrypted cloud platform for private AI

Security Brief Australia reports that Niobium has launched The Fog, an encrypted cloud platform for private AI and data processing now available in private b...

SC Media →

SC Media General 3d ago

Cloud security risks shift to control plane, experts warn

Ahead of World Cloud Security Day, executives from Adactin, ClickHouse, and Fastly highlighted emerging cloud security risks beyond traditional perimeter def...

SC Media →

SC Media General 3d ago

ID Dataweb outlines the need for continuous identity threat detection  

The industry needs tools that can verify users throughout the entire identity lifecycle without disrupting daily business processes.

SC Media →

SC Media General 3d ago

Acquisition reform is materializing, but the harder test still lies ahead

The Pentagon is finally getting serious about procurement reform, but the proof will be in the pudding.

SC Media →

SC Media Data Breach Apple 3d ago

The Axios npm breach taught us the need for a personal zero-trust

Security pros need to develop a mental zero-trust that trusts nothing and tests everything.

SC Media →

SC Media Malware 3d ago

Spyware maker avoids jail time in landmark case

Bryan Fleming, the first convicted spyware maker in over a decade, has been sentenced to time served and a $5,000 fine, avoiding jail time after pleading gui...

SC Media →

SC Media General 3d ago

Businesses risk significant losses due to IT incidents, PagerDuty research reveals

Research from PagerDuty indicates that beyond lost revenue, businesses face substantial risks including reputational damage (cited by 53%), lost productivity...

SC Media →

SC Media Vulnerability Disclosure 3d ago

Malicious email delivers advanced malware with privilege escalation and evasion tactics

The attack chain begins with a user receiving an email containing a URL that downloads an encoded .cmd file.

T1548

SC Media →

SC Media Zero-Day Microsoft 3d ago

Windows zero-day vulnerability 'BlueHammer' exploit code released

The BlueHammer vulnerability is a local privilege escalation (LPE) flaw that combines a time-of-check to time-of-use (TOCTOU) vulnerability with path confusion.

T1548 T1068

SC Media →

SC Media General 3d ago

Uffizi Galleries cyberattack: Data stolen, backups restore archive

Hackers targeted the Uffizi Galleries in February 2026, allegedly stealing the museum's entire photographic archive.

T1041

SC Media →

« Prev 1 ... 3 4 5 6 7 ... 20 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA