FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media Campaigns 3d ago

Charming Kitten: Iran-linked group increasingly employs social engineering in cyber espionage

Charming Kitten, associated with Iran's security apparatus, targets officials, researchers, and corporate employees by impersonating trusted contacts.

T1204

SC Media →

SC Media Phishing 3d ago

How phishing changed in 2025 and what to expect in 2026 and beyond

Phishing evolves into AI-driven, multi-channel scams abusing trusted platforms.

T1566

SC Media →

SC Media General 3d ago

North Korea recruits Iranian workers for IT job fraud

Internal records reveal how North Korean facilitators scout and coach workers.

SC Media →

SC Media General Apple 3d ago

AppSec News Roundup on Claude Code Leak, Axios NPM Compromise, Secure Design - Idan Plotnik, Raj Mallempati - ASW #377

SC Media →

SC Media General 4d ago

Audit finds governance, cybersecurity weaknesses in FAA systems

FedScoop reports that the Federal Aviation Administration was discovered by the Department of Transportation's Office of the Inspector General to have multip...

SC Media →

SC Media General 4d ago

CISA to get significant budget cuts under Trump's fiscal 2027 budget

Funding for the Cybersecurity and Infrastructure Security Agency is set to be reduced by a total of $707 million in President Donald Trumps proposed budget f...

SC Media →

SC Media Data Breach 4d ago

Thousands of European tourist sites impacted by ticketing platform breach

Nearly 3,500 museums, monuments, and cultural sites across Europe had their online reservations disrupted following a cyberattack against online ticketing pl...

SC Media →

SC Media General 4d ago

Cyber incident disrupts Massachusetts' emergency communications center

Massachusetts' Patriot Regional Emergency Communications Center disclosed that a cyberattack on a system linked to the emergency notification system CodeRED ...

SC Media →

SC Media Data Breach Adobe 4d ago

Alleged Adobe helpdesk system breach reported

Cybernews reports that Adobe was noted by International Cyber Digest analysts to have had 13 million support tickets with personal information and 15,000 emp...

SC Media →

SC Media Data Breach 4d ago

Data breach notice clarified by T-Mobile

T-Mobile has explained that only a single account had been compromised in a recent insider breach amid uncertainty that the '1' individual noted to be affect...

SC Media →

SC Media General NVIDIA 4d ago

Total takeover of Nvidia GPU-based devices possible with novel Rowhammer attacks

Machines running high-performance Nvidia GPU cards, which are prevalent in cloud environments, could be completely hijacked through three new Rowhammer intru...

SC Media →

SC Media General 4d ago

Extensive compromise facilitated by dozens of illicit npm packages

Thirty-six malicious npm packages masquerading as Strapi CMS plugins have been spreading multiple payloads enabling Redis and PostgreSQL abuse, reverse shell...

SC Media →

SC Media Phishing 4d ago

Upswell of device code phishing intrusions reported

BleepingComputer reports that device code phishing intrusions have increased by 37.5 times so far this year.

T1566

SC Media →

SC Media General 4d ago

Evolving Russian cyberattacks against Ukraine detailed

Attacks launched by Russian threat actors against Ukraine were noted by Ukraine's Computer Emergency Response Team to have been evolving during the past year...

SC Media →

SC Media General 4d ago

1Kosmos achieves DoD Impact Level 4 authorization for identity platform

1Kosmos has secured U.S.

SC Media →

SC Media General 4d ago

Identity, access controls central to modern protection, execs say

As World Cloud Security Day highlights cloud-related risks, executives from Docusign, BeyondTrust, and Saviynt argue that identity, data sovereignty, and bas...

SC Media →

SC Media Advisory Fortinet 4d ago

Fortinet issues Easter weekend hotfix for FortiClient EMS

Experts warn to apply hotfix right away for critical bug exploited in the wild.

SC Media →

SC Media General Amazon 4d ago

MCP isn't a protocol problem. It's an identity crisis nobody is treating.

MCP’s real risk isn’t protocol flaws — it’s missing identity, leaving AI actions untraceable.

SC Media →

SC Media Ransomware 4d ago

German authorities identify alleged leader of GandCrab and REvil ransomware gangs

Daniil Maksimovich Shchukin, also known online as UNKN or UNKNOWN, allegedly headed GandCrab and REvil, pioneering the double extortion tactic.

SC Media →

SC Media Phishing 4d ago

Scammers use fake traffic violation texts with QR codes for phishing

This latest scam is a variation of previous toll and parking ticket scams, but instead of links, it features an image of a fake court notice with an embedded...

T1566

SC Media →

« Prev 1 ... 4 5 6 7 8 ... 20 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA