FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media Vulnerability Disclosure 4d ago

5 email threats to watch as identity and AI attacks evolve  

Attacks on email that exploit OAuth consent, lateral phishing, and AI payroll fraud top the list.

T1566

SC Media →

SC Media General Oracle 4d ago

LinkedIn accused of covert browser extension scanning in 'BrowserGate' report

The "BrowserGate" report claims LinkedIn injects JavaScript that identifies thousands of browser extensions, linking this information to user profiles.

SC Media →

SC Media General 4d ago

N-able report highlights shift to proactive risk management in SOC operations

The report identifies six key metrics for moving from reactive to proactive security.

SC Media →

SC Media Malware Google Apple 4d ago

SparkCat malware returns on app stores, targeting cryptocurrency users

The malware, identified by cybersecurity firm Kaspersky, has appeared in apps on both iOS and Android platforms, primarily targeting cryptocurrency users in ...

SC Media →

SC Media General Google 4d ago

Malicious Chrome extension steals ChatGPT conversations

The ChatGPT Ad Blocker extension employed a DOM cloning technique to copy and filter conversations, focusing on text longer than 150 characters.

SC Media →

SC Media General 4d ago

Former engineer pleads guilty to server extortion plot

The engineer, Daniel Rhyne, used administrator credentials to access the company's network and schedule tasks to delete admin accounts and change passwords.

SC Media →

SC Media Data Breach 4d ago

Qilin ransomware group targets German political party Die Linke, threatens data leak

The cyberattack occurred on March 27, with the party confirming a network compromise shortly after. While Die Linke stated that its membership database was n...

SC Media →

SC Media General 4d ago

Battling payment fraud with tokenization and executive interviews from RSAC 2026 - Brian Oh, Mickey Bresman, Ashish Jain, Thyaga Vasudevan, Jimmy White - ESW #453

SC Media →

SC Media General Apr 3

Breaking the trade-off: Full email security without deployment friction

How API-based security is redefining email protection in the face of escalating human risk.

SC Media →

SC Media General Apr 3

DexterBot, Darksword, Eviltokens, Tubular Bells, Claude, Drift, Gmail, Josh Marpet... - SWN #569

SC Media →

SC Media Campaigns Apr 3

Stryker back online after cyberattack

BleepingComputer reports that major U.S.

SC Media →

SC Media General Apr 3

Over 257K compromised in Texas hospital hack

Texas-based Nacogdoches Memorial Hospital had personal and medical information from 257,073 patients stolen following a cyberattack in January, Cybernews rep...

SC Media →

SC Media Data Breach Apr 3

Brokk purportedly hacked by Play ransomware, data leaked

Brokk, a leading Swedish global remote-controlled demolition machinery manufacturer, had a 4 GB dataset allegedly stolen from its systems exposed by the Russ...

SC Media →

SC Media Campaigns Microsoft GitHub Apr 3

Malicious LNK files, GitHub leveraged in South Korea-targeted malware campaign

Infosecurity Magazine reports that Windows users across South Korea have been subjected to attacks involving illicit LNK files that trigger multi-stage compr...

SC Media →

SC Media Campaigns Apr 3

Bogus installers facilitate RAT, cryptominer spread in long-running operation

Threat operation REF1695 has been harnessing counterfeit installers to facilitate multiple attack campaigns delivering remote access trojans and cryptocurren...

SC Media →

SC Media Ransomware Apr 3

Accelerated Akira ransomware intrusions examined

CyberScoop reports that increasingly efficient techniques have significantly reduced the Akira ransomware operation's attack times.

SC Media →

SC Media Data Breach Amazon Apr 3

Multiple EU entities impacted by European Commission breach, CERT-EU says

At least 29 other European Union entities were disclosed by CERT-EU to have had their data compromised following the TeamPCP supply chain attack against the ...

T1195

SC Media →

SC Media Campaigns Apr 3

Threat actors impersonate CERT-UA, distribute AGEWHEEZE malware

The campaign targeted approximately 1 million users across various sectors, including government, healthcare, education, and finance.

SC Media →

SC Media General Apr 3

The complexity crisis in network security: Why policy governance matters

Only firm policy governance can tame the rampant growth of complexity across enterprise environments.

SC Media →

SC Media Malware Apple Apr 3

Axios maintainer’s post mortem confirms social engineering by UNC1069

Jason Saayman says he installed a remote access trojan disguised as a Teams update.

T1204

SC Media →

« Prev 1 ... 5 6 7 8 9 ... 20 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA