FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Amazon

20 articles

SC Media General Amazon 7h ago

AWS launches Agent Registry to enhance visibility and control of AI agents

AWS' Agent Registry functions as a central repository for metadata describing AI agents, tools, and associated resources.

SC Media →

BleepingComputer General Amazon Qualys 8h ago

Analysis of one billion CISA KEV remediation records exposes limits of human-scale security

Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before de...

BleepingComputer →

GBHackers General Amazon 13h ago

TP-Link Devices at Risk as Multiple Security Flaws Enable Takeover

Cybersecurity researchers have uncovered five significant security vulnerabilities in the TP-Link Archer AX53 v1.0 router.

T1598

GBHackers →

Help Net Security General Amazon 16h ago

What vibe hunting gets right about AI threat hunting, and where it breaks down

In this Help Net Security interview, Aqsa Taylor, Chief Security Evangelist, Exaforce, explains vibe hunting, an AI-driven approach to threat detection that ...

Help Net Security →

GBHackers Vulnerability Disclosure Amazon 17h ago

AWS Fixes Severe RCE, Privilege Escalation Flaws in Research and Engineering Studio

AWS recently issued a critical security bulletin addressing severe vulnerabilities in its Research and Engineering Studio (RES). RES is an open-source web po...

T1190 T1548

GBHackers →

Rapid7 Blog General Amazon 1d ago

What Project Glasswing Means for Security Leaders

Anthropic’s Project Glasswing matters because it offers an early look at how quickly software flaws may soon be found, validated, and potentially turned into...

T1598

Rapid7 Blog →

Qualys Blog General Amazon 1d ago

12 Best Practices for Securing AWS Cloud in 2026

Key Takeaways What Securing the AWS Cloud Really Means in 2026 Amazon Web Services (AWS) cloud security is the discipline of protecting cloud infrastructure,...

Qualys Blog →

GBHackers Vulnerability Disclosure Amazon SonicWall 1d ago

Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks

SonicWall has published a critical security advisory addressing four distinct vulnerabilities in its SMA1000 series appliances. These security flaws open the...

T1548

GBHackers →

Unit 42 Vulnerability Disclosure Amazon 2d ago

Cracks in the Bedrock: Agent God Mode

Unit 42 reveals "Agent God Mode" in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration risks.

T1548 T1041

Unit 42 →

AWS Security Blog TTPs Amazon 2d ago

A framework for securely collecting forensic artifacts into S3 buckets

When customers experience a security incident, they need to acquire forensic artifacts to identify root cause, extract indicators of compromise (IoCs), and v...

AWS Security Blog →

SC Media General Amazon 2d ago

Trent AI secures $13 million seed funding to enhance AI cybersecurity

Founded by former Amazon Web Services engineers, Trent AI has developed a platform designed to identify cybersecurity vulnerabilities within AI agents and th...

SC Media →

GBHackers General Amazon IBM 2d ago

IBM Security Verify Access Flaws Let Remote Attackers Access Sensitive Data

IBM has issued an urgent security bulletin addressing a slew of vulnerabilities impacting IBM Verify Identity Access and IBM Security Verify Access. These fl...

T1041

GBHackers →

GBHackers CVE Amazon 2d ago

Multiple OpenSSL Flaws Expose Sensitive Data in RSA KEM Handling

A newly disclosed flaw in OpenSSL could allow attackers to access sensitive data stored in application memory. Tracked as CVE-2026-31790, this moderate-sever...

1 IOC

GBHackers →

Help Net Security CVE Amazon Linux 2d ago

Flatpak 1.16.4 fixes sandbox escape and three other security flaws

Flatpak, a Linux application sandboxing and distribution framework, released version 1.16.

2 IOCs

Help Net Security →

Unit 42 General Amazon 3d ago

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore's sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in the ...

T1572

Unit 42 →

AWS Security Blog General Amazon Intel 3d ago

Building AI defenses at scale: Before the threats emerge

At AWS, we’ve spent decades developing processes and tools that enable us to defend millions of customers simultaneously, wherever they operate around the wo...

AWS Security Blog →

Infosecurity Magazine Vulnerability Disclosure Amazon 3d ago

GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration

GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data

T1041

Infosecurity Magazine →

Security Affairs Data Breach Amazon 3d ago

Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa

China-based actor Storm-1175 runs fast ransomware attacks, exploiting new flaws to breach systems and quickly deploy Medusa ransomware. China-based actor Sto...

T1041

Security Affairs →

GBHackers Vulnerability Disclosure Amazon Linux 3d ago

CUPS Vulnerabilities Could Allow Remote Attackers to Achieve Root-Level Code Execution

A team of AI-driven vulnerability hunting agents directed by security researcher Asim Viladi Oglu Manizada has discovered two critical security flaws in CUPS...

T1190

GBHackers →

GBHackers Vulnerability Disclosure Amazon 3d ago

Windmill Developer Platform Flaws Expose Users to RCE Attacks, Proof-of-Concept Published

Cybersecurity researchers have discovered critical vulnerabilities in the Windmill developer platform and Nextcloud Flow, an integration embedding the Windmi...

T1041

GBHackers →

1 2 3 ... 6 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA