FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

GBHackers General 15h ago

Top 10 Best Privileged Access Management (PAM) Solutions 2026

In the dynamic and increasingly complex cybersecurity landscape of 2026, privileged accounts remain the most coveted targets for cybercriminals and malicious...

GBHackers →

GBHackers General 15h ago

Top 10 Best Identity And Access Management (IAM) Companies 2026

In the rapidly evolving digital landscape of 2026, Identity and Access Management (IAM) has transcended its traditional role to become the foundational pilla...

T1598

GBHackers →

GBHackers General Microsoft 16h ago

LinkedIn Hidden Code Secretly Scans Users’ Computers for Installed Software

A new investigation by Fairlinked e.V.

GBHackers →

GBHackers General 16h ago

Anthropic Ends Claude Subscription Access for Third-Party Tools Like OpenClaw

Anthropic has officially shut down third-party AI agent access to its Claude subscription services, pulling the plug on unauthorized external integrations. T...

GBHackers →

Elastic Security Labs General 21h ago

Elastic Security Integrations Roundup: Q1 2026

Elastic Security Labs announces nine new integrations for Elastic Security spanning cloud security, endpoint visibility, email threat detection, identity and...

Elastic Security Labs →

Unit 42 General Amazon 23h ago

When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications

Unit 42 research on multi-agent AI systems on Amazon Bedrock reveals new attack surfaces and prompt injection risks. Learn how to secure your AI applications.

Unit 42 →

SC Media General 1d ago

Breaking the trade-off: Full email security without deployment friction

How API-based security is redefining email protection in the face of escalating human risk.

SC Media →

Schneier on Security General 1d ago

Friday Squid Blogging: Jurassic Fish Chokes on Squid

Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Origin...

Schneier on Security →

SC Media General 1d ago

DexterBot, Darksword, Eviltokens, Tubular Bells, Claude, Drift, Gmail, Josh Marpet... - SWN #569

SC Media →

BleepingComputer General Microsoft Google Oracle 1d ago

LinkedIn secretely scans for 6,000+ Chrome extensions, collects data

A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed ...

BleepingComputer →

BleepingComputer General Microsoft Google Oracle 1d ago

LinkedIn secretly scans for 6,000+ Chrome extensions, collects data

A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed ...

BleepingComputer →

SC Media General 1d ago

Over 257K compromised in Texas hospital hack

Texas-based Nacogdoches Memorial Hospital had personal and medical information from 257,073 patients stolen following a cyberattack in January, Cybernews rep...

SC Media →

The Record General 1d ago

FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic

Voxbeam’s actions allegedly led to “financial impersonation robocalls” that were made to American consumers “ using “non-compliant and long dormant accounts,...

The Record →

SC Media General 1d ago

The complexity crisis in network security: Why policy governance matters

Only firm policy governance can tame the rampant growth of complexity across enterprise environments.

SC Media →

SC Media General 1d ago

Duc App exposes hundreds of thousands of personal records due to server misconfiguration

The exposed data included unencrypted driver's licenses, passports, and other identity verification documents, along with selfies and personal information su...

SC Media →

HackRead General Google 1d ago

Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users

A fake Chrome browser extension called 'ChatGPT Ad Blocker' was harvesting conversations of ChatGPT users in the name of offering an ad-free experience.

HackRead →

SC Media General 1d ago

Residential proxies undermine IP reputation systems, researchers warn

A recent analysis by GreyNoise, examining 4 billion malicious sessions, found that approximately 39% originated from home networks, likely part of residentia...

SC Media →

SC Media General Intel 1d ago

ISC2 integrates AI security into cybersecurity certifications

The new Exam Guidance for Artificial Intelligence maps AI concepts across more than 50 core cybersecurity exam domains.

SC Media →

Rapid7 Blog General Rapid7 1d ago

Metasploit Wrap-Up 04/03/2026

Rapid7 Blog →

SC Media General 1d ago

Alcatraz raises $50 million for AI-powered physical security

Alcatraz develops physical security systems utilizing AI-powered facial recognition to control access to critical infrastructure like data centers and airports.

SC Media →

1 2 3 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA