FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Fortinet
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SC Media General 4d ago

Dutch Ministry of Finance portal offline after cyberattack

The cyberattack, detected after a third-party alert, led to unauthorized access to internal systems within the policy department.

SC Media →

SC Media General 4d ago

Maryland man charged in $53 million Uranium Finance crypto heist

Spalletta is accused of exploiting vulnerabilities in Uranium Finance's smart contracts on two separate occasions in April 2021.

SC Media →

Microsoft Security Blog General Microsoft Intel 4d ago

The threat to critical infrastructure has changed. Has your readiness?

Five facts critical infrastructure (CI) leaders need to act on in 2026, grounded in what Microsoft Threat Intelligence is observing across sectors right now....

Microsoft Security Blog →

Help Net Security General 4d ago

Pondurance MDR Essentials uses autonomous SOC to tackle AI-driven attacks

Pondurance announced MDR Essentials, MDR Essentials, an MDR service providing an autonomous SOC that reduces the time from threat detection to containment by...

T1598

Help Net Security →

Cyberscoop General Apple 4d ago

Attack on axios software developer tool threatens widespread compromises

Researchers at numerous firms are sounding warnings about the supply-chain attack on an open-source project with 100 million weekly downloads. The post Attac...

Cyberscoop →

AWS Security Blog General Microsoft Google Amazon 4d ago

AWS Security Agent on-demand penetration testing now generally available

AWS Security Agent on-demand penetration testing is now generally available, enabling you to run comprehensive security tests across all your applications, n...

AWS Security Blog →

Help Net Security General Amazon 4d ago

Amazon sends AI agents into pen testing and DevOps

Amazon’s latest AI capabilities bring on-demand penetration testing through the AWS Security Agent, alongside the AWS DevOps Agent. “These agents are changin...

Help Net Security →

Microsoft Security Blog General Microsoft 4d ago

Applying security fundamentals to AI: Practical advice for CISOs

Read actionable advice for CISOs on securing AI, managing risk, and applying core security principles in today’s AI‑powered environment. The post Applying se...

Microsoft Security Blog →

SecurityWeek General Intel 4d ago

Censys Raises $70 Million for Internet Intelligence Platform

The latest funding round brings the total venture capital investment in Censys to $149 million. The post Censys Raises $70 Million for Internet Intelligence ...

SecurityWeek →

SC Media General IBM 4d ago

From cyber risk to business impact: A conversation with IBM and CyberSaint

IBM's Mark Hughes and Fabio Campos discuss how organizations are rethinking cyber risk through automation, real-time data, and AI-driven insights.

SC Media →

SecurityWeek General 4d ago

The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust

Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. The post The Next Cybersecurity Crisis Isn’t B...

SecurityWeek →

Infosecurity Magazine General Amazon 4d ago

Maryland Man Charged Over $53m Uranium Finance Crypto Hack

Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds

Infosecurity Magazine →

Help Net Security General 4d ago

Codenotary AgentMon monitors agentic AI activity and behavior

Codenotary launched AgentMon, an enterprise-grade monitoring designed specifically for agentic networks, providing organizations with real-time visibility in...

T1598

Help Net Security →

Help Net Security General Google 4d ago

DoControl provides security coverage for Google Gemini Gems

DoControl announced new capabilities that provide visibility, monitoring, and automated control for Google Gemini Gems, a newly introduced feature within Goo...

Help Net Security →

SC Media General 4d ago

5 ways to effectively manage AI browsers

Think of AI browsers as a new category of enterprise software, not an advanced version of a traditional browser.

SC Media →

SC Media General Red Hat 5d ago

Red Hat reports widespread cloud security incidents

When asked about the factors that affect business operations beyond IT teams, 74% of companies that decided to slow or delay application deployments over the...

SC Media →

Help Net Security General Microsoft Apple Oracle 5d ago

Foxit flags hidden security risks in PDFs with new tool

Foxit Software introduced a new capability designed to uncover hidden security risks inside PDFs as part of its latest PDF Editor 2026.1 release for Windows ...

Help Net Security →

SC Media General SAP 5d ago

Experts mull over significance of cloud security oversight in higher education

With critical services, institutional data, and user identities now spanning countless cloud and SaaS platforms, the conventional campus perimeter has disapp...

SC Media →

SC Media General 5d ago

Study: Only 14% of organizations have high cloud maturity level

Researchers found that while 99% of respondents cite AI as one of the factors contributing to a rising demand for cloud investment, 88% reported existing bud...

SC Media →

BleepingComputer General 5d ago

How to Categorize AI Agents and Prioritize Risk

AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize ...

BleepingComputer →

« Prev 1 ... 8 9 10 11 12 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA