FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Cloudflare Check Point Oracle Rapid7 Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

BleepingComputer General 6d ago

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction betwe...

BleepingComputer →

Cyberscoop General 6d ago

Medtech giant Stryker says it’s back up after Iranian cyberattack

The Handala group claimed responsibility for hitting the company with a wiper attack last month. The post Medtech giant Stryker says it’s back up after Irani...

T1529

Cyberscoop →

Help Net Security General 6d ago

OpenSSH 10.3 patches five security bugs and drops legacy rekeying support

OpenSSH 10.3 shipped carrying five security fixes alongside feature additions and a set of behavior changes that will break compatibility with older SSH impl...

Help Net Security →

SecurityWeek General Rapid7 6d ago

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Significant cybersecurity M&A deals announced by Airbus, Cellebrite, Databricks, Quantum eMotion, Rapid7, and OpenAI. The post Cybersecurity M&A Roundup: 38 ...

SecurityWeek →

Infosecurity Magazine General SAP 6d ago

NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts

The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks

T1204

Infosecurity Magazine →

BleepingComputer General 6d ago

Medtech giant Stryker fully operational after data-wiping attack

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped ou...

BleepingComputer →

Help Net Security General Red Hat Linux 6d ago

New Red Hat subscription simplifies long-term enterprise Linux support

Red Hat has announced Red Hat Enterprise Linux Extended Life Cycle Premium, a new subscription that provides a predictable 14-year life cycle for major Red H...

Help Net Security →

SentinelOne Blog General 6d ago

The Identity Paradox: The Hidden Risks in Your Valid Credentials

Identity attacks are rising as trust expands — learn how to detect misuse, close gaps, and defend beyond authentication.

SentinelOne Blog →

Cloudflare Blog General Cloudflare 6d ago

Why we're rethinking cache for the AI era

The explosion of AI-bot traffic, representing over 10 billion requests per week, has opened up new challenges and opportunities for cache design. We look at ...

Cloudflare Blog →

The Hacker News General Google Amazon 6d ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just...

The Hacker News →

The Hacker News General Docker 6d ago

The State of Trusted Open Source Report

In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source...

The Hacker News →

BleepingComputer General Cisco 6d ago

Critical Cisco IMC auth bypass gives attackers Admin access

Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables ...

T1556

BleepingComputer →

BleepingComputer General Microsoft 6d ago

Microsoft links Classic Outlook issue to email delivery problems

Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com.

1 IOC

BleepingComputer →

CSO Online General 6d ago

Cybersecurity in the age of instant software

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant...

T1598

CSO Online →

Infosecurity Magazine General 6d ago

Most CNI Firms Face Up to £5m in Downtime from OT Attacks

E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks

Infosecurity Magazine →

SecurityWeek General Apr 2

Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents

Variance has raised a total of $26 million in funding and the latest investment will fuel platform growth. The post Variance Raises $21.

SecurityWeek →

GBHackers General Apr 2

New ZAP PTK Add-On Converts Browser Security Findings Into Native ZAP Alerts

The OWASP Zed Attack Proxy (ZAP) just received a massive upgrade for testing modern web applications. The release of the ZAP PTK Add-on 0.

GBHackers →

Information Security Buzz General Amazon Apr 2

The European Commission confirms attack on its Europa web platform

The European Commission has confirmed a cyberattack affecting its Europa.eu web platform, with initial reports indicating that the attackers accessed the dat...

Information Security Buzz →

Information Security Buzz General Intel Apr 2

Enterprise AI security: weighing the benefits and risks in 2026

The integration of artificial intelligence into core business systems, better known as enterprise AI, is moving fast, along with the threats around it. Secur...

Information Security Buzz →

Help Net Security General Apr 2

Trust, friction, and ROI: A CISO’s take on making security work for the business

In this Help Net Security interview, John O’Rourke, CISO at PPG, talks about what it means for security to drive business value. He explains how mature secur...

Help Net Security →

« Prev 1 ... 11 12 13 14 15 ... 60 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA