FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Cloudflare Check Point Rapid7 Oracle Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SC Media General Mar 31

US bounty on Iranian hackers reissued

Multiple U.S.

SC Media →

SC Media General Citrix Mar 31

Citrix NetScaler ADC bug added to CISA list of known exploits

Security agency gives federal agencies until April 2, 2026, to make the patch.

SC Media →

Help Net Security General Google Mar 31

Crypto industry may be running out of time to prepare for quantum attacks

Google’s latest research suggests the cryptocurrency industry may have less time than expected to prepare for quantum computing. In a whitepaper, Google exam...

Help Net Security →

The Hacker News General Google Mar 31

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google on Monday said it's officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful a...

The Hacker News →

The Record General Mar 31

US indicts Maryland man for 2021 theft of $54 million from Uranium Finance

U.S.

The Record →

SC Media General Mar 31

Dutch Ministry of Finance portal offline after cyberattack

The cyberattack, detected after a third-party alert, led to unauthorized access to internal systems within the policy department.

SC Media →

SC Media General Mar 31

Maryland man charged in $53 million Uranium Finance crypto heist

Spalletta is accused of exploiting vulnerabilities in Uranium Finance's smart contracts on two separate occasions in April 2021.

SC Media →

Microsoft Security Blog General Microsoft Intel Mar 31

The threat to critical infrastructure has changed. Has your readiness?

Five facts critical infrastructure (CI) leaders need to act on in 2026, grounded in what Microsoft Threat Intelligence is observing across sectors right now....

Microsoft Security Blog →

Help Net Security General Mar 31

Pondurance MDR Essentials uses autonomous SOC to tackle AI-driven attacks

Pondurance announced MDR Essentials, MDR Essentials, an MDR service providing an autonomous SOC that reduces the time from threat detection to containment by...

T1598

Help Net Security →

Cyberscoop General Apple Mar 31

Attack on axios software developer tool threatens widespread compromises

Researchers at numerous firms are sounding warnings about the supply-chain attack on an open-source project with 100 million weekly downloads. The post Attac...

Cyberscoop →

AWS Security Blog General Microsoft Google Amazon Mar 31

AWS Security Agent on-demand penetration testing now generally available

AWS Security Agent on-demand penetration testing is now generally available, enabling you to run comprehensive security tests across all your applications, n...

AWS Security Blog →

Help Net Security General Amazon Mar 31

Amazon sends AI agents into pen testing and DevOps

Amazon’s latest AI capabilities bring on-demand penetration testing through the AWS Security Agent, alongside the AWS DevOps Agent. “These agents are changin...

Help Net Security →

Microsoft Security Blog General Microsoft Mar 31

Applying security fundamentals to AI: Practical advice for CISOs

Read actionable advice for CISOs on securing AI, managing risk, and applying core security principles in today’s AI‑powered environment. The post Applying se...

Microsoft Security Blog →

SecurityWeek General Intel Mar 31

Censys Raises $70 Million for Internet Intelligence Platform

The latest funding round brings the total venture capital investment in Censys to $149 million. The post Censys Raises $70 Million for Internet Intelligence ...

SecurityWeek →

SC Media General IBM Mar 31

From cyber risk to business impact: A conversation with IBM and CyberSaint

IBM's Mark Hughes and Fabio Campos discuss how organizations are rethinking cyber risk through automation, real-time data, and AI-driven insights.

SC Media →

SecurityWeek General Mar 31

The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust

Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. The post The Next Cybersecurity Crisis Isn’t B...

SecurityWeek →

Infosecurity Magazine General Amazon Mar 31

Maryland Man Charged Over $53m Uranium Finance Crypto Hack

Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds

Infosecurity Magazine →

Help Net Security General Mar 31

Codenotary AgentMon monitors agentic AI activity and behavior

Codenotary launched AgentMon, an enterprise-grade monitoring designed specifically for agentic networks, providing organizations with real-time visibility in...

T1598

Help Net Security →

Help Net Security General Google Mar 31

DoControl provides security coverage for Google Gemini Gems

DoControl announced new capabilities that provide visibility, monitoring, and automated control for Google Gemini Gems, a newly introduced feature within Goo...

Help Net Security →

SC Media General Mar 31

5 ways to effectively manage AI browsers

Think of AI browsers as a new category of enterprise software, not an advanced version of a traditional browser.

SC Media →

« Prev 1 ... 17 18 19 20 21 ... 60 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA