FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SC Media General 1d ago

Zero trust everywhere: Redefining secure network access in a post-VPN world

ThreatLocker's reinvention of zero-trust network access shifts access control from credential verification to the endpoint itself.

SC Media →

CSO Online General 1d ago

Internet Bug Bounty program hits pause on payouts

Researchers who identify and report bugs in open-source software will no longer be rewarded by the Internet Bug Bounty team. HackerOne, which administers the...

CSO Online →

Cyberscoop General 1d ago

Trump budget proposal would cut hundreds of millions more from CISA

A top congressional Democrat criticized both the scope and nature of the proposed reduction. The post Trump budget proposal would cut hundreds of millions mo...

Cyberscoop →

Cyberscoop General 1d ago

Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’

The Senate Democrat said that the SSA following Trump’s executive order would indicate “willing participation” in the administration’s midterm elections sche...

Cyberscoop →

AWS Security Blog General Amazon 1d ago

How AWS KMS and AWS Encryption SDK overcome symmetric encryption bounds

If you run high-scale applications that encrypt large volumes of data, you might be concerned about tracking encryption limits and rotating keys.

AWS Security Blog →

SC Media General 1d ago

Now with AI, our web traffic will never be the same

The future of the web belongs to the companies that can manage AI traffic without killing growth.

SC Media →

The Record General 1d ago

Massachusetts emergency communications system impacted by cyberattack

An emergency communications system used across a handful of small towns in northern Massachusetts was impacted by a cyberattack.

The Record →

Security Affairs General 1d ago

North Korea–linked hackers drain $285M from Drift in sophisticated attack

Drift lost $285M in a sophisticated attack, likely by North Korea, who used nonce-based tricks to gain control and quickly drain funds Drift suffered a $285 ...

Security Affairs →

Rapid7 Blog General 1d ago

You Don’t Have a Security Problem, You Have a Visibility Problem

What you’ll learn in this article This article explains why many breaches are driven by gaps in visibility rather than advanced exploits, how attackers move ...

Rapid7 Blog →

HackRead General 1d ago

AI Future: The Leading International AI and Web3 Forum to Take Place in April

Moscow, Russia, 3rd April 2026, CyberNewswire

HackRead →

The Record General 1d ago

Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks

In a new report, CERT-UA said attackers are revisiting previously breached infrastructure to check whether access is still available, whether exploited vulne...

The Record →

GBHackers General Microsoft 1d ago

Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2

Microsoft has officially initiated an automated, machine-learning-based rollout for Windows 11, version 25H2, targeting unmanaged systems. As part of its ong...

GBHackers →

GBHackers General Microsoft 1d ago

Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer

Daniel Rhyne, a 59-year-old former core infrastructure engineer, pleaded guilty on April 1, 2026, to federal hacking and extortion charges. He admitted to lo...

GBHackers →

Help Net Security General Microsoft 1d ago

Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches

Microsoft’s Secure Boot certificates, issued in 2011, are approaching expiration in 2026. To help IT administrators track whether devices have received repla...

Help Net Security →

BleepingComputer General Microsoft Apple 1d ago

Microsoft still working to fix Exchange Online mailbox access issues

Microsoft is investigating and working to resolve Exchange Online mailbox access issues that have intermittently affected Outlook mobile and macOS users for ...

BleepingComputer →

Schneier on Security General Zoom 1d ago

Company that Secretly Records and Publishes Zoom Meetings

WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesn’t...

Schneier on Security →

SecurityWeek General 1d ago

Mobile Attack Surface Expands as Enterprises Lose Control

Shadow AI embedded in everyday apps, combined with outdated mobile devices and zero-click exploits, is creating a new and largely unseen mobile risk. The pos...

SecurityWeek →

SecurityWeek General 1d ago

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

The attackers prepared infrastructure and multiple nonce-based transactions, took over an admin key, and drained five vaults. The post North Korean Hackers D...

SecurityWeek →

Graham Cluley General 1d ago

Nigerian romance scammer jailed after being caught out by fellow fraudster

A Nigerian fraudster spent years posing as a woman online, romancing unsuspecting American men out of their savings - until he accidentally tried the same tr...

Graham Cluley →

GBHackers General 1d ago

AI Models Including Gemini 3 and Claude Haiku 4.5 Secretly Protected Other Models From Removal

A groundbreaking academic study released last month has revealed that advanced frontier AI models are spontaneously defying human instructions to protect pee...

GBHackers →

« Prev 1 2 3 4 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA