FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

HackRead General Mar 30

15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow

15-year-old strongSwan flaw allows attackers to crash VPNs via integer underflow bug, affecting EAP-TTLS plugin and multiple versions worldwide.

HackRead →

Help Net Security General Mar 30

RSAC 2026 is back, and the certificate automation gap is impossible to ignore

RSAC 2026 Conference marked a return to form, more vibrant and better attended than any show I can recall over the past decade. The audience was distinctly i...

Help Net Security →

HackRead General Mar 30

24/7 Payments for 24/7 Agents: The Case for Crypto in the Machine Economy

Crypto enables 24/7 payments for AI agents, replacing fiat limits with scalable machine-to-machine transactions and powering the emerging machine economy.

HackRead →

Microsoft Security Blog General Microsoft Mar 30

Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio

Agentic AI introduces new security risks. Learn how the OWASP Top 10 Risks for Agentic Applications maps to real mitigations in Microsoft Copilot Studio.

Microsoft Security Blog →

SC Media General Mar 30

AI's potential to disrupt cyber operations highlighted by cyber leaders

AI was emphasized by multiple cybersecurity leaders at RSAC 2026 to possibly unsettle cybersecurity operations, which could result in a major industry upheav...

SC Media →

SC Media General WordPress Mar 30

Widespread compromise possible with Smart Slider WordPress plugin flaw

BleepingComputer reports that at least 500,000 WordPress sites are vulnerable to attacks involving a medium-severity flaw in the Smart Slider 3 plugin, which...

SC Media →

SC Media General Amazon GitHub Mar 30

Major services accessible via exposed API keys, report finds

Nearly 2,000 API credentials enabling access to AWS, OpenAI, GitHub, and Stripe have been observed by Stanford University researchers to be exposed across 10...

SC Media →

BleepingComputer General Apple Mar 30

Apple adds macOS Terminal warning to block ClickFix attacks

Apple has introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to po...

BleepingComputer →

SecurityWeek General Mar 30

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

LLMs can write complex Rego and Cedar code in seconds, but a single missing condition or hallucinated attribute can quietly dismantle your organization’s lea...

SecurityWeek →

BleepingComputer General Mar 30

How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking

AI SOC agents can reduce alert fatigue, but most teams fail to measure real outcomes. Prophet Security breaks down Gartner's questions for evaluating AI SOC ...

BleepingComputer →

Infosecurity Magazine General Mar 30

Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers

Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update

Infosecurity Magazine →

The Record General Mar 30

European Commission downplays ShinyHunters cyberattack impact

In a statement issued Friday, the Commission said it had detected an incident affecting the Europa.eu web portal, the European Union’s central online platfor...

The Record →

The Hacker News General Apple Mar 30

⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

Some weeks are loud. This one was quieter but not in a good way.

The Hacker News →

SC Media General Mar 30

How to secure real‑time carbon tracking in factories

Time to start treating sustainability telemetry as OT data.

SC Media →

Help Net Security General Intel Mar 30

Diligent automates time-consuming steps in third-party reviews

Diligent launched of Third-Party Risk Intel, an agentic due diligence and intelligence solution that automates the most time-consuming steps of third-party r...

Help Net Security →

Help Net Security General Mar 30

Coro launches MCP capabilities to simplify security operations through AI workflows

Coro has announced new Model Context Protocol (MCP) capabilities that extend its AI-driven security platform beyond the Coro interface, allowing users to acc...

Help Net Security →

The Record General Mar 30

Russian court jails notorious card fraud ringleader ‘Flint’ and 25 associates

A Russian military court sentenced 26 members of the cybercrime group Flint24, including ringleader Alexei Stroganov — a notorious hacker also wanted in the ...

The Record →

Check Point Research General Mar 30

ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime

Key Takeaways What Happened AI assistants now handle some of the most sensitive data people own. Users discuss symptoms and medical history.

Check Point Research →

GBHackers General Intel Mar 30

North Korean IT Worker Used Stolen Identity, AI-Generated Resume in Job Scam

A recent investigation as exposed how a suspected North Korean IT worker allegedly used a stolen identity, AI-generated resume content, and scripted intervie...

GBHackers →

The Hacker News General Mar 30

3 SOC Process Fixes That Unlock Tier 1 Productivity

What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone.

The Hacker News →

« Prev 1 ... 21 22 23 24 25 ... 62 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA