FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SecurityWeek General Mar 27

OpenAI Launches Bug Bounty Program for Abuse and Safety Risks

Through the new program, OpenAI will reward reports covering design or implementation issues leading to material harm. The post OpenAI Launches Bug Bounty Pr...

SecurityWeek →

Cloudflare Blog General Mar 27

How we use Abstract Syntax Trees (ASTs) to turn Workflows code into visual diagrams

Workflows are now visualized via step diagrams in the dashboard. Here’s how we translate your TypeScript code into a visual representation of the workflow.

Cloudflare Blog →

Infosecurity Magazine General Google Mar 27

Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google

‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration

Infosecurity Magazine →

Infosecurity Magazine General Mar 27

UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs

The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”

Infosecurity Magazine →

SecurityWeek General Mar 27

TP-Link Patches High-Severity Router Vulnerabilities

The security defects could be used to bypass authentication, execute arbitrary commands, and decrypt configuration files. The post TP-Link Patches High-Sever...

SecurityWeek →

CSO Online General Mar 27

Cyberangriff auf die Linke

Die Hackergruppe “Qilin” steht möglicherweise hinter dem Angriff. Studio-M – shutterstock.

1 IOC

CSO Online →

SecurityWeek General Mar 27

RSAC 2026 Conference Announcements Summary (Days 3-4)

A summary of the announcements made by vendors on the third and fourth days of the RSAC 2026 Conference. The post RSAC 2026 Conference Announcements Summary ...

SecurityWeek →

BleepingComputer General Mar 27

Anti-piracy coalition takes down AnimePlay app with 5 million users

The Alliance for Creativity and Entertainment (ACE) announced the shutdown of AnimePlay, a major anime streaming platform with over 5 million users. [.

BleepingComputer →

WeLiveSecurity General Mar 27

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with

WeLiveSecurity →

CSO Online General Mar 27

8 steps CISOs can take to empower their teams

Many leaders know empowered teams deliver better results, but not all leaders understand how to get there. It all starts with knowing what empowerment truly ...

T1598

CSO Online →

BleepingComputer General Microsoft Mar 27

Windows 11 KB5079391 update rolls out Smart App Control improvements

​Microsoft has released the KB5079391 preview cumulative update for Windows 11 24H2 and 25H2, which includes 29 changes, such as Smart App Control and Displa...

BleepingComputer →

The Hacker News General Amazon Mar 27

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose files...

The Hacker News →

WeLiveSecurity General Mar 27

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them

WeLiveSecurity →

Help Net Security General GitHub Mar 27

AI frenzy feeds credential chaos, secrets spread through code, tools, and infrastructure

Code keeps moving through pipelines, and credentials continue to surface alongside it. GitGuardian’s State of Secrets Sprawl 2026 puts the count at 28.

Help Net Security →

SC Media General Mar 27

DropZone AI's Edward Wu on autonomous AI analysts at machine speed

Edward Wu explains how agent collaboration, deep recursive investigations, and self-agency expand SOC capacity by 10x without additional headcount.

SC Media →

SC Media General Intel Mar 27

Filigran's Samuel Hassine on a framework for high-impact cyber threat intelligence

Samuel Hassine explores how unifying threat intelligence with adversarial attack simulation enables a CTEM framework that replaces hype with measurable outco...

SC Media →

CSO Online General Mar 27

Was ist Social Engineering?

Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich schützen können.

T1204 1 IOC

CSO Online →

SANS ISC General Mar 27

ISC Stormcast For Friday, March 27th, 2026 https://isc.sans.edu/podcastdetail/9868, (Fri, Mar 27th)

1 IOC

SANS ISC →

SC Media General Mar 27

RSAC 2026: We're entering the age of 'integrous' systems

In an AI-driven world, says Bruce Schneier, guaranteeing the integrity of data is more important than ever.

SC Media →

SC Media General Mar 27

RSAC 2026 Recap: Agentic AI Hype, Cybersecurity Trends & Startup Reality Check - RSAC26 #4

SC Media →

« Prev 1 ... 26 27 28 29 30 ... 62 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA