FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SecurityWeek General Mar 26

BIND Updates Patch High-Severity Vulnerabilities

Specially crafted domains could be used to cause out-of-memory conditions, leading to memory leaks in the BIND resolvers. The post BIND Updates Patch High-Se...

SecurityWeek →

Help Net Security General Rapid7 Mar 26

Researchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks

Telecommunications providers around the world have been dealing with the burrowing efforts of the China-linked APTs for many years now. To help them identify...

Help Net Security →

Cloudflare Blog General Kubernetes Mar 26

A one-line Kubernetes fix that saved 600 hours a year

When we investigated why our Atlantis instance took 30 minutes to restart, we discovered a bottleneck in how Kubernetes handles volume permissions. By adjust...

Cloudflare Blog →

BleepingComputer General Mar 26

Russia arrests suspected owner of LeakBase cybercrime forum

Russian police arrested a Taganrog resident believed to be the owner of LeakBase, a major online forum used by cybercriminals to buy and sell stolen data and...

BleepingComputer →

CSO Online General Mar 26

Databricks pitches Lakewatch as a cheaper SIEM — but is it really?

Databricks has previewed a new open agentic Security Information and Event Management software (SIEM) named Lakewatch that signals its first deliberate step ...

CSO Online →

The Record General Amazon Mar 26

EU investigating Snapchat and pornography sites in child safety crackdown

The European Commission opened an investigation into Snapchat and warned four pornographic platforms they could face penalties for failing to follow child sa...

The Record →

The Record General Mar 26

Russia detains alleged admin of LeakBase cybercrime forum weeks after global crackdown

Russian authorities have detained a suspected administrator of LeakBase, a major online marketplace for stolen data, weeks after U.S.

The Record →

Help Net Security General GitHub Mar 26

GitHub jumps on the bandwagon and will use your data to train AI

GitHub updated how it uses data to improve AI-powered coding assistance. Starting April 24, interaction data from Copilot Free, Pro, and Pro+ users may be us...

Help Net Security →

Infosecurity Magazine General Amazon Mar 26

OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns

OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws

Infosecurity Magazine →

Help Net Security General Mar 26

Mission to smuggle $170 million worth of AI tech to China collapsed for three men

Three individuals, Stanley Yi Zheng, Matthew Kelly, and Tommy Shad English, have been charged with conspiracy to commit smuggling and export control violatio...

Help Net Security →

The Record General Mar 26

UK sanctions Chinese crypto marketplace tied to scam compounds

The British government sanctioned Xinbi, a Chinese-language cryptocurrency marketplace accused of enabling large-scale online fraud and human exploitation, i...

The Record →

The Hacker News General Mar 26

Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception

Unmasking impostors is something the art world has faced for decades, and there are valuable lessons from the works of Elmyr de Hory that can apply to the wo...

The Hacker News →

Security Affairs General Mar 26

Researchers uncover WebRTC skimmer bypassing traditional defenses

Researchers found a new skimmer using WebRTC to steal and send payment data, bypassing traditional security controls. Sansec researchers discovered a new pay...

T1041

Security Affairs →

Graham Cluley General Mar 26

Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie

A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5 million in B...

Graham Cluley →

The Hacker News General Intel Mar 26

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in.

The Hacker News →

Schneier on Security General Mar 26

As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters

In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and w...

Schneier on Security →

Kaspersky Securelist General Mar 26

An AI gateway designed to steal your data

Dissecting the supply-chain attack on LiteLLM – a multifunctional gateway used in many AI agents. Explaining the dangers of the malicious code and how to pro...

Kaspersky Securelist →

Help Net Security General Mar 26

Reddit declares war on bad bot activity

Reddit is introducing changes to support interactions between people. The company is taking a bottom-up approach to help users understand when they are engag...

Help Net Security →

Help Net Security General Google Mar 26

Google races to secure encryption before quantum threats arrive

Google is preparing for the quantum era, a turning point in digital security, with a 2029 timeline for post-quantum cryptography (PQC) migration. Security pr...

T1598

Help Net Security →

Infosecurity Magazine General Mar 26

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

The National Crime Agency has warned construction firms about surging invoice fraud

Infosecurity Magazine →

« Prev 1 ... 29 30 31 32 33 ... 62 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA