FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Cloudflare Check Point Rapid7 Oracle Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General Google Mar 25

Cloud Phones Linked to Rising Financial Fraud Threat

Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts

Infosecurity Magazine →

Microsoft Security Blog General Microsoft Mar 25

Identity security is the new pressure point for modern cyberattacks

Read the latest Microsoft Secure Access report for insights into why a unified identity and access strategy offers strong modern protection. The post Identit...

Microsoft Security Blog →

SecurityWeek General Mar 25

Onit Security Raises $11 Million for Exposure Management Platform

The startup will invest in product development and go-to-market efforts as it expands into new sectors. The post Onit Security Raises $11 Million for Exposur...

SecurityWeek →

The Record General Apple Mar 25

Puerto Rico government agency cancels driver’s license appointments after cyberattack

Services at Centros de Servicios al Conductor (CESCO) — the agency responsible for issuing licenses, permits and vehicle registrations in Puerto Rico — cance...

The Record →

GBHackers General Cisco Mar 25

2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference as AI Security Dominates

San Francisco, USA, March 25th, 2026, CyberNewswire Cybersecurity Insiders today announced the winners of the 2026 Cybersecurity Excellence Awards during RSA...

GBHackers →

HackRead General Mar 25

Best Klaviyo Alternatives for Revenue Growth and Advanced Analytics

Top Klaviyo alternatives offer advanced analytics, automation, and insights to help e-commerce brands improve campaigns, boost revenue, and track performance.

HackRead →

SC Media General Mar 25

BSides SF: AI must benefit everyone, not just the wealthy

Renowned security expert Katie Moussouris warned that unregulated adoption of AI stands to make a few people very wealthy and everyone else poorer.

SC Media →

HackRead General Mar 25

How AI Translation Fixes Multilingual Content Chaos

AI translation fixes multilingual content chaos by improving consistency, workflows, and speed, helping teams reduce errors and scale global content faster.

HackRead →

SC Media General Splunk Mar 25

RSAC 2026: 5 ways AI is our worst enemy, and 3 ways to make it SOC’s best friend

Keynotes from Splunk and the SANS Institute reinforce the double-edged nature of AI.

SC Media →

SecurityWeek General Mar 25

Russian Cybercriminal Gets 2-Year Prison Sentence in US 

Ilya Angelov was a member of the cybercrime group tracked as TA-551, Shathak, Gold Cabin, Monster Libra, and ATK236. The post Russian Cybercriminal Gets 2-Ye...

SecurityWeek →

SC Media General Mar 25

RSAC 2026: AI agents are joining the workforce -- so who’s in charge?

In the end, what happens with AI still rests with human beings.

SC Media →

Rapid7 Blog General Rapid7 Mar 25

From Vectors to Verdicts: Web App Testing with Vector Command

If it’s online, it’s a target Web applications are no longer just business enablers, they’re often the front door to an organization. They can often generate...

Rapid7 Blog →

Help Net Security General Mar 25

Vorlon adds forensics and response to secure AI agents

Vorlon has unveiled AI Agent Flight Recorder and AI Agent Action Center, adding forensics and coordinated response to secure enterprise agentic ecosystems an...

T1598

Help Net Security →

SecurityWeek General Apple Mar 25

iOS, macOS 26.4 Roll Out With Fresh Security Patches

Apple released security fixes for older devices as well, in iOS 18.7.

SecurityWeek →

Help Net Security General Mar 25

DigiCert Document Trust Manager enhancements improve document security and compliance

DigiCert has announced enhancements to its Document Trust Manager solution to help organisations combat rising document fraud, simplify global compliance, an...

Help Net Security →

Google Security Blog General Google Mar 25

Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android

Posted by Eric Lynch, Product Manager, Android and Dom Elliot, Group Product Manager, Google Play Modern digital security is at a turning point. We are on th...

Google Security Blog →

Tenable Blog General Tenable Mar 25

Security for AI: A guide to managing the risks of vibe coding and AI in software development

Get a template for an AI coding acceptable use policy with security controls and a list of 25 security questions to ask software developers and “citizen deve...

Tenable Blog →

Help Net Security General Google Intel Mar 25

Gemini picks up criminal activity buried in dark web noise

To help teams make faster and more accurate decisions on emerging threats, Google has introduced a dark web intelligence capability in Google Threat Intellig...

Help Net Security →

SecurityWeek General Mar 25

FCC Bans New Routers Made Outside the US Over National Security Risks

The ban aligns with a White House determination that all routers produced abroad are a threat to national security. The post FCC Bans New Routers Made Outsid...

SecurityWeek →

BleepingComputer General Linux Mar 25

Kali Linux 2026.1 released with 8 new tools, new BackTrack mode

Kali Linux 2026.1, the first release of the year, is now available for download, featuring 8 new tools, a theme refresh, and a new BackTrack mode for Kali-Un...

BleepingComputer →

« Prev 1 ... 32 33 34 35 36 ... 60 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA