FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

AWS Security Blog General 2d ago

Four security principles for agentic AI systems

Agentic AI represents a qualitative shift in how software operates. Traditional software executes deterministic instructions.

AWS Security Blog →

SC Media General 2d ago

4 steps teams can take to mitigate Iranian cyberattacks on critical infrastructure

Too many teams have not looked for Iranian pre-positioning into OT networks – here are some practical steps to take as the war escalates.

SC Media →

HackRead General Amazon Cisco Salesforce 2d ago

ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak

ShinyHunters hackers claim they stole 3 million+ Cisco records via Salesforce and AWS, warning of a public leak if demands are not met by April 3, 2026.

HackRead →

SC Media General 2d ago

Thousands of API credentials exposed on public websites

The study, detailed in a preprint paper by Standford University, University of California, Davis, and TU Delft researchers, utilized a tool called TruffleHog...

SC Media →

SC Media General 2d ago

Exabeam expands platform to monitor AI agent activity

The expanded platform transforms AI agent services into sources of behavior telemetry, feeding directly into Exabeam's threat detection workflows.

SC Media →

SC Media General 2d ago

Gartner report offers framework for evaluating AI SOC agents

A recent Gartner report, "Validate the Promises of AI SOC Agents With These Key Questions," provides a structured evaluation framework.

SC Media →

The Record General 2d ago

Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea

The platform released a post-mortem on Wednesday night explaining that malicious actors gained access to Drift systems through a “novel attack” that involved...

The Record →

SC Media General 2d ago

Rethinking identity security for a borderless attack surface

Identity is the heart of modern security. Here's how to reshape your identity environment accordingly.

SC Media →

The Record General 2d ago

French Senate passes bill that would ban children under 15 from social media

If the French effort becomes law, it would make France the first European country to follow Australia’s lead by banning social media for young teenagers.

T1598

The Record →

Cyberscoop General 2d ago

Lawmakers renew push for Labor Department-backed cyber apprenticeship grants

The bipartisan, bicameral Cyber Ready Workforce Act aims to cut into the country’s deficit of cybersecurity professionals. The post Lawmakers renew push for ...

Cyberscoop →

Google Security Blog General Google 2d ago

Google Workspace’s continuous approach to mitigating indirect prompt injections

Posted by Adam Gavish, Google GenAI Security Team Indirect prompt injection (IPI) is an evolving threat vector targeting users of complex AI applications wit...

Google Security Blog →

Microsoft Security Blog General Microsoft Linux 2d ago

Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments

Cookie-gated PHP webshells use obfuscation, php-fpm execution, and cron-based persistence to evade detection in Linux hosting environments. This post examine...

T1190 T1027

Microsoft Security Blog →

BleepingComputer General 2d ago

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction betwe...

BleepingComputer →

Cyberscoop General 2d ago

Medtech giant Stryker says it’s back up after Iranian cyberattack

The Handala group claimed responsibility for hitting the company with a wiper attack last month. The post Medtech giant Stryker says it’s back up after Irani...

T1529

Cyberscoop →

Help Net Security General 2d ago

OpenSSH 10.3 patches five security bugs and drops legacy rekeying support

OpenSSH 10.3 shipped carrying five security fixes alongside feature additions and a set of behavior changes that will break compatibility with older SSH impl...

Help Net Security →

SecurityWeek General Rapid7 2d ago

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Significant cybersecurity M&A deals announced by Airbus, Cellebrite, Databricks, Quantum eMotion, Rapid7, and OpenAI. The post Cybersecurity M&A Roundup: 38 ...

SecurityWeek →

Infosecurity Magazine General SAP 2d ago

NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts

The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks

T1204

Infosecurity Magazine →

BleepingComputer General 2d ago

Medtech giant Stryker fully operational after data-wiping attack

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped ou...

BleepingComputer →

Help Net Security General Red Hat Linux 2d ago

New Red Hat subscription simplifies long-term enterprise Linux support

Red Hat has announced Red Hat Enterprise Linux Extended Life Cycle Premium, a new subscription that provides a predictable 14-year life cycle for major Red H...

Help Net Security →

SentinelOne Blog General 2d ago

The Identity Paradox: The Hidden Risks in Your Valid Credentials

Identity attacks are rising as trust expands — learn how to detect misuse, close gaps, and defend beyond authentication.

SentinelOne Blog →

« Prev 1 2 3 4 5 6 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA