FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Cloudflare Check Point Oracle Rapid7 Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General Mar 17

'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution

Infosecurity Magazine →

Qualys Blog General Intel Mar 17

The New Era of Application Security: Reasoning-Based Agents, Runtime Reality, and Risk Intelligence

Key Takeaways Introduction Application security is entering a new phase. It is now an AI problem, an API problem, and a runtime risk problem.

Qualys Blog →

Tenable Blog General Tenable Mar 17

How to prepare for NERC CIP compliance deadlines in 2026 and beyond

Explore key cybersecurity requirements and implementation deadlines for electric power utilities included in the NERC CIP-003-9 standard for Low-Impact BES (...

Tenable Blog →

CISA Advisories General Mar 17

CODESYS in Festo Automation Suite

View CSAF Summary 3. TECHNICAL DETAILS The following versions of CODESYS in Festo Automation Suite are affected: FESTO Software Festo Automation Suite (versi...

3 IOCs

CISA Advisories →

Rapid7 Blog General Rapid7 Mar 17

PACT 2026: A Stronger, Simpler, More Profitable Path for Rapid7 Partners

The cybersecurity channel is evolving fast. Buying behaviors are shifting and customers are rethinking how they evaluate solutions.

Rapid7 Blog →

The Hacker News General Mar 17

AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Finds

A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the challenge, according to the AI and Adversar...

The Hacker News →

Infosecurity Magazine General Akamai Mar 17

Average Number of Daily API Attacks Up 113% Annually

Akamai says 87% of organizations suffered an API-related security incident last year

Infosecurity Magazine →

Infosecurity Magazine General Mar 17

UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch

The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership

Infosecurity Magazine →

Schneier on Security General Mar 17

South Korean Police Accidentally Post Cryptocurrency Wallet Password

An expensive mistake: Someone jumped at the opportunity to steal $4.4 million in crypto assets after South Korea’s National Tax Service exposed publicly the ...

Schneier on Security →

Unit 42 General Mar 17

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Unit 42 research unveils LLM guardrail fragility using genetic algorithm-inspired prompt fuzzing. Discover scalable evasion methods and critical GenAI securi...

Unit 42 →

Information Security Buzz General Mar 17

ShinyHunters Claims It Stole 1PB of Data from TELUS Digital

TELUS Digital has fallen victim to a security incident in which unsanctioned actors accessed its systems. Upon learning of this incident, the company said it...

Information Security Buzz →

Information Security Buzz General Intel Mar 17

Why OSINT deserves the same status as other intelligence disciplines

Open source intelligence (OSINT) still sits outside the intelligence mainstream. If you’re not acquainted with the intelligence profession, you might not hav...

Information Security Buzz →

Elastic Security Labs General Mar 17

Get started with Elastic Security from your AI agent

Go from zero to a fully populated Elastic Security environment without leaving your IDE, using open source Agent Skills.

Elastic Security Labs →

Cloudflare Blog General Cloudflare Mar 16

Standing up for the open Internet: why we appealed Italy’s "Piracy Shield" fine

Cloudflare is appealing a €14 million fine from Italian regulators over "Piracy Shield," a system that forces providers to block content without oversight. W...

Cloudflare Blog →

Graham Cluley General Mar 16

Free parking in Russia after Distributed Denial-of-Service attack knocks city’s parking system offline

Drivers in the Russian city of Perm have been enjoying an unexpected bonus this week: free parking. Not because the city council suddenly decided to embrace ...

T1598

Graham Cluley →

Microsoft Security Blog General Microsoft Mar 16

New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation

As organizations adopt AI, security and governance remain core primitives for safe AI transformation and acceleration. The post New Microsoft Purview innovat...

Microsoft Security Blog →

Check Point Research General Check Point Intel Mar 16

16th March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES United St...

Check Point Research →

Infosecurity Magazine General Amazon Mar 16

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data

T1041

Infosecurity Magazine →

Infosecurity Magazine General Mar 16

UK: Companies House Web Glitch Exposes Corporate Details to Fraudsters

An issue with the Companies House website has put the personal and corporate information of millions at risk

Infosecurity Magazine →

Schneier on Security General Mar 16

Possible New Result in Quantum Factorization

I’m skeptical about—and not qualified to review—this new result in factorization with a quantum computer, but if it’s true it’s a theoretical improvement in ...

Schneier on Security →

« Prev 1 ... 40 41 42 43 44 ... 60 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA