FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Fortinet
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Google Project Zero General Microsoft Jan 26

Bypassing Windows Administrator Protection

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

Google Project Zero →

WeLiveSecurity General Jan 23

Children and chatbots: What parents should know

As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development

WeLiveSecurity →

Infosecurity Magazine General WordPress Jan 22

RealHomes CRM Plugin Flaw Affected 30,000 WordPress Sites

Security flaw in RealHomes CRM plugin allowed file uploads; patches released for 30,000+ sites

Infosecurity Magazine →

Infosecurity Magazine General Jan 22

UK Executives Warn They May Not Survive a Major Cyber-Attack, Vodafone Survey Finds

UK Executives Warn They May Not Survive a Major Cyber-Attack, Vodafone Survey Finds

Infosecurity Magazine →

Infosecurity Magazine General Jan 22

Over 160,000 Companies Notify Regulators of GDPR Breaches

DLA Piper finds 22% increase in breached firms notifying European GDPR regulators

Infosecurity Magazine →

WeLiveSecurity General Apple Jan 22

Common Apple Pay scams, and how to stay safe

Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead

WeLiveSecurity →

Infosecurity Magazine General Jan 21

EU Unveils Cybersecurity Overhaul with Proposed Update to Cybersecurity Act

The EU’s Cybersecurity Act 2.

Infosecurity Magazine →

Infosecurity Magazine General Jan 21

Report Fraud Promises to Streamline Fight Against Economic Crime

City of London Police has launched the UK’s national Report Fraud service

Infosecurity Magazine →

Infosecurity Magazine General Jan 21

Risk of AI Model Collapse to Drive Zero Trust Data Governance, Gartner Says

Gartner predicts 50% of organizations will adopt zero trust data governance by 2028

Infosecurity Magazine →

Infosecurity Magazine General Amazon Jan 20

Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps

2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

Prompt Injection Bugs Found in Official Anthropic Git MCP Server

Three vulnerabilities in Anthropic's Git server for the MCP can be exploited via prompt injection

Infosecurity Magazine →

Infosecurity Magazine General Microsoft Jan 20

Cyber Risks Among CEOs’ Top Worries Amid Weak Short Term Growth Outlook

PwC’s 29th Global CEO Survey shows cyber risk rising to the top of CEO concerns as confidence in short term business growth weakens

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'

Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

Scam Marketplace Tudou Guarantee Shutters Telegram Ops

A notorious marketplace for fraud, Tudou Guarantee, appears to have closed its public Telegram groups

Infosecurity Magazine →

WeLiveSecurity General Jan 20

Old habits die hard: 2025’s most common passwords were as predictable as ever

Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well

WeLiveSecurity →

Infosecurity Magazine General Jan 19

Russian Hacktivists Intensify Disruptive Cyber Pressure on UK Orgs

UK NCSC warned of disruptive cyber attacks by Russian hacktivists targeting critical infrastructure

Infosecurity Magazine →

Infosecurity Magazine General Google Jan 19

Malicious Google Chrome Extensions Hijack Workday and Netsuite

Users of widely used HR and ERP platforms targeted with malicious extensions which were available in the Chrome Web Store

Infosecurity Magazine →

Infosecurity Magazine General Atlassian Jan 19

Cyber Breaches, Compliance and Reputation Top UK Corporate Concerns

UK firms face confluence of cyber-related risks in 2026, says Nardello & Co

Infosecurity Magazine →

Exploit Database General Jan 17

[webapps] RPi-Jukebox-RFID 2.8.0 - Remote Command Execution

RPi-Jukebox-RFID 2.8.

Exploit Database →

Exploit Database General Jan 17

[webapps] Siklu EtherHaul Series EH-8010 - Arbitrary File Upload

Siklu EtherHaul Series EH-8010 - Arbitrary File Upload

Exploit Database →

« Prev 1 ... 42 43 44 45 46 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA