FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Fortinet
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Exploit Database General Jan 17

[webapps] Siklu EtherHaul Series EH-8010 - Remote Command Execution

Siklu EtherHaul Series EH-8010 - Remote Command Execution

Exploit Database →

Infosecurity Magazine General Jan 16

Account Compromise Surged 389% in 2025, Says eSentire

An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025

T1078

Infosecurity Magazine →

WeLiveSecurity General Jan 16

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they...

WeLiveSecurity →

Infosecurity Magazine General Jan 15

Global Agencies Release New Guidance to Secure Industrial Networks

CISA, NCSC and the FBI have released a new security guide to enhance protection for OT environments

Infosecurity Magazine →

Infosecurity Magazine General Jan 15

CISO Role Reaches “Inflexion Point” With Executive-Level Titles

IANS Research reveals a growth in executive-level CISO titles, amid resource challenges

Infosecurity Magazine →

Mandiant Blog General Jan 15

Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation

Written by: Nic Losby Introduction Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating...

T1078

Mandiant Blog →

WeLiveSecurity General Jan 14

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.

T1598

WeLiveSecurity →

WeLiveSecurity General Jan 13

Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.

WeLiveSecurity →

Mandiant Blog General Salesforce Jan 12

AuraInspector: Auditing Salesforce Aura for Data Exposure

Written by: Amine Ismail, Anirudha Kanodia Introduction Mandiant is releasing AuraInspector, a new open-source tool designed to help defenders identify and a...

Mandiant Blog →

Recorded Future General Intel Adobe Jan 9

Practitioners Reveal What Makes Threat Intelligence Programs Mature

Threat intelligence practitioners from Global Payments, Adobe, and Superhuman reveal how mature CTI programs transform data overload into strategic business ...

Recorded Future →

Recorded Future General Jan 7

GRU-Linked BlueDelta Evolves Credential Harvesting

Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe ...

Recorded Future →

SentinelOne Blog General Jan 6

When Your AI Coding Plugin Starts Picking Your Dependencies: Marketplace Skills and Dependency Hijack in Claude Code

Learn how AI coding assistants managing dependencies via plugins are now creating a new supply-chain risk when automation is compromised.

SentinelOne Blog →

Trail of Bits General Dec 31

Detect Go’s silent arithmetic bugs with go-panikint

Go’s arithmetic operations on standard integer types are silent by default, meaning overflows “wrap around” without panicking. This behavior has hidden an en...

Trail of Bits →

WeLiveSecurity General Amazon Dec 29

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year

WeLiveSecurity →

Exploit Database General Dec 25

[webapps] Chained Quiz 1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie

Chained Quiz 1.3.

Exploit Database →

WeLiveSecurity General Dec 23

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.

WeLiveSecurity →

Recorded Future General Dec 22

Digital Threat Detection Tools & Best Practices

Explore digital threat detection tools and learn best practices to identify, analyze, and neutralize digital threats before they impact your business.

Recorded Future →

Trail of Bits General Dec 19

Can chatbots craft correct code?

I recently attended the AI Engineer Code Summit in New York, an invite-only gathering of AI leaders and engineers. One theme emerged repeatedly in conversati...

T1598

Trail of Bits →

Recorded Future General Dec 17

Cyber on the Geopolitical, Battlefield: Beyond the, “Big Fourˮ

Offensive cyber operations are spreading beyond the Big Four. Discover how regional conflicts are driving new state-linked cyber threats.

Recorded Future →

WeLiveSecurity General Dec 16

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

WeLiveSecurity →

« Prev 1 ... 43 44 45 46 47 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA