FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Cloudflare Blog General Cloudflare 2d ago

Why we're rethinking cache for the AI era

The explosion of AI-bot traffic, representing over 10 billion requests per week, has opened up new challenges and opportunities for cache design. We look at ...

Cloudflare Blog →

The Hacker News General Google Amazon 2d ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just...

The Hacker News →

The Hacker News General Docker 2d ago

The State of Trusted Open Source Report

In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source...

The Hacker News →

BleepingComputer General Cisco 2d ago

Critical Cisco IMC auth bypass gives attackers Admin access

Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables ...

T1556

BleepingComputer →

BleepingComputer General Microsoft 2d ago

Microsoft links Classic Outlook issue to email delivery problems

Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com.

1 IOC

BleepingComputer →

CSO Online General 2d ago

Cybersecurity in the age of instant software

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant...

T1598

CSO Online →

Infosecurity Magazine General 2d ago

Most CNI Firms Face Up to £5m in Downtime from OT Attacks

E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks

Infosecurity Magazine →

SecurityWeek General 2d ago

Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents

Variance has raised a total of $26 million in funding and the latest investment will fuel platform growth. The post Variance Raises $21.

SecurityWeek →

GBHackers General 2d ago

New ZAP PTK Add-On Converts Browser Security Findings Into Native ZAP Alerts

The OWASP Zed Attack Proxy (ZAP) just received a massive upgrade for testing modern web applications. The release of the ZAP PTK Add-on 0.

GBHackers →

Information Security Buzz General Amazon 2d ago

The European Commission confirms attack on its Europa web platform

The European Commission has confirmed a cyberattack affecting its Europa.eu web platform, with initial reports indicating that the attackers accessed the dat...

Information Security Buzz →

Information Security Buzz General Intel 2d ago

Enterprise AI security: weighing the benefits and risks in 2026

The integration of artificial intelligence into core business systems, better known as enterprise AI, is moving fast, along with the threats around it. Secur...

Information Security Buzz →

Help Net Security General 2d ago

Trust, friction, and ROI: A CISO’s take on making security work for the business

In this Help Net Security interview, John O’Rourke, CISO at PPG, talks about what it means for security to drive business value. He explains how mature secur...

Help Net Security →

Help Net Security General 2d ago

Tracking drones with the 5G tower down the street

Drone detection in cities is expensive. Dedicated radar installations are cost-prohibitive at scale, cameras have limited range and stop working well at nigh...

Help Net Security →

Help Net Security General Microsoft 2d ago

Microsoft adds high-volume email sending to Exchange Online

Organizations that rely on Exchange Online for internal communications have long needed a way to send large volumes of automated messages, such as payroll no...

Help Net Security →

SecurityWeek General 2d ago

Linx Security Raises $50 Million for Identity Security and Governance

The company will accelerate product development, scale go-to-market efforts, and expand its global footprint. The post Linx Security Raises $50 Million for I...

SecurityWeek →

Help Net Security General 2d ago

Your customer passed authentication. So why are they sending money to a scammer?

In this Help Net Security video, Lenny Gusel, Head of Fraud Solutions in North America at Feedzai, explains how customer identity and access management has c...

Help Net Security →

CSO Online General 2d ago

Tools, um MCP-Server abzusichern

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.

5 IOCs

CSO Online →

SANS ISC General 2d ago

ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)

1 IOC

SANS ISC →

Elastic Security Labs General 2d ago

Prioritizing Alerts Triage with Higher-Order Detection Rules

Scaling SOC efficiency through multi-signal correlation and higher-order detection patterns.

Elastic Security Labs →

Recorded Future General 2d ago

Latin America and the Caribbean Cybercrime Landscape

This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025.

Recorded Future →

« Prev 1 ... 3 4 5 6 7 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA