FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Rapid7 Oracle Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General Jan 29

US Data Breaches Hit Record High but Victim Numbers Decline

Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025

Infosecurity Magazine →

Trail of Bits General Docker Jan 29

Building cryptographic agility into Sigstore

Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic ...

T1598

Trail of Bits →

Infosecurity Magazine General Jan 29

Number of Cybersecurity Pros Surges 194% in Four Years

Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura

Infosecurity Magazine →

Infosecurity Magazine General Jan 29

Cybersecurity Teams Embrace AI, Just Not at the Scale Marketing Suggests

Despite the seemingly widespread adoption of AI for security operations, security leaders primarily use it for “relatively basic use cases,” said a Sumo Logi...

Infosecurity Magazine →

Infosecurity Magazine General Amazon Jan 28

Autonomous System Uncovers Long-Standing OpenSSL Flaws

A recent update has fixed 12 vulnerabilities in OpenSSL, some existing in the codebase for years

Infosecurity Magazine →

Mandiant Blog General Google Intel Jan 28

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Introduction This week Google and partners took action to disrupt what we believe is one of the largest residential proxy networks in the world, the IPIDEA p...

Mandiant Blog →

Infosecurity Magazine General Zscaler Jan 28

AI Security Threats Loom as Enterprise Usage Jumps 91%

Zscaler analysts found critical vulnerabilities in 100% of enterprise AI systems, with 90% compromised in under 90 minutes

Infosecurity Magazine →

Infosecurity Magazine General Jan 28

Researchers Uncover 454,000+ Malicious Open Source Packages

Sonatype warns that open source threats became industrialized with a surge in malicious packages in 2025

T1598

Infosecurity Magazine →

Infosecurity Magazine General Jan 28

Chinese Money Launderers Drive Global Ecosystem Worth $82bn

Chainalysis claims Chinese money launderers now account for 20% of global activity

Infosecurity Magazine →

Google Security Blog General Google Jan 27

New Android Theft Protection Feature Updates: Smarter, Stronger

Posted by Nataliya Stanetsky, Fabricio Ferracioli, Elliot Sisteron, Irene Ang of the Android Security Team Phone theft is more than just losing a device; it'...

Google Security Blog →

Infosecurity Magazine General Jan 27

PeckBirdy Framework Tied to China-Aligned Cyber Campaigns

PeckBirdy command-and-control framework targeting gambling, government sectors in Asia since 2023 has been linked to China-aligned APTs

Infosecurity Magazine →

Infosecurity Magazine General Jan 27

Over 80% of Ethical Hackers Now Use AI

Bugcrowd study reveals 82% of security researchers now use AI, a big increase from 2023 figures

Infosecurity Magazine →

WeLiveSecurity General Jan 27

Drowning in spam or scam emails? Here’s probably why

Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.

WeLiveSecurity →

Infosecurity Magazine General Jan 26

CISA Releases List of Post-Quantum Cryptography Product Categories

CISA released initial list of PQC-capable hardware and software to guide companies amid quantum threats

Infosecurity Magazine →

Google Project Zero General Microsoft Jan 26

Bypassing Windows Administrator Protection

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

Google Project Zero →

WeLiveSecurity General Jan 23

Children and chatbots: What parents should know

As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development

WeLiveSecurity →

Infosecurity Magazine General WordPress Jan 22

RealHomes CRM Plugin Flaw Affected 30,000 WordPress Sites

Security flaw in RealHomes CRM plugin allowed file uploads; patches released for 30,000+ sites

Infosecurity Magazine →

Infosecurity Magazine General Jan 22

UK Executives Warn They May Not Survive a Major Cyber-Attack, Vodafone Survey Finds

UK Executives Warn They May Not Survive a Major Cyber-Attack, Vodafone Survey Finds

Infosecurity Magazine →

Infosecurity Magazine General Jan 22

Over 160,000 Companies Notify Regulators of GDPR Breaches

DLA Piper finds 22% increase in breached firms notifying European GDPR regulators

Infosecurity Magazine →

WeLiveSecurity General Apple Jan 22

Common Apple Pay scams, and how to stay safe

Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead

WeLiveSecurity →

« Prev 1 ... 51 52 53 54 55 ... 60 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA