FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Cloudflare Check Point Oracle Rapid7 Palo Alto Networks WordPress
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

Infosecurity Magazine General Amazon Jan 20

Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps

2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

Prompt Injection Bugs Found in Official Anthropic Git MCP Server

Three vulnerabilities in Anthropic's Git server for the MCP can be exploited via prompt injection

Infosecurity Magazine →

Infosecurity Magazine General Microsoft Jan 20

Cyber Risks Among CEOs’ Top Worries Amid Weak Short Term Growth Outlook

PwC’s 29th Global CEO Survey shows cyber risk rising to the top of CEO concerns as confidence in short term business growth weakens

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'

Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

Scam Marketplace Tudou Guarantee Shutters Telegram Ops

A notorious marketplace for fraud, Tudou Guarantee, appears to have closed its public Telegram groups

Infosecurity Magazine →

WeLiveSecurity General Jan 20

Old habits die hard: 2025’s most common passwords were as predictable as ever

Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well

WeLiveSecurity →

Infosecurity Magazine General Jan 19

Russian Hacktivists Intensify Disruptive Cyber Pressure on UK Orgs

UK NCSC warned of disruptive cyber attacks by Russian hacktivists targeting critical infrastructure

Infosecurity Magazine →

Infosecurity Magazine General Google Jan 19

Malicious Google Chrome Extensions Hijack Workday and Netsuite

Users of widely used HR and ERP platforms targeted with malicious extensions which were available in the Chrome Web Store

Infosecurity Magazine →

Infosecurity Magazine General Atlassian Jan 19

Cyber Breaches, Compliance and Reputation Top UK Corporate Concerns

UK firms face confluence of cyber-related risks in 2026, says Nardello & Co

Infosecurity Magazine →

Exploit Database General Jan 17

[webapps] RPi-Jukebox-RFID 2.8.0 - Remote Command Execution

RPi-Jukebox-RFID 2.8.

Exploit Database →

Exploit Database General Jan 17

[webapps] Siklu EtherHaul Series EH-8010 - Arbitrary File Upload

Siklu EtherHaul Series EH-8010 - Arbitrary File Upload

Exploit Database →

Exploit Database General Jan 17

[webapps] Siklu EtherHaul Series EH-8010 - Remote Command Execution

Siklu EtherHaul Series EH-8010 - Remote Command Execution

Exploit Database →

Infosecurity Magazine General Jan 16

Account Compromise Surged 389% in 2025, Says eSentire

An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025

T1078

Infosecurity Magazine →

WeLiveSecurity General Jan 16

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they...

WeLiveSecurity →

Infosecurity Magazine General Jan 15

Global Agencies Release New Guidance to Secure Industrial Networks

CISA, NCSC and the FBI have released a new security guide to enhance protection for OT environments

Infosecurity Magazine →

Infosecurity Magazine General Jan 15

CISO Role Reaches “Inflexion Point” With Executive-Level Titles

IANS Research reveals a growth in executive-level CISO titles, amid resource challenges

Infosecurity Magazine →

Mandiant Blog General Jan 15

Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation

Written by: Nic Losby Introduction Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating...

T1078

Mandiant Blog →

WeLiveSecurity General Jan 14

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.

T1598

WeLiveSecurity →

WeLiveSecurity General Jan 13

Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.

WeLiveSecurity →

Mandiant Blog General Salesforce Jan 12

AuraInspector: Auditing Salesforce Aura for Data Exposure

Written by: Amine Ismail, Anirudha Kanodia Introduction Mandiant is releasing AuraInspector, a new open-source tool designed to help defenders identify and a...

Mandiant Blog →

« Prev 1 ... 52 53 54 55 56 ... 62 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA