FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

General

20 articles

SC Media General Google 3d ago

Google paper reveals quantum computing threat to cryptocurrency

A paper published by Google indicates that a quantum computer with 500,000 qubits could be used to steal cryptocurrency, a significantly lower threshold than...

SC Media →

SC Media General 3d ago

FCC bans import of new foreign-made consumer routers due to security risks

The FCC has added all foreign-produced consumer-grade routers to its Covered List, prohibiting their marketing and sale in the U.S.

SC Media →

BleepingComputer General 3d ago

Routine Access Is Powering Modern Intrusions, a New Threat Report Finds

Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, ...

T1204

BleepingComputer →

SC Media General 3d ago

FBI warns Americans about data risks in foreign-developed mobile apps

The FBI's public service announcement details how certain mobile apps may continuously collect user data, even when permissions are granted only for active use.

SC Media →

SecurityWeek General 3d ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

The agency has not named the problematic foreign-made applications, but TikTok and Temu come to mind. The post FBI Warns of Data Security Risks From China-Ma...

SecurityWeek →

SC Media General Google 3d ago

Free Android VPNs expose users to tracking and risky servers, research finds

The analysis, using MobSF, focused on app permissions, third-party trackers, hardcoded network endpoints, and developer emails.

SC Media →

SecurityWeek General 3d ago

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta exploited smart contract vulnerabilities to steal approximately $55 million in cryptocurrency and cause Uranium to shut down. The post US ...

SecurityWeek →

Help Net Security General Microsoft Google 3d ago

Exabeam expands ABA to detect AI agent threats across ChatGPT, Copilot, and Gemini

Exabeam has announced the expansion of Exabeam Agent Behavior Analytics (ABA). Without direct visibility into how employees use AI assistants, what they quer...

Help Net Security →

SentinelOne Blog General 3d ago

The Implementation Blind Spot | Why Organizations Are Confusing Temporary Friction with Permanent Safety

Our new blog post explores the ‘cognitive rust belt’ — how AI friction masks skill loss and why organizations must act now.

SentinelOne Blog →

Help Net Security General Microsoft Oracle Apache 3d ago

CIS Benchmarks March 2026 Update

The following CIS Benchmarks and CIS Build Kits have been updated or recently released. The Center for Internet Security has highlighted the major updates be...

Help Net Security →

Rapid7 Blog General Rapid7 3d ago

What CISOs Should Expect from AI Powered MDR in 2026, According to Rapid7 CEO Corey Thomas

In the latest episode of Rapid7’s Experts on Experts, I’m joined by Rapid7 CEO Corey Thomas for a candid conversation about where AI is genuinely changing se...

Rapid7 Blog →

Cloudflare Blog General 3d ago

Our ongoing commitment to privacy for the 1.1.1.1 public DNS resolver

Eight years ago, we launched 1.1.

1 IOC

Cloudflare Blog →

Cloudflare Blog General Oracle WordPress 3d ago

Introducing EmDash — the spiritual successor to WordPress that solves plugin security

Today we are launching the beta of EmDash, a full-stack serverless JavaScript CMS built on Astro 6.0.

Cloudflare Blog →

The Hacker News General 3d ago

Block the Prompt, Not the Work: The End of "Doctor No"

There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build.

The Hacker News →

The Record General 3d ago

Romania under daily barrage of cyberattacks, defense minister says

Romanian government institutions are facing thousands of cyberattack attempts every day targeting a wide range of public institutions, Defense Minister Radu ...

The Record →

GBHackers General Microsoft 3d ago

Microsoft Teams to Improve Privacy With EXIF Data Removal Feature

Microsoft is rolling out a wave of privacy and security updates for Microsoft Teams, headlining with a critical new feature that automatically removes EXIF m...

GBHackers →

BleepingComputer General 3d ago

FBI warns against using Chinese mobile apps due to privacy risks

The U.S.

BleepingComputer →

GBHackers General 3d ago

Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2026

In today’s fast-paced software development world, where applications are released at an unprecedented rate, ensuring their security is more critical than eve...

GBHackers →

SC Media General 3d ago

Venom Stealer MaaS handles attacks from ClickFix to crypto theft

The stealer persists on the victim’s machine and immediately exfiltrates data with no local staging.

T1041

SC Media →

CSO Online General 3d ago

Hacker zielen auf Exilportal Iranwire

Unbekannte sollen das Exilportal Iranwire gehackt haben. PX Media – shutterstock.

1 IOC

CSO Online →

« Prev 1 ... 5 6 7 8 9 ... 52 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA