FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Media

20 articles

CSO Online General Mar 25

AI is breaking traditional security models — Here’s where they fail first

Traditionally, enterprise security operating models operated a fixed and regular cycle: Findings surfaced through periodic scans, security teams triaged resu...

CSO Online →

Infosecurity Magazine Vulnerability Disclosure Citrix Mar 24

Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities

A critical vulnerability in Citrix’s NetScaler products allows unauthenticated remote attackers to leak information from the appliance's memory

Infosecurity Magazine →

Security Affairs CVE Citrix Mar 24

Citrix NetScaler critical flaw could leak data, update now

Citrix warns of a critical NetScaler flaw (CVE-2026-3055) that could leak sensitive data; users are urged to apply security updates immediately. Citrix issue...

1 IOC

Security Affairs →

Graham Cluley General Mar 20

Denver’s crosswalks hacked to broadcast anti-Trump messages

Pedestrians crossing a street in Denver, Colorado, got rather more than they bargained for last weekend, when the audio signals at two crosswalks began broad...

Graham Cluley →

Rapid7 Blog CVE Rapid7 Mar 20

CVE-2026-31381, CVE-2026-31382: Gainsight Assist Information Disclosure and Cross-Site Scripting (FIXED)

Overview Rapid7 Labs recently identified a chain of security vulnerabilities in the Gainsight Assist plugin and its interactions with the associated domain a...

T1203 T1592 3 IOCs

Rapid7 Blog →

Infosecurity Magazine Vulnerability Disclosure Rapid7 Mar 18

AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure

Rapid7 says median time from publication to CISA KEV inclusion dropped to five days

Infosecurity Magazine →

Information Security Buzz General Mar 17

ShinyHunters Claims It Stole 1PB of Data from TELUS Digital

TELUS Digital has fallen victim to a security incident in which unsanctioned actors accessed its systems. Upon learning of this incident, the company said it...

Information Security Buzz →

Recorded Future General Mar 12

February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January

February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate reme...

Recorded Future →

Cisco Advisories Vulnerability Disclosure Apple Cisco Mar 11

Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability

A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software could allow an unauthentica...

T1498

Cisco Advisories →

Graham Cluley General Mar 10

Twitter suspended 800 million accounts last year – so why does manipulation remain so rampant?

Elon Musk's social media site says it suspended 800 million accounts in a year for spam and manipulation - but with state-backed campaigns still flooding the...

Graham Cluley →

Zero Day Initiative CVE Mar 6

ZDI-26-165: GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exp...

T1190 1 IOC

Zero Day Initiative →

Cisco Advisories Vulnerability Disclosure Cisco Mar 5

Cisco Secure Firewall Management Center Software Command Injection Vulnerability

A vulnerability in the lockdown mechanism of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, local attacker to perform a...

T1059

Cisco Advisories →

Infosecurity Magazine Zero-Day Cisco Feb 26

Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day

The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation

Infosecurity Magazine →

Palo Alto Networks General Palo Alto Networks Feb 17

Introducing Unit 42 Managed XSIAM 2.0

Unit 42 Managed XSIAM 2.0 delivers a 24/7 managed SOC with continuous detection, investigation, and full-cycle remediation.

Palo Alto Networks →

Infosecurity Magazine General Feb 9

Social Media Platforms Earn Billions from Scam Ads

Revolut claims social media sites make £3.

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 28

Emojis in PureRAT’s Code Point to AI-Generated Malware Campaign

Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media.

Infosecurity Magazine →

Google Project Zero Vulnerability Disclosure Linux Jan 14

A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave

With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the res...

T1190

Google Project Zero →

Google Project Zero Vulnerability Disclosure Google Jan 14

A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Google Project Zero →

WeLiveSecurity General Jan 14

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.

T1598

WeLiveSecurity →

Recorded Future Vulnerability Disclosure Dec 8

Critical React2Shell Vulnerability Under Active Exploitation by Chinese Threat Actors

A critical vulnerability in React Server Components is allegedly being actively exploited by multiple Chinese threat actors, Recorded Future recommends organ...

Recorded Future →

« Prev 1 2 3 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA