FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Palo Alto Networks F5 Oracle Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Transportation

20 articles

Mandiant Blog Campaigns Google Intel Feb 12

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use

Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (A...

T1204 T1592

Mandiant Blog →

Infosecurity Magazine General Feb 12

AI Skills Represent Dangerous New Attack Surface, Says TrendAI

New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts

Infosecurity Magazine →

Recorded Future Ransomware Intel Feb 12

State of Security Report | Recorded Future

Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored oper...

Recorded Future →

Krebs on Security Malware Feb 11

Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentraliz...

Krebs on Security →

Infosecurity Magazine Ransomware Jan 29

Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups

Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report

Infosecurity Magazine →

Infosecurity Magazine Phishing Okta Jan 26

Okta Flags Customized, Reactive Vishing Attacks Which Bypass MFA

Threat actors posing as IT support teams use phishing kits to generate fake login sites in real-time to trick victims into handing over credentials

T1566

Infosecurity Magazine →

Google Project Zero General Microsoft Jan 26

Bypassing Windows Administrator Protection

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

Google Project Zero →

Infosecurity Magazine General Jan 21

Report Fraud Promises to Streamline Fight Against Economic Crime

City of London Police has launched the UK’s national Report Fraud service

Infosecurity Magazine →

Infosecurity Magazine General Jan 20

AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'

Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report

Infosecurity Magazine →

Infosecurity Magazine General Jan 16

Account Compromise Surged 389% in 2025, Says eSentire

An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025

T1078

Infosecurity Magazine →

Google Project Zero Vulnerability Disclosure Google Jan 14

A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?

While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our e...

T1598

Google Project Zero →

WeLiveSecurity General Dec 16

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

WeLiveSecurity →

Exploit Database Vulnerability Disclosure Dec 16

[webapps] Summar Employee Portal 3.98.0 - Authenticated SQL Injection

Summar Employee Portal 3.98.

Exploit Database →

Mandiant Blog CVE Google Intel Dec 12

Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)

Written by: Aragorn Tseng, Robert Weiner, Casey Charrier, Zander Work, Genevieve Stark, Austin Larsen Introduction On Dec. 3, 2025, a critical unauthenticate...

T1190 1 IOC

Mandiant Blog →

Trail of Bits General Dec 12

Catching malicious package releases using a transparency log

We’re getting Sigstore’s rekor-monitor ready for production use, making it easier for developers to detect tampering and unauthorized uses of their identitie...

T1598

Trail of Bits →

Google Security Blog General Google Dec 8

Architecting Security for Agentic Capabilities in Chrome

Posted by Nathan Parker, Chrome security team Chrome has been advancing the web’s security for well over 15 years, and we’re committed to meeting new challen...

Google Security Blog →

WeLiveSecurity General GitHub Dec 1

Oversharing is not caring: What’s at stake if your employees post too much online

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into tr...

WeLiveSecurity →

Google Security Blog General Google Nov 20

Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing

Posted by Dave Kleidermacher, VP, Platforms Security & Privacy, Google Technology should bring people closer together, not create walls. Being able to commun...

Google Security Blog →

WeLiveSecurity Campaigns Nov 7

The who, where, and how of APT attacks in Q2 2025–Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report

WeLiveSecurity →

WeLiveSecurity Campaigns Nov 6

ESET APT Activity Report Q2 2025–Q3 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025

WeLiveSecurity →

« Prev 1 ... 9 10 11 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA