FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Transportation

20 articles

SC Media Phishing Microsoft 1d ago

Global Microsoft device code phishing facilitated by novel EvilTokens kit

BleepingComputer reports that organizations around the world, particularly in the U.S.

T1566

SC Media →

Help Net Security General Amazon Cloudflare 1d ago

AWS, Wasabi, Cloudflare, and Backblaze go head-to-head in new cloud storage test

Cloud storage buyers rarely get vendor-provided performance data that includes the vendor’s own weak spots. Backblaze’s Q1 2026 Performance Stats report, att...

Help Net Security →

Security Affairs Data Breach 1d ago

Hasbro hit by cyberattack, investigates possible data breach

Hasbro suffers a cyberattack, disrupting some operations; the company is probing the scope and potential data compromise. Toy giant Hasbro reported a cyberat...

Security Affairs →

SC Media General 1d ago

Gartner report offers framework for evaluating AI SOC agents

A recent Gartner report, "Validate the Promises of AI SOC Agents With These Key Questions," provides a structured evaluation framework.

SC Media →

Wordfence Blog Vulnerability Disclosure Intel WordPress 2d ago

Wordfence Intelligence Weekly WordPress Vulnerability Report (March 23, 2026 to March 29, 2026)

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were that contributed to WordPres...

Wordfence Blog →

Help Net Security General 2d ago

OpenSSH 10.3 patches five security bugs and drops legacy rekeying support

OpenSSH 10.3 shipped carrying five security fixes alongside feature additions and a set of behavior changes that will break compatibility with older SSH impl...

Help Net Security →

Help Net Security General Red Hat Linux 2d ago

New Red Hat subscription simplifies long-term enterprise Linux support

Red Hat has announced Red Hat Enterprise Linux Extended Life Cycle Premium, a new subscription that provides a predictable 14-year life cycle for major Red H...

Help Net Security →

Cloudflare Blog General Cloudflare 2d ago

Why we're rethinking cache for the AI era

The explosion of AI-bot traffic, representing over 10 billion requests per week, has opened up new challenges and opportunities for cache design. We look at ...

Cloudflare Blog →

The Hacker News General Docker 2d ago

The State of Trusted Open Source Report

In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source...

The Hacker News →

Help Net Security Vulnerability Disclosure Apple 2d ago

DarkSword exploit forces Apple to loosen its patching policy

Apple has extended security updates to a wider range of devices still running iOS 18, aiming to protect users from the DarkSword exploit kit. This is not the...

T1588

Help Net Security →

The Hacker News Malware Apple SAP 2d ago

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with...

T1204

The Hacker News →

Information Security Buzz General Amazon 2d ago

The European Commission confirms attack on its Europa web platform

The European Commission has confirmed a cyberattack affecting its Europa.eu web platform, with initial reports indicating that the attackers accessed the dat...

Information Security Buzz →

The Hacker News Vulnerability Disclosure Apple 2d ago

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

Apple on Wednesday expanded the availability of iOS 18.7.

T1588

The Hacker News →

Elastic Security Labs Malware Linux 2d ago

Hooked on Linux: Rootkit Detection Engineering

In this second part of a two-part series, we explore Linux rootkit detection engineering, focusing on the limitations of static detection reliance, and the i...

Elastic Security Labs →

Recorded Future General 2d ago

Latin America and the Caribbean Cybercrime Landscape

This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025.

Recorded Future →

CSO Online Vulnerability Disclosure 2d ago

7 ways to improve your business resilience with backup and recovery

When your network goes down, your business stops. That’s a stark truth we see confirmed daily in incident response—and N-able’s 2026 State of the SOC Report ...

CSO Online →

CSO Online General 2d ago

5 Steps to break free from alert fatigue and build resilient security operations

How many times has your SOC hit crisis mode at 2:00 AM, with the dashboard blaring red and analysts scrambling to separate real threats from useless noise? W...

CSO Online →

CSO Online General 2d ago

6 critical mistakes that undermine cyber resilience (and how to fix them)

Silos are the enemy of business resilience. As IT leaders, we’ve all felt the pain: the backup administrator, SOC analyst, and endpoint engineer operating in...

CSO Online →

CSO Online General 2d ago

5 critical steps to achieve business resilience in cybersecurity

What does it really take to keep your organization running when attackers strike? The answer is business resilience—being able to detect, contain, and recove...

CSO Online →

The Record Ransomware 2d ago

North Dakota water treatment plant reports March ransomware attack

A water treatment plant in the city of Minot, North Dakota, was hit with ransomware but city officials said it continues to operate normally.

The Record →

« Prev 1 2 3 4 ... 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA