FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Palo Alto Networks F5 Oracle Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Transportation

20 articles

SC Media General Fortinet Mar 26

Aamir Lakhani on trends in Fortinet’s 2026 Global Threat Landscape Report

Aamir Lakhani discusses how cyber defenders should respond as AI accelerates attacks.

SC Media →

Infosecurity Magazine General Mar 26

Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code

Infosecurity Magazine →

SC Media General Apple Mar 26

Report: AI ambition outpaces operational reality

Auvik's 2026 IT Trends Report reveals a widening gap between AI ambition and execution, as IT teams grapple with visibility gaps, shadow IT, and staffing sho...

SC Media →

SC Media General Mar 26

Russia arrests alleged admin of LeakBase cybercrime forum

Russian law enforcement was reported to have apprehended the alleged administrator of the cybercrime forum LeakBase, reports The Hacker News.

SC Media →

SC Media Ransomware Mar 26

US imprisons Russian botnet operator linked to US-targeted ransomware attacks

Security Affairs reports that the U.S.

SC Media →

SC Media General Mar 26

Cyber risks against US escalate amid DHS shutdown, says CISA official

Cybersecurity risks faced by the U.S.

SC Media →

SC Media General Apple Mar 26

Cyberattack disrupts Puerto Rico's driver's license issuing agency

Officials at Puerto Rico's Department of Transportation have cancelled all upcoming driver's license, permit, and vehicle registration appointments at the Ce...

SC Media →

SC Media Phishing Microsoft Mar 26

Microsoft credential phishing weaponizes Bubble AI app builder

Microsoft credential phishing weaponizes Bubble AI app builder AI-powered no-code app-building platform Bubble has been exploited to create illicit web apps ...

T1566 T1598

SC Media →

SC Media Campaigns Google Mar 26

Updated GlassWorm attack campaign uncovered

Threat actors have used a multi-stage framework deploying a remote access trojan and a fake information-stealing Google Docs Offline extension for Chrome in ...

SC Media →

BleepingComputer General Google Apple SAP Mar 26

WhatsApp rolls out more AI features, iOS multi-account support

WhatsApp is rolling out multiple features designed to make the app easier to use, including AI-powered message replies and photo retouching, support for two ...

BleepingComputer →

The Hacker News Vulnerability Disclosure Google Mar 26

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to trigger malicious pr...

The Hacker News →

Help Net Security General Mar 26

Mission to smuggle $170 million worth of AI tech to China collapsed for three men

Three individuals, Stanley Yi Zheng, Matthew Kelly, and Tommy Shad English, have been charged with conspiracy to commit smuggling and export control violatio...

Help Net Security →

The Hacker News Vulnerability Disclosure Apple Linux Mar 26

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version of the same ex...

T1068 T1588

The Hacker News →

Schneier on Security General Mar 26

As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters

In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and w...

Schneier on Security →

Help Net Security General Mar 26

Reddit declares war on bad bot activity

Reddit is introducing changes to support interactions between people. The company is taking a bottom-up approach to help users understand when they are engag...

Help Net Security →

Help Net Security General Google Amazon Mar 26

AI SOC vendors are selling a future that production deployments haven’t reached yet

Vendors selling AI-powered security operations platforms have built their pitches around a consistent set of promises: autonomous threat investigation, drama...

Help Net Security →

SC Media General Intel Mar 26

Cyware's Sachin Jade on agentic AI and the future of threat intelligence operations

Cyware's Sachin Jade explores how organizations are embedding intelligence directly into security workflows and introducing AI agents to support investigatio...

SC Media →

Help Net Security General Oracle Linux Intel Mar 26

Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair

Many enterprise Linux deployments rely on hardware-level memory isolation to protect sensitive workloads from co-tenants and compromised hypervisors. Oracle’...

Help Net Security →

SC Media General Mar 25

AI coding tools must not propagate vulnerabilities, says NCSC head

UK National Cyber Security Centre CEO Richard Horne has called on security professionals at RSA Conference 2026 to harness the explosive growth of AI-assiste...

SC Media →

SC Media Campaigns Mar 25

Trojanized ConnectWise ScreenConnect installers deployed in tax-themed malvertising campaign

Intrusions weaponizing searches for illicit tax-related documents to spread trojanized ConnectWise ScreenConnect installers that facilitate a bring your own ...

T1189

SC Media →

« Prev 1 ... 4 5 6 7 8 ... 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA