FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Palo Alto Networks F5 Oracle Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine General Mar 3

Half of US CISOs Work the Equivalent of a Six-Day Week

Seemplicity finds US security leaders work 11 or more extra hours per week

Infosecurity Magazine →

Infosecurity Magazine Supply Chain Mar 3

Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks

Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches

T1195

Infosecurity Magazine →

Infosecurity Magazine Campaigns Zscaler Mar 3

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack

Infosecurity Magazine →

Infosecurity Magazine General Google Mar 2

Chrome Unveils Plan For Quantum-Safe HTTPS Certificates

Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS

Infosecurity Magazine →

Infosecurity Magazine Ransomware Google Intel Mar 2

Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel

John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist ca...

Infosecurity Magazine →

Infosecurity Magazine General Mar 2

Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity

Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Mar 2

ClawJacked Bug Enables Covert AI Agent Hijacking

Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent

Infosecurity Magazine →

Infosecurity Magazine Ransomware Mar 2

Ransomware Payments Decline 8% as Attacks Surge 50%

Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue

Infosecurity Magazine →

Infosecurity Magazine Data Breach Zscaler Feb 27

North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks

The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Amazon Feb 27

UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by 75%

The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two m...

Infosecurity Magazine →

Infosecurity Magazine Ransomware Feb 27

‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested

International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes

Infosecurity Magazine →

Infosecurity Magazine TTPs Feb 26

Aeternum Botnet Shifts Command Control to Polygon Blockchain

New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

Infosecurity Magazine →

Infosecurity Magazine Phishing Feb 26

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify

2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities

T1566

Infosecurity Magazine →

Infosecurity Magazine General Feb 26

Exploitable Vulnerabilities Present in 87% of Organizations

Datadog report reveals two-fifths of services are affected by exploitable bugs

Infosecurity Magazine →

Infosecurity Magazine General Feb 26

UK's Data Watchdog Gets a Makeover to Match Growing Demands

The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Feb 26

Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign

UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation

Infosecurity Magazine →

Infosecurity Magazine Zero-Day Cisco Feb 26

Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day

The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation

Infosecurity Magazine →

Infosecurity Magazine General Amazon IBM Feb 25

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws

Infosecurity Magazine →

Infosecurity Magazine General Feb 25

Malicious NuGet Package Targets Stripe Developers

Malicious NuGet package mimicking Stripe's library targeted developers

Infosecurity Magazine →

Infosecurity Magazine General Feb 25

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

A former general manager of a US defense contractor has been sentenced after selling zero days to Russia

Infosecurity Magazine →

« Prev 1 ... 5 6 7 8 9 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA