FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Recorded Future

20 articles

Recorded Future Supply Chain Jan 21

PurpleBravo’s Targeting of the IT Software Supply Chain

Discover how PurpleBravo, a North Korean threat group, exploits fake job offers to target software supply chains, using RATs and infostealers like BeaverTail.

T1195

Recorded Future →

Recorded Future Vulnerability Disclosure Intel Jan 16

Threat and Vulnerability Management in 2026

Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today...

Recorded Future →

Recorded Future Ransomware Intel Jan 13

Best Ransomware Detection Tools

Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for ...

Recorded Future →

Recorded Future CVE Amazon Jan 13

December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity

December 2025 saw a 120% surge in critical CVEs, with 22 exploited flaws and React2Shell (CVE-2025-55182) dominating threat activity across Meta’s React fram...

1 IOC

Recorded Future →

Recorded Future General Intel Adobe Jan 9

Practitioners Reveal What Makes Threat Intelligence Programs Mature

Threat intelligence practitioners from Global Payments, Adobe, and Superhuman reveal how mature CTI programs transform data overload into strategic business ...

Recorded Future →

Recorded Future General Jan 7

GRU-Linked BlueDelta Evolves Credential Harvesting

Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe ...

Recorded Future →

Recorded Future Ransomware Jan 5

New ransomware tactics to watch out for in 2026

Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker ...

Recorded Future →

Recorded Future General Dec 22

Digital Threat Detection Tools & Best Practices

Explore digital threat detection tools and learn best practices to identify, analyze, and neutralize digital threats before they impact your business.

Recorded Future →

Recorded Future TTPs Dec 17

BlueDelta’s Persistent Campaign Against UKR.NET

Discover how Russia’s BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.

T1566 1 IOC

Recorded Future →

Recorded Future Zero-Day Dec 17

China’s Zero-Day Pipeline: From Discovery to Deployment

China is consolidating cyber power through zero-days. Explore how state control of vulnerabilities enables long-term strategic advantage.

Recorded Future →

Recorded Future Campaigns Intel Dec 17

The $0 Transaction That Signaled a Nation-State Cyberattack

A $0 card test signaled a Chinese state-linked cyberattack on Anthropic’s AI platform. Learn how card-testing fraud intelligence spots nation-state ops early.

Recorded Future →

Recorded Future General Dec 17

Cyber on the Geopolitical, Battlefield: Beyond the, “Big Fourˮ

Offensive cyber operations are spreading beyond the Big Four. Discover how regional conflicts are driving new state-linked cyber threats.

Recorded Future →

Recorded Future General Intel Dec 15

What’s Next for Enterprise Threat Intelligence in 2026

Top enterprise threat intelligence trends for 2026: AI-augmented CTI, unified platforms, workflow integration, data fusion, budgets, ROI, and maturity.

Recorded Future →

Recorded Future TTPs Dec 11

Palestine Action: Operations and Global Network

Explores Palestine Action’s post-designation global network, tactics, and targets, and evaluates key physical risks and mitigations for organizations.

Recorded Future →

Recorded Future General Dec 10

Implications of Russia-India-China Trilateral Cooperation

Examines Russia-India-China trilateral cooperation, U.S.

Recorded Future →

Recorded Future General Dec 9

GrayBravo’s CastleLoader Activity Clusters Target Multiple Industries

Recorded Future →

Recorded Future General Amazon Fortinet Dec 9

November 2025 CVE Landscape: 10 Critical Vulnerabilities Show 69% Drop from October

November 2025 CVE landscape: 10 exploited critical vulnerabilities, a 69% drop from October, and why Fortinet and Samsung flaws need urgent patching.

Recorded Future →

Recorded Future Supply Chain Dec 9

5 Real-Word Third-Party Risk Examples

Explore 5 third-party risk examples, from vendor data breaches to supply chain attacks and learn how third-party risk management can prevent cyberattacks.

T1195

Recorded Future →

Recorded Future General Intel Dec 8

When the Digital World Turns Physical: The Expanding Role of Threat Intelligence in Executive Protection

Discover how converged threat intelligence protects executives from deepfakes, doxxing, and cyber-enabled physical threats with Recorded Future.

Recorded Future →

Recorded Future Vulnerability Disclosure Dec 8

Critical React2Shell Vulnerability Under Active Exploitation by Chinese Threat Actors

A critical vulnerability in React Server Components is allegedly being actively exploited by multiple Chinese threat actors, Recorded Future recommends organ...

Recorded Future →

« Prev 1 2 3 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA