FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media General 23h ago

Breaking the trade-off: Full email security without deployment friction

How API-based security is redefining email protection in the face of escalating human risk.

SC Media →

SC Media General 1d ago

DexterBot, Darksword, Eviltokens, Tubular Bells, Claude, Drift, Gmail, Josh Marpet... - SWN #569

SC Media →

SC Media Campaigns 1d ago

Stryker back online after cyberattack

BleepingComputer reports that major U.S.

SC Media →

SC Media General 1d ago

Over 257K compromised in Texas hospital hack

Texas-based Nacogdoches Memorial Hospital had personal and medical information from 257,073 patients stolen following a cyberattack in January, Cybernews rep...

SC Media →

SC Media Data Breach 1d ago

Brokk purportedly hacked by Play ransomware, data leaked

Brokk, a leading Swedish global remote-controlled demolition machinery manufacturer, had a 4 GB dataset allegedly stolen from its systems exposed by the Russ...

SC Media →

SC Media Campaigns Microsoft GitHub 1d ago

Malicious LNK files, GitHub leveraged in South Korea-targeted malware campaign

Infosecurity Magazine reports that Windows users across South Korea have been subjected to attacks involving illicit LNK files that trigger multi-stage compr...

SC Media →

SC Media Campaigns 1d ago

Bogus installers facilitate RAT, cryptominer spread in long-running operation

Threat operation REF1695 has been harnessing counterfeit installers to facilitate multiple attack campaigns delivering remote access trojans and cryptocurren...

SC Media →

SC Media Ransomware 1d ago

Accelerated Akira ransomware intrusions examined

CyberScoop reports that increasingly efficient techniques have significantly reduced the Akira ransomware operation's attack times.

SC Media →

SC Media Data Breach Amazon 1d ago

Multiple EU entities impacted by European Commission breach, CERT-EU says

At least 29 other European Union entities were disclosed by CERT-EU to have had their data compromised following the TeamPCP supply chain attack against the ...

T1195

SC Media →

SC Media Campaigns 1d ago

Threat actors impersonate CERT-UA, distribute AGEWHEEZE malware

The campaign targeted approximately 1 million users across various sectors, including government, healthcare, education, and finance.

SC Media →

SC Media General 1d ago

The complexity crisis in network security: Why policy governance matters

Only firm policy governance can tame the rampant growth of complexity across enterprise environments.

SC Media →

SC Media Malware Apple 1d ago

Axios maintainer’s post mortem confirms social engineering by UNC1069

Jason Saayman says he installed a remote access trojan disguised as a Teams update.

T1204

SC Media →

SC Media General 1d ago

Duc App exposes hundreds of thousands of personal records due to server misconfiguration

The exposed data included unencrypted driver's licenses, passports, and other identity verification documents, along with selfies and personal information su...

SC Media →

SC Media Malware Google 1d ago

Storm infostealer bypasses Chrome encryption, targets crypto wallets

Discovered by Varonis Threat Labs, Storm infostealer operates as a malicious subscription service, targeting multiple browsers like Chrome, Edge, Firefox, an...

SC Media →

SC Media Vulnerability Disclosure 1d ago

Fraudsters exploit vacant properties and postal services for identity theft

The tutorial, analyzed by Flare, outlines a low-cost, difficult-to-detect workflow that begins with identifying vacant residential properties, often found by...

SC Media →

SC Media General 1d ago

Residential proxies undermine IP reputation systems, researchers warn

A recent analysis by GreyNoise, examining 4 billion malicious sessions, found that approximately 39% originated from home networks, likely part of residentia...

SC Media →

SC Media Data Breach Zscaler GitHub 1d ago

Claude Code leak leveraged to distribute malware

Researchers at Zscaler's ThreatLabz discovered a GitHub repository disguised as a leaked TypeScript source code for Anthropic's Claude Code CLI.

SC Media →

SC Media Data Breach 1d ago

Internet-connected coffee machine reportedly led to data breach

A digital forensics investigator, identified only as TR, was called in when a client suspected a rival had infiltrated their systems after a data breach.

SC Media →

SC Media Malware Linux 1d ago

Chaos malware now targeting 64-bit Linux servers

Analysis of China-nexus groups also discovers double-pronged strategy, one on immediacy, the other around long dwell times.

SC Media →

SC Media General Intel 1d ago

ISC2 integrates AI security into cybersecurity certifications

The new Exam Guidance for Artificial Intelligence maps AI concepts across more than 50 core cybersecurity exam domains.

SC Media →

1 2 3 ... 14 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA