FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media General 1d ago

4 steps teams can take to mitigate Iranian cyberattacks on critical infrastructure

Too many teams have not looked for Iranian pre-positioning into OT networks – here are some practical steps to take as the war escalates.

SC Media →

SC Media Vulnerability Disclosure Apple 1d ago

Apple expands updates to iOS 18 devices affected by DarkSword exploit

Experts say Apple’s move shows it understood that older iOS and iPadOS devices were vulnerable and being exploited by DarkSword.

SC Media →

SC Media Malware Google SAP 1d ago

NoVoice Android malware steals WhatsApp data via Google Play apps

The NoVoice operation, identified by McAfee, concealed malicious components within the com.facebook.

SC Media →

SC Media General 1d ago

Thousands of API credentials exposed on public websites

The study, detailed in a preprint paper by Standford University, University of California, Davis, and TU Delft researchers, utilized a tool called TruffleHog...

SC Media →

SC Media General 1d ago

Exabeam expands platform to monitor AI agent activity

The expanded platform transforms AI agent services into sources of behavior telemetry, feeding directly into Exabeam's threat detection workflows.

SC Media →

SC Media Malware 1d ago

CrystalRAT malware-as-a-service offers remote access and prankware features

CrystalRAT, which first appeared in January, operates on a tiered subscription model and shares significant similarities with the WebRAT (Salat Stealer) malw...

T1588

SC Media →

SC Media General 1d ago

Gartner report offers framework for evaluating AI SOC agents

A recent Gartner report, "Validate the Promises of AI SOC Agents With These Key Questions," provides a structured evaluation framework.

SC Media →

SC Media TTPs SAP 1d ago

Phishing campaign delivers Casbaneiro and Horabot banking trojans

The threat actor, identified as Brazilian cybercrime group Augmented Marauder and Water Saci, employs a unique delivery mechanism involving WhatsApp, ClickFi...

T1566

SC Media →

SC Media Ransomware 1d ago

Ransomware attackers increasingly exploit legitimate IT tools, bypassing antivirus

Attackers are leveraging tools like Process Hacker and IOBit Unlocker, which possess deep operating system access.

SC Media →

SC Media Vulnerability Disclosure 1d ago

Claude Code vulnerable to prompt injection due to subcommand limit

The vulnerability was discovered by Adversa, a security firm, after the leak of Claude Code's source code.

SC Media →

SC Media Malware Apple SAP 1d ago

WhatsApp warns of spyware in fake iPhone app

WhatsApp accused Italian spyware firm SIO of creating the fake app.

SC Media →

SC Media Ransomware 2d ago

Hasbro confirms cyberattack, expects weeks-long resolution

The specific type of cyberattack, such as ransomware, has not been disclosed by Hasbro.

SC Media →

SC Media General 2d ago

Rethinking identity security for a borderless attack surface

Identity is the heart of modern security. Here's how to reshape your identity environment accordingly.

SC Media →

SC Media Campaigns Microsoft Amazon SAP 2d ago

Campaign combines WhatsApp with legit cloud platforms to deliver malicious VBS files

Attackers continue to evade defenders by using legitimate platforms like AWS and Microsoft utilities.

SC Media →

SC Media General 3d ago

Report: Americans concerned about government management of personal data

StateScoop reports that the majority of Americans seek more control over data sharing across the U.S.

SC Media →

SC Media General 3d ago

AI implementation influenced by cybersecurity risks, survey shows

A KPMG poll found that cybersecurity is one of the main risks impacting corporate executives' decisions about adopting AI, according to Cybersecurity Dive.

SC Media →

SC Media Ransomware 3d ago

Cyberattacks powered by stolen credentials on the rise

Cybersecurity incidents are increasingly centered on identity abuse, where stolen login credentials serve as the primary entry point for attackers, and the g...

T1078 T1598

SC Media →

SC Media Data Breach 3d ago

Claude Code source code inadvertently leaked

Anthropic, the firm behind Claude Code, has accidentally included an unobfuscated TypeScript source in the AI coding tool's npm package, exposing over 500,00...

SC Media →

SC Media Ransomware 3d ago

Monetization of ransomware-stolen data touted by new cybercrime service

Affiliates and customers are being sought by the new Leak Bazaar cybercrime service, which was reported by Flare researchers to be promoted across the dark w...

T1041

SC Media →

SC Media Campaigns 3d ago

Bogus LinkedIn message alerts enable credential siphoning

Malicious actors have been distributing fraudulent LinkedIn alert messages for potential job opportunities to facilitate credential exfiltration in a new phi...

T1566 T1041

SC Media →

« Prev 1 2 3 4 5 ... 14 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA