FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

SC Media

20 articles

SC Media Campaigns 3d ago

Report sheds more light on Phantom Stealer

Attacks involving the .NET-based Phantom Stealer, which has been bundled with a crypter and a remote access tool under the Phantom Project cybercrime kit, ha...

T1566

SC Media →

SC Media Zero-Day 3d ago

Attacks with TrueConf zero-day hit Southeast Asian governments

Suspected China-linked threat actors have weaponized a high-severity zero-day flaw in the TrueConf client video conferencing software, tracked as CVE-2026-35...

1 IOC

SC Media →

SC Media Campaigns Microsoft 3d ago

Widespread Microsoft 365 account compromise sought by Iran-linked hackers

Widespread Microsoft 365 account compromise sought by Iran-linked hackers More than 300 organizations in Israel, over 25 others in the United Arab Emirates, ...

T1110

SC Media →

SC Media Vulnerability Disclosure Cisco 3d ago

Trivy supply chain intrusion reportedly compromises Cisco source code

Cisco was reported to have had its source code stolen by threat actors following an attack linked to the recent supply chain attack against Aqua Security's T...

T1195

SC Media →

SC Media Campaigns Apple Amazon 3d ago

AWS environments targeted by TeamPCP

Threat operation TeamPCP, also known as PCPcat, DeadCatx3, and ShellForce, has tapped credentials siphoned from its sweeping supply chain attacks against Tri...

T1041 T1195

SC Media →

SC Media Campaigns Google Apple Intel 3d ago

North Korean hackers blamed for axios supply chain hack

North Korean threat operation UNC1069 was noted by the Google Threat Intelligence Group to have perpetrated the npm supply chain attack against the widely us...

T1195

SC Media →

SC Media General CrowdStrike 3d ago

Joint offering combines CrowdStrike's Falcon with HCLTech's AI Force

CrowdStrike and HCLTech have expanded their partnership with a new continuous threat exposure management service combining CrowdStrike's Falcon platform with...

SC Media →

SC Media General 3d ago

Proton launches privacy-focused video conferencing service

Proton Meet utilizes the Messaging Layer Security (MLS) protocol for end-to-end encryption, ensuring that all media and chat are encrypted client-side.

SC Media →

SC Media General Intel 3d ago

UAE faces surge in AI-powered cyberattacks

Hostile actors, including state-linked entities, are leveraging artificial intelligence tools such as ChatGPT and other platforms to conduct cyber operations.

SC Media →

SC Media Supply Chain 3d ago

AI startup Mercor confirms security incident linked to LiteLLM supply chain attack

The incident at Mercor is believed to stem from malicious code injected into the LiteLLM project, an open-source tool used by numerous companies to manage AI...

T1195

SC Media →

SC Media General Google 3d ago

Google paper reveals quantum computing threat to cryptocurrency

A paper published by Google indicates that a quantum computer with 500,000 qubits could be used to steal cryptocurrency, a significantly lower threshold than...

SC Media →

SC Media Ransomware Google 3d ago

Google Drive enhances ransomware protection with AI

The AI model, which has seen significant improvements since its beta phase, can now detect 14 times more ransomware infections at a faster rate.

SC Media →

SC Media General 3d ago

FCC bans import of new foreign-made consumer routers due to security risks

The FCC has added all foreign-produced consumer-grade routers to its Covered List, prohibiting their marketing and sale in the U.S.

SC Media →

SC Media General 3d ago

FBI warns Americans about data risks in foreign-developed mobile apps

The FBI's public service announcement details how certain mobile apps may continuously collect user data, even when permissions are granted only for active use.

SC Media →

SC Media Vulnerability Disclosure 3d ago

AI discovers RCE vulnerabilities in Vim and Emacs text editors

Vulnerabilities in the widely used Vim and GNU Emacs text editors, discovered with the assistance of the Claude AI, allow for remote code execution simply by...

T1190

SC Media →

SC Media General Google 3d ago

Free Android VPNs expose users to tracking and risky servers, research finds

The analysis, using MobSF, focused on app permissions, third-party trackers, hardcoded network endpoints, and developer emails.

SC Media →

SC Media General 3d ago

Venom Stealer MaaS handles attacks from ClickFix to crypto theft

The stealer persists on the victim’s machine and immediately exfiltrates data with no local staging.

T1041

SC Media →

SC Media General Okta 3d ago

Executive Paralysis and Two Pre-Recorded RSAC 2026 Interviews from DigiCert and Okta - Ann Marie van den Hurk, Amit Sinha, Matt Immler - BSW #441

SC Media →

SC Media General 4d ago

Beyond the Hype: Cyber Readiness, Zero Trust, and an Unscripted Conversation - Rob Allen, Gibb Witham - SWN #568

SC Media →

SC Media General Amazon 4d ago

OkCupid, Match Group settle with FTC over unlawful data sharing with AI firm

Dating app OkCupid and its parent company Match Group Americas have reached a settlement with the Federal Trade Commission, following the latter's lawsuit th...

SC Media →

« Prev 1 2 3 4 5 6 ... 14 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA