FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Tenable Blog

16 articles

Tenable Blog Supply Chain 20h ago

The developer credential economy: Why exposure data is the new front line in the supply chain war

Recent supply chain attacks have highlighted an urgent need for organizations to shift from a reactive security posture to a preemptive exposure management s...

T1195

Tenable Blog →

Tenable Blog Campaigns Google Apple Intel 2d ago

Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069

A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of d...

T1195

Tenable Blog →

Tenable Blog Data Breach Apple 3d ago

Supply chain attack on Axios npm package: Scope, impact, and remediations

The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that...

T1041 T1195

Tenable Blog →

Tenable Blog General Amazon Tenable 4d ago

What’s new in Tenable Cloud Security: Custom policies, AWS ABAC, and research-driven protection

Stop the noise and scale your cloud security. Our latest updates introduce custom policy automation via Explorer, AWS ABAC support for true least privilege, ...

Tenable Blog →

Tenable Blog Data Breach Tenable Mar 26

Uncover prompt injection, insider threats with the Tenable One Model Refusal Detection

Tenable One's new Model Refusal Detection turns an LLM's refusal to execute a risky or suspicious prompt into a high-fidelity early warning signal. It helps ...

Tenable Blog →

Tenable Blog General Tenable Mar 25

Security for AI: A guide to managing the risks of vibe coding and AI in software development

Get a template for an AI coding acceptable use policy with security controls and a list of 25 security questions to ask software developers and “citizen deve...

Tenable Blog →

Tenable Blog General Tenable Intel Mar 24

Meet Tenable Hexa AI: Agentic AI for exposure management

Meet Tenable Hexa AI: the agentic engine of the Tenable One Exposure Management Platform. Learn how Tenable Hexa AI automates complex security workflows and ...

Tenable Blog →

Tenable Blog General Mar 23

The hidden cost of AI speed: Unmanaged cyber risk

AI isn’t just moving fast. It’s creating new attack paths.

Tenable Blog →

Tenable Blog CVE Oracle Mar 20

CVE-2026-21992: Critical Out-of-Band Oracle Identity Manager and Oracle Web Services Manager Remote Code Execution Vulnerability

Oracle published an out-of-band security alert for a critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager, following in-the-wild...

T1190 1 IOC

Tenable Blog →

Tenable Blog General Tenable Mar 19

Bolster your defenses and close the code-to-cloud gap with Tenable and OX

Today, cloud security teams face fragmented visibility and the challenge of prioritizing risks while identifying fix owners. A new joint solution from Tenabl...

Tenable Blog →

Tenable Blog CVE Microsoft Tenable Mar 17

FAQ on CVE-2026-21514: OLE bypass N-Day in Microsoft Word

An N-day vulnerability in Microsoft Word exposes nearly 14 million assets. Attackers can exploit this flaw to bypass security prompts, enabling deployment of...

1 IOC

Tenable Blog →

Tenable Blog CVE Microsoft Tenable Mar 17

Operation Epic Fury: Why exposure data changes everything about Iran's cyber-kinetic campaign

Iran's retaliatory campaign following Operation Epic Fury has collapsed the boundary between physical and digital warfare. Tenable's exposure data analysis a...

1 IOC

Tenable Blog →

Tenable Blog General Tenable Mar 17

How to prepare for NERC CIP compliance deadlines in 2026 and beyond

Explore key cybersecurity requirements and implementation deadlines for electric power utilities included in the NERC CIP-003-9 standard for Low-Impact BES (...

Tenable Blog →

Tenable Blog Vulnerability Disclosure Mar 16

Don't confuse asset inventory with exposure management

Asset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached.

Tenable Blog →

Tenable Blog Campaigns Tenable Intel Mar 11

Cyber Retaliation: Analyzing Iranian Cyber Activity Following Operation Epic Fury

In the wake of Operation Epic Fury, digital attacks have shifted from quiet espionage to a loud, coordinated campaign of economic and physical retaliation. I...

Tenable Blog →

Tenable Blog CVE Microsoft GitHub Mar 10

Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)

8Critical 75Important 0Moderate 0Low Microsoft addresses 83 CVEs including two vulnerabilities that were publicly disclosed prior to a patch being released. ...

4 IOCs

Tenable Blog →

FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA