FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Amazon

20 articles

Infosecurity Magazine Vulnerability Disclosure Amazon Cisco Mar 12

CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws

CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks

Infosecurity Magazine →

AWS Security Blog General Amazon Mar 10

AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus seven ISO certifications

In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe entirely located within the E...

AWS Security Blog →

AWS Security Blog General Amazon Cisco Mar 10

Security is a team sport: AWS at RSAC 2026 Conference

The RSAC 2026 Conference brings together thousands of professionals, practitioners, vendors, and associations to discuss issues covering the entire spectrum ...

AWS Security Blog →

AWS Security Blog General Amazon Mar 10

AWS Security Hub is expanding to unify security operations across multicloud environments

After talking with many customers, one thing is clear: the security challenge has not gotten easier. Enterprises today operate across a complex mix of enviro...

AWS Security Blog →

SentinelOne Blog General Amazon Fortinet Mar 10

FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise

FortiGate SSO flaws allows attackers to steal configs, abuse AD creds, deploy RMM tools, and exfiltrate NTDS files.

T1041

SentinelOne Blog →

Infosecurity Magazine Campaigns Amazon Mar 9

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub

Infosecurity Magazine →

Cloudflare Blog Vulnerability Disclosure Amazon Cloudflare Mar 9

Active defense: introducing a stateful vulnerability scanner for APIs

Cloudflare’s new Web and API Vulnerability Scanner helps teams proactively find logic flaws. By using AI to build API call graphs, we identify vulnerabilitie...

Cloudflare Blog →

AWS Security Blog General Amazon Mar 5

AWS completes the 2026 annual Dubai Electronic Security Centre (DESC) certification audit

We’re excited to announce that Amazon Web Services (AWS) has completed the annual Dubai Electronic Security Centre (DESC) certification audit to operate as a...

AWS Security Blog →

Infosecurity Magazine General Amazon Cisco Mar 5

Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products

Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws

Infosecurity Magazine →

AWS Security Blog General Amazon Mar 5

2025 ISO and CSA STAR certificates are now available with one additional service and one new region

Amazon Web Services (AWS) successfully completed the annual recertification audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 277...

AWS Security Blog →

AWS Security Blog General Amazon Mar 4

Enhanced access denied error messages with policy ARNs

To help you troubleshoot access denied errors, we recently added the Amazon Resource Name (ARN) of the denying policy to access denied error messages. This b...

AWS Security Blog →

AWS Security Blog General Amazon Mar 3

2025 FINMA ISAE 3000 Type II attestation report available with 183 services in scope

Amazon Web Services (AWS) is pleased to announce the issuance of the Swiss Financial Market Supervisory Authority (FINMA) Type II attestation report with 183...

AWS Security Blog →

AWS Security Blog General Amazon Mar 3

2025 PiTuKri ISAE 3000 Type II attestation report available with 183 services in scope

Amazon Web Services (AWS) is pleased to announce the issuance of the Criteria to Assess the Information Security of Cloud Services (PiTuKri) Type II attestat...

AWS Security Blog →

AWS Security Blog General Amazon Mar 2

Understanding IAM for Managed AWS MCP Servers

As AI agents become part of your development workflows on Amazon Web Services (AWS), you want them to work with your existing AWS Identity and Access Managem...

T1598

AWS Security Blog →

Infosecurity Magazine Vulnerability Disclosure Amazon Feb 27

UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by 75%

The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two m...

Infosecurity Magazine →

AWS Security Blog General Amazon Intel Feb 26

AWS successfully completed its first surveillance audit for ISO 42001:2023 with no findings

In November 2024, Amazon Web Services (AWS) was the first major cloud service provider to announce the ISO/IEC 42001 accredited certification for AI services...

AWS Security Blog →

AWS Security Blog General Amazon Feb 26

Inside AWS Security Agent: A multi-agent architecture for automated penetration testing

AI agents have traditionally faced three core limitations: they can’t retain learned information or operate autonomously beyond short periods, and they requi...

AWS Security Blog →

Infosecurity Magazine General Amazon IBM Feb 25

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws

Infosecurity Magazine →

Graham Cluley General Amazon Feb 25

$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon

Amid a privacy backlash, a US $10,000 reward has been offered for anyone who can find a way to run Ring doorbell cameras locally, cutting off the flow of vid...

Graham Cluley →

AWS Security Blog Campaigns Amazon Fortinet Intel Feb 20

AI-augmented threat actor accesses FortiGate devices at scale

Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale—a trend Amazon Threat Intelligence has been tracking ...

AWS Security Blog →

« Prev 1 2 3 4 5 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA