FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Intel

20 articles

Qualys Blog General Intel Mar 17

The New Era of Application Security: Reasoning-Based Agents, Runtime Reality, and Risk Intelligence

Key Takeaways Introduction Application security is entering a new phase. It is now an AI problem, an API problem, and a runtime risk problem.

Qualys Blog →

The Hacker News Phishing Intel Mar 17

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware

North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim's KakaoTalk desktop application to distrib...

T1566

The Hacker News →

Information Security Buzz General Intel Mar 17

Why OSINT deserves the same status as other intelligence disciplines

Open source intelligence (OSINT) still sits outside the intelligence mainstream. If you’re not acquainted with the intelligence profession, you might not hav...

Information Security Buzz →

Wordfence Blog Vulnerability Disclosure Intel WordPress Mar 12

Wordfence Intelligence Weekly WordPress Vulnerability Report (March 2, 2026 to March 8, 2026)

Last week, there were 201 vulnerabilities disclosed in 84 WordPress Plugins and 107 WordPress Themes that have been added to the Wordfence Intelligence Vulne...

Wordfence Blog →

Krebs on Security General Intel Mar 11

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technolog...

T1529

Krebs on Security →

Infosecurity Magazine General Intel SAP Mar 10

Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials

Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets

Infosecurity Magazine →

Wordfence Blog Vulnerability Disclosure Intel WordPress Mar 5

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 23, 2026 to March 1, 2026)

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were that contributed to WordPres...

Wordfence Blog →

Recorded Future Ransomware Intel Mar 3

Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence

Latin America's threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overs...

Recorded Future →

Wordfence Blog Vulnerability Disclosure Intel WordPress Feb 26

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 16, 2026 to February 22, 2026)

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were that contributed to WordPres...

Wordfence Blog →

Recorded Future General Intel Feb 26

Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA

Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data...

Recorded Future →

Elastic Security Labs General Intel Feb 24

Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Learn how Elastic's ES|QL COMPLETION command brings LLM reasoning directly into detection rules, enabling detection engineers to build intelligent alert tria...

Elastic Security Labs →

Wordfence Blog Vulnerability Disclosure Intel WordPress Feb 20

Wordfence Bug Bounty Program Monthly Report – January 2026

Last month in January 2026, the Wordfence Bug Bounty Program received 897 vulnerability submissions from our growing community of security researchers workin...

Wordfence Blog →

Wordfence Blog Vulnerability Disclosure Intel WordPress Feb 19

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 9, 2026 to February 15, 2026)

Last week, there were 174 vulnerabilities disclosed in 139 WordPress Plugins and 28 WordPress Themes that have been added to the Wordfence Intelligence Vulne...

Wordfence Blog →

Recorded Future General Intel Feb 16

Network Intelligence: Your Questions, Global Answers

Learn how network intelligence gives security teams control over threat investigation with global visibility—no more drowning in generic, passive threat feeds.

Recorded Future →

Wordfence Blog Vulnerability Disclosure Intel WordPress Feb 12

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 2, 2026 to February 8, 2026)

📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $31,200 per vulnera...

Wordfence Blog →

Recorded Future Ransomware Intel Feb 12

State of Security Report | Recorded Future

Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored oper...

Recorded Future →

Recorded Future General Intel Feb 12

Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026

The global threat landscape didn't simplify in 2025 — it shattered. The 2026 State of Security report represents Insikt Group's most comprehensive threat int...

Recorded Future →

Infosecurity Magazine Vulnerability Disclosure Intel Jan 19

Researchers Exploit Bug in StealC Infostealer to Collect Evidence

CyberArk says it exploited a vulnerability in the StealC infostealer to gather intelligence

Infosecurity Magazine →

Recorded Future Vulnerability Disclosure Intel Jan 16

Threat and Vulnerability Management in 2026

Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today...

Recorded Future →

Recorded Future Ransomware Intel Jan 13

Best Ransomware Detection Tools

Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for ...

Recorded Future →

« Prev 1 2 3 4 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA