News Feed
CISA Alerts
-
#StopRansomware: Medusa Ransomware
Source: CISA Alerts Published 22 days ago
-
#StopRansomware: Ghost (Cring) Ransomware
Source: CISA Alerts Published 1 month ago
-
Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
Source: CISA Alerts Published 2 months ago
-
2023 Top Routinely Exploited Vulnerabilities
Source: CISA Alerts Published 4 months ago
-
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
Source: CISA Alerts Published 6 months ago
CIS Advisors
-
Multiple Vulnerabilities in IBM AIX could allow for arbitrary code execution.
Source: CIS Advisories Published 7 hours ago
-
A Vulnerability in CrushFTP Could Allow for Unauthorized Access
Source: CIS Advisories Published 6 days ago
-
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
Source: CIS Advisories Published 7 days ago
-
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
Source: CIS Advisories Published 12 days ago
-
How to Navigate the 2025 Identity Threat Landscape
Source: CrowdStrike Published 3 days ago
-
Kubernetes IngressNightmare Vulnerabilities: What You Need to Know
Source: CrowdStrike Published 6 days ago
-
CrowdStrike Falcon Exposure Management Expands Security to Unmanaged Network Assets with Network Vulnerability Assessment
Source: CrowdStrike Published 10 days ago
-
CrowdStrike Researchers Develop Custom XGBoost Objective to Improve ML Model Release Stability
Source: CrowdStrike Published 14 days ago
-
Announcing the CrowdStrike 2025 Global CrowdTour: Bringing the Power of the Crowd to a City Near You
Source: CrowdStrike Published 14 days ago
-
Unlocking the Privacy Advantage to Build Trust in the Age of AI
Source: Cisco Security Blog Published 23 hours ago
-
Network Visibility Module and Zeek Detections in Secure Network Analytics
Source: Cisco Security Blog Published 1 day ago
-
The Benefits of a Broad and Open Integration Ecosystem
Source: Cisco Security Blog Published 7 days ago
-
Cisco Co-Authors Update to the NIST Adversarial Machine Learning Taxonomy
Source: Cisco Security Blog Published 9 days ago
-
Cisco Introduces the State of AI Security Report for 2025: Key Developments, Trends, and Predictions in AI Security
Source: Cisco Security Blog Published 13 days ago
-
“Nudify” deepfakes stored unprotected online
Source: Malwarebytes Labs Published 19 hours ago
-
Intimate images from kink and LGBTQ+ dating apps left exposed online
Source: Malwarebytes Labs Published 1 day ago
-
“Urgent reminder” tax scam wants to phish your Microsoft credentials
Source: Malwarebytes Labs Published 2 days ago
-
A week in security (March 24 – March 30)
Source: Malwarebytes Labs Published 3 days ago
-
Why we’re no longer doing April Fools’ Day
Source: Malwarebytes Labs Published 3 days ago
-
Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent
Source: Hacker News Published 1 hour ago
-
Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices
Source: Hacker News Published 1 hour ago
-
Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign
Source: Hacker News Published 4 hours ago
-
Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation
Source: Hacker News Published 5 hours ago
-
Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
Source: Hacker News Published 19 hours ago
-
Cybersecurity Professor Faced China-Funding Inquiry Before Disappearing, Sources Say
Source: WIRED Security Published 15 hours ago
-
Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes
Source: WIRED Security Published 2 days ago
-
An AI Image Generator’s Exposed Database Reveals What People Really Used It For
Source: WIRED Security Published 2 days ago
-
Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online
Source: WIRED Security Published 4 days ago
-
Even More Venmo Accounts Tied to Trump Officials in Signal Group Chat Left Data Public
Source: WIRED Security Published 6 days ago
-
ISC Stormcast For Thursday, April 3rd, 2025 https://isc.sans.edu/podcastdetail/9392, (Thu, Apr 3rd)
Source: SANS Internet Storm Published 7 hours ago
-
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive [Guest Diary], (Wed, Apr 2nd)
Source: SANS Internet Storm Published 8 hours ago
-
Surge in Scans for Juniper "t128" Default User, (Wed, Apr 2nd)
Source: SANS Internet Storm Published 19 hours ago
-
ISC Stormcast For Wednesday, April 2nd, 2025 https://isc.sans.edu/podcastdetail/9390, (Wed, Apr 2nd)
Source: SANS Internet Storm Published 1 day ago
-
ISC Stormcast For Tuesday, April 1st, 2025 https://isc.sans.edu/podcastdetail/9388, (Tue, Apr 1st)
Source: SANS Internet Storm Published 2 days ago
-
Celebrating 1 Year of CSF 2.0
Source: NIST Cybersecurity Insights Published 1 month ago
-
Privacy-Preserving Federated Learning – Future Collaboration and Continued Research
Source: NIST Cybersecurity Insights Published 2 months ago
-
NIST’s International Cybersecurity and Privacy Engagement Update – New Translations
Source: NIST Cybersecurity Insights Published 3 months ago
-
Data Pipeline Challenges of Privacy-Preserving Federated Learning
Source: NIST Cybersecurity Insights Published 3 months ago
-
Kicking-Off with a December 4th Workshop, NIST is Revisiting and Revising Foundational Cybersecurity Activities for IoT Device Manufacturers, NIST IR 8259!
Source: NIST Cybersecurity Insights Published 4 months ago
Department of Defense
-
Hegseth Speaks to Troops, NFL Players About Service and Warrior Ethos
Source: Department of Defense Published 11 hours ago
-
'Forge Warriors, Rebuild Strength, Restore Deterrence,' Hegseth Tells Midshipmen During Academy Visit
Source: Department of Defense Published 1 day ago
-
Nominee for Chairman: Military's Top Job is Creating Peace Through Strength
Source: Department of Defense Published 1 day ago
-
Defense Secretary Directs Services to Match Combat Arms Standards to Mission Requirements
Source: Department of Defense Published 1 day ago
-
Leaders Describe Host of Threats to Homeland, Steps to Mitigate Them
Source: Department of Defense Published 1 day ago
AI News
-
Kay Firth-Butterfield, formerly WEF: The future of AI, the metaverse and digital transformation
Source: AI News Published 2 hours ago
-
AI streamlines budgeting, but human oversight essential
Source: AI News Published 21 hours ago
-
Tony Blair Institute AI copyright report sparks backlash
Source: AI News Published 22 hours ago
-
Study claims OpenAI trains AI models on copyrighted data
Source: AI News Published 1 day ago
-
Amazon Nova Act: A step towards smarter, web-native AI agents
Source: AI News Published 1 day ago
-
Blagojevich has new job working for ‘Bosnian Bear’ politician with ties to Putin
Source: Fox News Published 7 hours ago
-
DOGE uncovers VA’s agreement to pay $380K per month for minor website modifications
Source: Fox News Published 7 hours ago
-
Transportation Sec Sean Duffy slams blue state governor, says criminals 'continue to terrorize' city residents
Source: Fox News Published 7 hours ago
-
Ted Cruz clashes with key Democrat over 'second phase of lawfare' through federal judges' orders
Source: Fox News Published 8 hours ago
-
SCOOP: White House rallies House GOP on Trump tariff plan in secret call
Source: Fox News Published 9 hours ago
-
Trump Tariffs Aim to Bring Down Curtain on Era of Globalization
Source: WSJ Published 8 hours ago
-
The New Pepsi Challenge: Saving Pepsi From Years of Decline
Source: WSJ Published 8 hours ago
-
Trump Media Shares Sink After Clearing Path for President’s Trust to Sell Stake
Source: WSJ Published 12 hours ago
-
Auto & Transport Roundup: Market Talk
Source: WSJ Published 12 hours ago
-
Energy & Utilities Roundup: Market Talk
Source: WSJ Published 12 hours ago
-
Supreme Court rules for the FDA in flavored vapes dispute
Source: CNBC Published 18 hours ago
-
Europe's pharma industry braces for tariffs as carve-out hopes fade
Source: CNBC Published 1 day ago
-
Eli Lilly sues two pharmacies making copycat Zepbound, Mounjaro
Source: CNBC Published 1 day ago
-
Hims & Hers shares rise as company adds new weight-loss medications to platform
Source: CNBC Published 1 day ago
-
Trump's tariffs are a new challenge for Big Pharma. Here are the best-positioned stocks
Source: CNBC Published 1 day ago
-
Jackson Hole’s Housing Market Isn’t Coming Back Down to Earth Anytime Soon
Source: WSJ Published 8 hours ago
-
Why the Megarich Insist on Buying Homes in Extreme Weather Zones
Source: WSJ Published 1 day ago
-
Sold for $86 Million: An L.A. Compound With Rod Stewart’s Former Mansion
Source: WSJ Published 1 day ago
-
Debra Messing Felt Isolated as a Kid. ‘I Love Lucy’ Became Her Escape.
Source: WSJ Published 1 day ago
-
This Real-Estate Developer Is Going Big on Retail When No One Else Will
Source: WSJ Published 1 day ago
-
NASA Makes Progress on Advanced Drone Safety Management System
Source: NASA Published 11 hours ago
-
Artemis Astronauts & Orion Leadership Visit NASA Ames
Source: NASA Published 12 hours ago
-
What Are the Dangers of Going to Space? We Asked a NASA Expert: Episode 55
Source: NASA Published 13 hours ago
-
NASA Sets Coverage for Crew Launch to Join Station Expedition 72/73
Source: NASA Published 14 hours ago
-
X-ray Clues Reveal Destroyed Planet
Source: NASA Published 16 hours ago
-
A Maker of Sewage-Based Fertilizer Leaves Town Amid a Toxic Crisis
Source: New York Times Published 10 hours ago
-
Coal Plant Ranked as Nation’s Dirtiest Asks for Pollution Exemption
Source: New York Times Published 10 hours ago
-
E.P.A. Hunt for Shady Deals and ‘Gold Bars’ Comes Up Empty
Source: New York Times Published 13 hours ago
-
Elon Musk Backlash Turns Into Global Sales Slump for Tesla
Source: New York Times Published 13 hours ago
-
Entire Staff Is Fired at LIHEAP
Source: New York Times Published 13 hours ago
-
Reintroduced anti-CBDC bill passes US House Financial Services Committee
Source: The Block Published 13 minutes ago
-
PayPal activates native Solana and Chainlink support for users in US territories
Source: The Block Published 19 minutes ago
-
South Korea may open up local crypto market to foreign investors if AML strengthens: report
Source: The Block Published 2 hours ago
-
House Financial Services Committee votes to advance bill to regulate stablecoins
Source: The Block Published 6 hours ago
-
Crypto markets fall after Trump lays out sweeping reciprocal tariffs; Ethereum, Solana drop 6%
Source: The Block Published 9 hours ago
-
Southern California congregations shelter migrants left in legal limbo
Source: NPR Published 2 days ago
-
Supreme Court seems ready to let religious groups opt out of unemployment compensation laws
Source: NPR Published 2 days ago
-
Catholic Charities tests Wisconsin's unemployment payment system at Supreme Court
Source: NPR Published 3 days ago
-
Am I a god?! Why "manifesting" your reality is easier than ever
Source: NPR Published 3 days ago
-
The Sounds of Ramadan in Gaza
Source: NPR Published 5 days ago
-
Trump will 'buckle under pressure' if Europe bands together over tariffs, German economy minister says
Source: CNBC Published 14 minutes ago
-
European defense giants eye Starlink alternative within months
Source: CNBC Published 40 minutes ago
-
Trump's tariffs incite fury in China and dismay in Europe: Live updates
Source: CNBC Published 44 minutes ago
-
UK escapes worst of Trump's tariff wrath with 10% levy but warns of 'threat' to global economy
Source: CNBC Published 57 minutes ago
-
European markets retreat on U.S. tariff news; trade bellwether Maersk down 8%: Live updates
Source: CNBC Published 1 hour ago
Passive
Active
Ping / Traceroute
Web application security research, including the OWASP Top 10 vulnerabilities.
Shodan
Search engine for internet-exposed devices, useful for reconnaissance and attack surface mapping.
ThreatMiner
An OSINT platform for researching indicators of compromise (IOCs) and cyber threat intelligence.
CVE Details
Searchable database of known vulnerabilities (CVEs) with exploit and patch details.
AlienVault OTX
Community-driven platform for sharing cyber threat intelligence and attack trends.
Cyber Threat Watch
A real-time monitoring tool providing insights on emerging cyber threats and vulnerabilities.
Cyber Analytics Repository
A database of security analytics based on ATT&CK, with implementations for tools like Splunk and EQL.
Emulation Plans
Step-by-step guides to mimic threat groups like APT3, APT29, and FIN6 for security testing.
N8N
A database of security analytics based on ATT&CK, with implementations for tools like Splunk and EQL.
Elicit
Step-by-step guides to mimic threat groups like APT3, APT29, and FIN6 for security testing.
Nikto
A web server scanner that detects vulnerabilities, misconfigurations, and outdated software.
Metasploit
A penetration testing framework for exploiting vulnerabilities and testing security defenses.
Burp Suite
Web application security testing tool for detecting vulnerabilities like XSS and SQL injection.