CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  982 articles  ·  updated every 4 hours · grows forever

982Total
939Full Text
May 15, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence Apr 10, 2026
Panorama del cibercrimen en América Latina y el Caribe

Este informe ofrece una visión general de las tendencias y novedades en el ecosistema cibercriminal de América Latina y el Caribe (ALC) en 2025

Recorded Future Read →
◉ Threat Intelligence Apr 10, 2026
APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators - CyberSecurityNews

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators CyberSecurityNews

CyberSecurityNews Read →
◉ Threat Intelligence Apr 10, 2026
Cyber Threats Surge Against Maritime Industry In 2025 - Cyble

Cyber Threats Surge Against Maritime Industry In 2025 Cyble

Cyble Read →
◉ Threat Intelligence Apr 09, 2026
Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk

A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers detail how the flaw works, why it matters, and how…

Microsoft Security Read →
◉ Threat Intelligence Apr 09, 2026
Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to…

Microsoft Security Read →
◉ Threat Intelligence Apr 09, 2026
Third-Party Risk Is an Intelligence Operation. It's Time We Treated It Like One.

Recorded Future sees its inclusion in the 2026 Forrester Wave™ for Cybersecurity Risk Ratings Platforms as a reflection of a broader truth: the era of ratings-only vendor risk management is over.

Recorded Future Read →
◉ Threat Intelligence Apr 09, 2026
Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms - Bitcoin.com News

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms Bitcoin.com News

Bitcoin.com News Read →
◉ Threat Intelligence Apr 09, 2026
Number Usage in Passwords: Take Two, (Thu, Apr 9th)

In a previous diary [1], we looked to see how numbers were used within passwords submitted to honeypots. One of the items of interest was how dates, and more specifically years, were represented withi…

SANS ISC Read →
◉ Threat Intelligence Apr 09, 2026
ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)
SANS ISC Read →
◉ Threat Intelligence Apr 09, 2026
Cracks in the Bedrock: Agent God Mode

Unit 42 reveals "Agent God Mode" in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration risks. The post Cracks in the Bedrock: Agent God Mode appeared fi…

Palo Alto Unit 42 Read →
◉ Threat Intelligence Apr 09, 2026
TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)

This is the seventh update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0;"When the Security Scanner Became the Weapon"&#;x26;#;xc2;&#;x26;#;xa0;(v3.0, March…

SANS ISC Read →
◉ Threat Intelligence Apr 08, 2026
Understanding and Anticipating Venezuelan Government Actions

Explore an in-depth analysis of Venezuela’s political landscape following the January 2026 US operation to capture Nicolás Maduro. This executive summary examines Acting President Delcy Rodríguez’s tr…

Recorded Future Read →
◉ Threat Intelligence Apr 08, 2026
More Honeypot Fingerprinting Scans, (Wed, Apr 8th)

One question that often comes up when I talk about honeypots: Are attackers able to figure out if they are connected to a honeypot? The answer is pretty simple: Yes!

SANS ISC Read →
◉ Threat Intelligence Apr 08, 2026
ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)
SANS ISC Read →
◉ Threat Intelligence Apr 08, 2026
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware - The Hacker News

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware The Hacker News

The Hacker News Read →
◉ Threat Intelligence Apr 08, 2026
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore's sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox…

Palo Alto Unit 42 Read →
◉ Threat Intelligence Apr 08, 2026
Lumen and Black Lotus Labs: Leading the charge in cybersecurity - Lumen Technologies

Lumen and Black Lotus Labs: Leading the charge in cybersecurity Lumen Technologies

Lumen Technologies Read →
◉ Threat Intelligence Apr 08, 2026
IBM X-Force threat intelligence cybersecurity brief: novel coronavirus (COVID-19) - IBM

IBM X-Force threat intelligence cybersecurity brief: novel coronavirus (COVID-19) IBM

IBM Read →
◉ Threat Intelligence Apr 07, 2026
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Advisory at a Glance Title Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure Original Publication April 7, 2026 Executive Summary Iran-affiliated…

CISA Alerts Read →
◉ Threat Intelligence Apr 07, 2026
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs
CrowdStrike Read →
◉ Threat Intelligence Apr 07, 2026
A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)

Webshells remain a popular method for attackers to maintain persistence on a compromised web server. Many "arbitrary file write" and "remote code execution" vulnerabilities are used to drop small file…

SANS ISC Read →
◉ Threat Intelligence Apr 07, 2026
Russia Hacked Routers to Steal Microsoft Office Tokens

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today.…

Krebs on Security Read →
◉ Threat Intelligence Apr 07, 2026
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in…

Microsoft Security Read →
◉ Threat Intelligence Apr 07, 2026
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks - The Hacker News

Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News

The Hacker News Read →
← Prev 13 / 41 Next →