CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  982 articles  ·  updated every 4 hours · grows forever

982Total
939Full Text
May 15, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence Apr 07, 2026
ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)
SANS ISC Read →
◉ Threat Intelligence Apr 07, 2026
How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed
CrowdStrike Read →
◉ Threat Intelligence Apr 07, 2026
Understanding Current Threats to Kubernetes Environments

Unit 42 uncovers escalating Kubernetes attacks, detailing how threat actors exploit identities and critical vulnerabilities to compromise cloud environments. The post Understanding Current Threats to …

Palo Alto Unit 42 Read →
◉ Threat Intelligence Apr 06, 2026
Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations

The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize recently disclosed vulnerabilities to obtain initial access, exfiltrate data,…

Microsoft Security Read →
◉ Threat Intelligence Apr 06, 2026
Inside an AI‑enabled device code phishing campaign

A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation. This campaign goes beyond traditional phishing by generating live authenti…

Microsoft Security Read →
◉ Threat Intelligence Apr 06, 2026
Day in the Life: Product Manager at Recorded Future

VentureFizz interviews Senior Product Manager Kyle Kohler on his role at Recorded Future

Recorded Future Read →
◉ Threat Intelligence Apr 06, 2026
Nearly half of exploited zero-day flaws target enterprise-grade technology - Cybersecurity Dive

Nearly half of exploited zero-day flaws target enterprise-grade technology Cybersecurity Dive

Cybersecurity Dive Read →
◉ Threat Intelligence Apr 06, 2026
6th April – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 30th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The European Commission, the European Union’s execut…

Check Point Research Read →
◉ Threat Intelligence Apr 06, 2026
How often are redirects used in phishing in 2026?, (Mon, Apr 6th)

In one of his recent diaries, Johannes discussed how open redirects are actively being sought out by threat actors[1], which made me wonder about how commonly these mechanisms are actually misused…

SANS ISC Read →
◉ Threat Intelligence Apr 06, 2026
Cybersecurity Profile 2025: Vietnam - The Henry M. Jackson School of International Studies

Cybersecurity Profile 2025: Vietnam The Henry M. Jackson School of International Studies

The Henry M. Jackson School of International Studies Read →
◉ Threat Intelligence Apr 06, 2026
ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)
SANS ISC Read →
◉ Threat Intelligence Apr 06, 2026
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimov…

Krebs on Security Read →
◉ Threat Intelligence Apr 06, 2026
China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide - The Hacker News

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide The Hacker News

The Hacker News Read →
◉ Threat Intelligence Apr 05, 2026
Stryker rules out ransomware, confirms threat actor used non-propagating malicious file - Industrial Cyber

Stryker rules out ransomware, confirms threat actor used non-propagating malicious file Industrial Cyber

Industrial Cyber Read →
◉ Threat Intelligence Apr 05, 2026
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises - The Hacker News

Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Hacker News

The Hacker News Read →
◉ Threat Intelligence Apr 05, 2026
How Threat Intelligence Will Change Cybersecurity in 2026 - cyberpress.org

How Threat Intelligence Will Change Cybersecurity in 2026 cyberpress.org

cyberpress.org Read →
◉ Threat Intelligence Apr 04, 2026
LatAm Now Faces 2x More Cyberattacks Than US - Dark Reading

LatAm Now Faces 2x More Cyberattacks Than US Dark Reading

Dark Reading Read →
◉ Threat Intelligence Apr 04, 2026
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence - Recorded Future

Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence Recorded Future

Recorded Future Read →
◉ Threat Intelligence Apr 04, 2026
ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices - The Hacker News

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices The Hacker News

The Hacker News Read →
◉ Threat Intelligence Apr 04, 2026
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands - The Hacker News

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands The Hacker News

The Hacker News Read →
◉ Threat Intelligence Apr 04, 2026
Deliveroo serves a fusion of threat intelligence and strategy - TechInformed

Deliveroo serves a fusion of threat intelligence and strategy TechInformed

TechInformed Read →
◉ Threat Intelligence Apr 04, 2026
Nation-State Threats - CISA (.gov)

Nation-State Threats CISA (.gov)

CISA (.gov) Read →
◉ Threat Intelligence Apr 04, 2026
New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks - The Hacker News

New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks The Hacker News

The Hacker News Read →
◉ Threat Intelligence Apr 04, 2026
China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats - The Hacker News

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats The Hacker News

The Hacker News Read →
← Prev 14 / 41 Next →