CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  982 articles  ·  updated every 4 hours · grows forever

982Total
939Full Text
May 15, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence May 13, 2026
Proxying the Unproxyable? Sending EXE traffic to a Proxy, (Wed, May 13th)

.. if “unproxyable” is a word that is ..

SANS ISC Read →
◉ Threat Intelligence May 13, 2026
ISC Stormcast For Wednesday, May 13th, 2026 https://isc.sans.edu/podcastdetail/9930, (Wed, May 13th)
SANS ISC Read →
◉ Threat Intelligence May 13, 2026
CHINA CYBERSECURITY THREAT INTELLIGENCE REPORT - cyfirma

CHINA CYBERSECURITY THREAT INTELLIGENCE REPORT cyfirma

cyfirma Read →
◉ Threat Intelligence May 13, 2026
Defense at AI speed: Microsoft’s new multi-model agentic security system finds 16 new vulnerabilities

Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defense at AI speed: Microsoft’s new multi-model …

Microsoft Security Read →
◉ Threat Intelligence May 13, 2026
Microsoft May 2026 Patch Tuesday, (Tue, May 12th)

Today&#;x26;#;39;s Microsoft patch Tuesday fixes 137 different vulnerabilities. In addition, the update addresses 137 Chromium-related issues affecting Microsoft Edge.

SANS ISC Read →
◉ Threat Intelligence May 13, 2026
Patch Tuesday, May 2026 Edition

Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code…

Krebs on Security Read →
◉ Threat Intelligence May 13, 2026
A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens

We recently published an exploit chain for the Google Pixel 9 that demonstrated it was possible to go from a zero-click context to root on Android in just two exploits. The Dolby 0-click vulnerability…

Google Project Zero Read →
◉ Threat Intelligence May 12, 2026
Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating tha…

Microsoft Security Read →
◉ Threat Intelligence May 12, 2026
Defending consumer web properties against modern DDoS attacks

Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. The post Defending consumer web properties…

Microsoft Security Read →
◉ Threat Intelligence May 12, 2026
SOCRadar Named a Visionary in 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies - 01net

SOCRadar Named a Visionary in 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies 01net

01net Read →
◉ Threat Intelligence May 12, 2026
Stealth Falcon APT Exploits Microsoft RCE Zero-Day in Mideast - Dark Reading

Stealth Falcon APT Exploits Microsoft RCE Zero-Day in Mideast Dark Reading

Dark Reading Read →
◉ Threat Intelligence May 12, 2026
Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections
CrowdStrike Read →
◉ Threat Intelligence May 12, 2026
Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools

Unit 42 analyzes AD CS exploitation through template misconfigurations and shadow credential misuse while offering behavioral detection for defenders. The post Inside AD CS Escalation: Unpacking Advan…

Palo Alto Unit 42 Read →
◉ Threat Intelligence May 12, 2026
Apple Patches Everything, (Mon, May 11th)

Apple today released its typical feature update across it&#;x26;#;39;s operating systems (iOS, iPadOS, macOS, tvOS, watchOS, vision OS). With this update, Apple patched 84 different vulnerabilities. U…

SANS ISC Read →
◉ Threat Intelligence May 12, 2026
ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th)
SANS ISC Read →
◉ Threat Intelligence May 11, 2026
The State of Ransomware – Q1 2026

Key Findings Ransomware in Q1 2026: Consolidation at Scale During the first quarter of 2026, we monitored more than 70 active data leak sites (DLS) that collectively listed 2,122 new victims. This fig…

Check Point Research Read →
◉ Threat Intelligence May 11, 2026
11th May – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 11th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Instructure, the US education technology company behin…

Check Point Research Read →
◉ Threat Intelligence May 11, 2026
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI-enabled operations …

Mandiant Read →
◉ Threat Intelligence May 11, 2026
Why we use CAPTCHAs, (Mon, May 11th)

A few months ago, I implemented Cloudflare&#;x26;#;39;s Turnstile CAPTCHA on some pages. The reason for implementing these CAPTCHAs is obvious: Bots make up a large percentage of traffic and affect si…

SANS ISC Read →
◉ Threat Intelligence May 11, 2026
Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security - The Hacker News

Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security The Hacker News

The Hacker News Read →
◉ Threat Intelligence May 11, 2026
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid - csoonline.com

Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid csoonline.com

csoonline.com Read →
◉ Threat Intelligence May 11, 2026
China-Backed 'PeckBirdy' Takes Flight for Cross-Platform Attacks - Dark Reading

China-Backed 'PeckBirdy' Takes Flight for Cross-Platform Attacks Dark Reading

Dark Reading Read →
◉ Threat Intelligence May 11, 2026
YARA-X 1.16.0 Release, (Sun, May 10th)

YARA-X&#;x26;#;39;s 1.16.0 release brings 4 improvements and 4 bugfixes.

SANS ISC Read →
◉ Threat Intelligence May 11, 2026
ISC Stormcast For Monday, May 11th, 2026 https://isc.sans.edu/podcastdetail/9926, (Mon, May 11th)
SANS ISC Read →
← Prev 2 / 41 Next →