CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  983 articles  ·  updated every 4 hours · grows forever

983Total
940Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence Mar 19, 2026
Saudi Arabia Cybersecurity Market: Real-Time Threat Intelligence, Risk Mitigation & Digital Resilience - vocal.media

Saudi Arabia Cybersecurity Market: Real-Time Threat Intelligence, Risk Mitigation & Digital Resilience vocal.media

vocal.media Read →
◉ Threat Intelligence Mar 19, 2026
Windows Server Update Service exploitation ensnares at least 50 victims - Cybersecurity Dive

Windows Server Update Service exploitation ensnares at least 50 victims Cybersecurity Dive

Cybersecurity Dive Read →
◉ Threat Intelligence Mar 19, 2026
Interesting Message Stored in Cowrie Logs, (Wed, Mar 18th)

This activity was found and reported by BACS student Adam Thorman as part of one of his assignments which I posted his final paper [1] last week. This activity appeared to only ha…

SANS ISC Read →
◉ Threat Intelligence Mar 19, 2026
ISC Stormcast For Thursday, March 19th, 2026 https://isc.sans.edu/podcastdetail/9856, (Thu, Mar 19th)
SANS ISC Read →
◉ Threat Intelligence Mar 19, 2026
Report warns of cybersecurity risks in humanoid robot boom - SC Media

Report warns of cybersecurity risks in humanoid robot boom SC Media

SC Media Read →
◉ Threat Intelligence Mar 19, 2026
Navigating Security Tradeoffs of AI Agents

Unit 42 outlines the risks of AI ecosystems and allowing AI agents excessive privileges. Learn how to keep your security strategy up to date with these latest trends. The post Navigating Security Trad…

Palo Alto Unit 42 Read →
◉ Threat Intelligence Mar 19, 2026
CISA: Pro-Russia Hacktivists Target US Critical Infrastructure - Dark Reading

CISA: Pro-Russia Hacktivists Target US Critical Infrastructure Dark Reading

Dark Reading Read →
◉ Threat Intelligence Mar 18, 2026
Phony Hacktivist Pleads Guilty to Disney Data Leak - Dark Reading

Phony Hacktivist Pleads Guilty to Disney Data Leak Dark Reading

Dark Reading Read →
◉ Threat Intelligence Mar 18, 2026
Securonix acquires threat intelligence startup ThreatQuotient - SiliconANGLE

Securonix acquires threat intelligence startup ThreatQuotient SiliconANGLE

SiliconANGLE Read →
◉ Threat Intelligence Mar 05, 2026
On the Effectiveness of Mutational Grammar Fuzzing

Mutational grammar fuzzing is a fuzzing technique in which the fuzzer uses a predefined grammar that describes the structure of the samples. When a sample gets mutated, the mutations happen in such a …

Google Project Zero Read →
◉ Threat Intelligence Feb 26, 2026
A Deep Dive into the GetProcessHandleFromHwnd API

In my previous blog post I mentioned the GetProcessHandleFromHwnd API. This was an API I didn’t know existed until I found a publicly disclosed UAC bypass using the Quick Assist UI Access application.…

Google Project Zero Read →
◉ Threat Intelligence Feb 12, 2026
Bypassing Administrator Protection by Abusing UI Access

In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to create a secure boundary for UAC where one didn’t exist. I described one of the ways I was able …

Google Project Zero Read →
◉ Threat Intelligence Feb 06, 2026
Novel Technique to Detect Cloud Threat Actor Operations - Unit 42

Novel Technique to Detect Cloud Threat Actor Operations Unit 42

Unit 42 Read →
◉ Threat Intelligence Jan 30, 2026
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

In the first part of this series, I detailed my journey into macOS security research, which led to the discovery of a type confusion vulnerability (CVE-2024-54529) and a double-free vulnerability (CVE…

Google Project Zero Read →
◉ Threat Intelligence Jan 26, 2026
Bypassing Windows Administrator Protection

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Control (UAC) with a more robust and importantl…

Google Project Zero Read →
◉ Threat Intelligence Jan 14, 2026
A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?

While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our experience finding, reporting and exploiting…

Google Project Zero Read →
◉ Threat Intelligence Jan 14, 2026
A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave

With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the resulting userland context, the mediacodec con…

Google Project Zero Read →
◉ Threat Intelligence Jan 14, 2026
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One effect of this change is increased 0-click at…

Google Project Zero Read →
◉ Threat Intelligence Jan 12, 2026
Exeter and Resecurity Inc. agree to collaborate on cybersecurity education and research - University of Exeter News

Exeter and Resecurity Inc. agree to collaborate on cybersecurity education and research University of Exeter News

University of Exeter News Read →
◉ Threat Intelligence Jan 05, 2026
5th January – Threat Intelligence Report - Check Point Research

5th January – Threat Intelligence Report Check Point Research

Check Point Research Read →
◉ Threat Intelligence Jan 01, 2026
Top 10 Best Cyber Threat Intelligence Companies in 2026 - CybersecurityNews

Top 10 Best Cyber Threat Intelligence Companies in 2026 CybersecurityNews

CybersecurityNews Read →
◉ Threat Intelligence Jan 01, 2026
Top 10 Best End-to-End Threat Intelligence Compaines in 2026 - CybersecurityNews

Top 10 Best End-to-End Threat Intelligence Compaines in 2026 CybersecurityNews

CybersecurityNews Read →
◉ Threat Intelligence Dec 16, 2025
Welcome to the new Project Zero Blog

While on Project Zero, we aim for our research to be leading-edge, our blog design was … not so much. We welcome readers to our shiny new blog! For the occasion, we asked members of Project Zero to du…

Google Project Zero Read →
◉ Threat Intelligence Dec 16, 2025
Thinking Outside The Box [dusted off draft from 2017]

Preface Hello from the future! This is a blogpost I originally drafted in early 2017. I wrote what I intended to be the first half of this post (about escaping from the VM to the VirtualBox host users…

Google Project Zero Read →
← Prev 23 / 41 Next →