CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  983 articles  ·  updated every 4 hours · grows forever

983Total
940Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence
23rd February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 23rd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES France’s Ministry of Economy has disclosed a data…

Check Point Research Read →
◉ Threat Intelligence
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

Key Points Introduction AI is rapidly becoming embedded in day-to-day enterprise workflows, inside browsers, collaboration suites, and developer tooling. As a result, AI service domains increasingly b…

Check Point Research Read →
◉ Threat Intelligence
16th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch telecom provider Odido was hit by a data br…

Check Point Research Read →
◉ Threat Intelligence
9th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 9th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Romania’s national oil pipeline operator, Conpet, …

Check Point Research Read →
◉ Threat Intelligence
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia

Key Points Introduction Check Point Research has identified several campaigns targeting multiple countries in the Southeast Asian region. These related activities have been collectively categorized un…

Check Point Research Read →
◉ Threat Intelligence
2nd February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES MicroWorld Technologies, maker of eScan antivirus,…

Check Point Research Read →
◉ Threat Intelligence
4 Ways Businesses Use CrowdStrike Charlotte AI to Transform Security Operations
CrowdStrike Read →
◉ Threat Intelligence
Enhanced Network Visibility: A Dive into the Falcon macOS Sensor's New Capabilities
CrowdStrike Read →
◉ Threat Intelligence
March 2026 Patch Tuesday: Eight Critical Vulnerabilities and Two Publicly Disclosed Among 82 CVEs Patched
CrowdStrike Read →
◉ Threat Intelligence
Falcon for XIoT Extends Asset Protection to Healthcare Environments
CrowdStrike Read →
◉ Threat Intelligence
Falcon Next-Gen SIEM Simplifies Onboarding with Sensor-Native Log Collection
CrowdStrike Read →
◉ Threat Intelligence
CrowdStrike Achieves NCSC CIR Assurance for Incident Response
CrowdStrike Read →
◉ Threat Intelligence
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
CrowdStrike Read →
◉ Threat Intelligence
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI
CrowdStrike Read →
◉ Threat Intelligence
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection
CrowdStrike Read →
◉ Threat Intelligence
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
CrowdStrike Read →
◉ Threat Intelligence
New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation

As organizations adopt AI, security and governance remain core primitives for safe AI transformation and acceleration. The post New Microsoft Purview innovations for Fabric to safely accelerate your A…

Microsoft Security Read →
◉ Threat Intelligence
Help on the line: How a Microsoft Teams support call led to compromise

A DART investigation into a Microsoft Teams voice phishing attack shows how deception and trusted tools can enable identity-led intrusions and how to stop them. The post Help on the line: How a Micros…

Microsoft Security Read →
◉ Threat Intelligence
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This…

Microsoft Security Read →
◉ Threat Intelligence
From transparency to action: What the latest Microsoft email security benchmark reveals

The latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats compared to SEG and ICES vendors. The post From transparency to action: What the latest Microsoft e…

Microsoft Security Read →
◉ Threat Intelligence
Detecting and analyzing prompt abuse in AI tools

Hidden instructions in content can subtly bias AI, and our scenario shows how prompt injection works, highlighting the need for oversight and a structured response playbook. The post Detecting and ana…

Microsoft Security Read →
◉ Threat Intelligence
Contagious Interview: Malware delivered through fake developer job interviews

The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and FlexibleF…

Microsoft Security Read →
◉ Threat Intelligence
Secure agentic AI for your Frontier Transformation

Learn how Microsoft Agent 365 and Microsoft 365 E7 can help secure your Frontier Transformation. The post Secure agentic AI for your Frontier Transformation appeared first on Microsoft Security Blog .

Microsoft Security Read →
◉ Threat Intelligence
AI as tradecraft: How threat actors operationalize AI

Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups suc…

Microsoft Security Read →
← Prev 35 / 41 Next →