CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  987 articles  ·  updated every 4 hours · grows forever

987Total
943Full Text
May 17, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence
Cyber Insights 2025: Cyber Threat Intelligence - SecurityWeek

Cyber Insights 2025: Cyber Threat Intelligence SecurityWeek

SecurityWeek Read →
◉ Threat Intelligence
Microsoft Security Blog - Microsoft

Microsoft Security Blog Microsoft

Microsoft Read →
◉ Threat Intelligence
Behind the scenes of cybersecurity: threat intelligence at Visma - Techzine Global

Behind the scenes of cybersecurity: threat intelligence at Visma Techzine Global

Techzine Global Read →
◉ Threat Intelligence
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Unit 42 research unveils LLM guardrail fragility using genetic algorithm-inspired prompt fuzzing. Discover scalable evasion methods and critical GenAI security implications. The post Open, Closed and …

Palo Alto Unit 42 Read →
◉ Threat Intelligence
Threat intelligence supply chain is full of weak links, researchers find - theregister.com

Threat intelligence supply chain is full of weak links, researchers find theregister.com

theregister.com Read →
◉ Threat Intelligence
ESET APT report finds state-backed hackers escalate cyberattacks, target Ukraine’s grain and energy sectors - Industrial Cyber

ESET APT report finds state-backed hackers escalate cyberattacks, target Ukraine’s grain and energy sectors Industrial Cyber

Industrial Cyber Read →
◉ Threat Intelligence
Iran Exploits Cyber Domain to Aid Kinetic Strikes - Dark Reading

Iran Exploits Cyber Domain to Aid Kinetic Strikes Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Hackers steal data from Salesforce instances in widespread campaign - Cybersecurity Dive

Hackers steal data from Salesforce instances in widespread campaign Cybersecurity Dive

Cybersecurity Dive Read →
◉ Threat Intelligence
Coast Guard Issues Cyber Rule for Maritime Transport Safety - Dark Reading

Coast Guard Issues Cyber Rule for Maritime Transport Safety Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs - Dark Reading

Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs Dark Reading

Dark Reading Read →
◉ Threat Intelligence
⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More - The Hacker News

⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News

The Hacker News Read →
◉ Threat Intelligence
As CISA Downsizes, Where Can Enterprises Get Support? - Dark Reading

As CISA Downsizes, Where Can Enterprises Get Support? Dark Reading

Dark Reading Read →
◉ Threat Intelligence
NightMARE: A Python Library for Advanced Malware Analysis and Threat Intelligence Extraction - gbhackers.com

NightMARE: A Python Library for Advanced Malware Analysis and Threat Intelligence Extraction gbhackers.com

gbhackers.com Read →
◉ Threat Intelligence
IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)

Yesterday, in my diary about the scans for "/proxy/" URLs, I noted how attackers are using IPv4-mapped IPv6 addresses to possibly obfuscate their attack. These addresses are defined in RFC 4038. These…

SANS ISC Read →
◉ Threat Intelligence
Cybersecurity insurance market set to be worth $32.19 billion by 2030 as businesses respond to growing cyber threats - BetaNews

Cybersecurity insurance market set to be worth $32.19 billion by 2030 as businesses respond to growing cyber threats BetaNews

BetaNews Read →
◉ Threat Intelligence
Beyond STIX: Next-Level Cyber-Threat Intelligence - Dark Reading

Beyond STIX: Next-Level Cyber-Threat Intelligence Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Israel Enters 'Stage 3' of Cyber Wars With Iran Proxies - Dark Reading

Israel Enters 'Stage 3' of Cyber Wars With Iran Proxies Dark Reading

Dark Reading Read →
◉ Threat Intelligence
The 13 Must-Follow Threat Intel Feeds - wiz.io

The 13 Must-Follow Threat Intel Feeds wiz.io

wiz.io Read →
◉ Threat Intelligence
Cybersecurity News: Outlook outage continues, Iranian APT activity, Russian ransomware arrest - CISO Series

Cybersecurity News: Outlook outage continues, Iranian APT activity, Russian ransomware arrest CISO Series

CISO Series Read →
◉ Threat Intelligence
Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk - Dark Reading

Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Resecurity Partners with Iraq Cyber Events Response Team (IQ-CERT) to Advance National Cybersecurity and Threat Intelligence - Business Wire

Resecurity Partners with Iraq Cyber Events Response Team (IQ-CERT) to Advance National Cybersecurity and Threat Intelligence Business Wire

Business Wire Read →
◉ Threat Intelligence
KELA Introduces AI-Powered Digital Analysts to Transform Cybersecurity Operations - MSSP Alert

KELA Introduces AI-Powered Digital Analysts to Transform Cybersecurity Operations MSSP Alert

MSSP Alert Read →
◉ Threat Intelligence
Cyber Threats and Response - CISA (.gov)

Cyber Threats and Response CISA (.gov)

CISA (.gov) Read →
◉ Threat Intelligence
5 Threats That Defined Security in 2025 - Dark Reading

5 Threats That Defined Security in 2025 Dark Reading

Dark Reading Read →
← Prev 40 / 42 Next →