Live threat intelligence feed

Cybersecurity
Threat Intelligence

Aggregated threat intelligence from CISA, NVD, and leading security publications. Updated every 30 minutes.

Latest IntelligencePage 1

Search by keyword →
TI
Security Week

‘Mythos-Ready’ Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

CISOs face a shrinking window to prepare as AI models like Mythos collapse the gap between vulnerability discovery and exploitation, driving a new era of high-v...

14 Apr 2026
TI
Security Week

Europe’s Largest Gym Chain Says Data Breach Impacts 1 Million Members

Basic-Fit has reported that hackers have stolen names, dates of birth, and even bank account details.  The post Europe’s Largest Gym Chain Says Data Breac...

14 Apr 2026
TI
Security Week

SAP Patches Critical ABAP Vulnerability

The company has released 19 new security notes addressing flaws in over a dozen enterprise products. The post SAP Patches Critical ABAP Vulnerability appeared f...

14 Apr 2026
TI
Security Week

Triad Nexus Evades Sanctions to Fuel Cybercrime

The sprawling cybercrime operation abuses major providers to prevent takedowns and distance itself from sanctions. The post Triad Nexus Evades Sanctions to Fuel...

14 Apr 2026
TI
Security Week

Google Adds Rust DNS Parser to Pixel Phones for Better Security

The parser is meant to mitigate the entire class of memory safety bugs in the low-level environment. The post Google Adds Rust DNS Parser to Pixel Phones for Be...

14 Apr 2026
TI
The Hacker News

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 a...

14 Apr 2026
TI
The Hacker News

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by ...

14 Apr 2026
TI
Security Week

Nightclub Giant RCI Hospitality Reports Data Breach

The company said in an SEC filing that an IDOR vulnerability affecting RCI Internet Services exposed contractor data. The post Nightclub Giant RCI Hospitality R...

14 Apr 2026
TI
Security Week

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

The security defects allow attackers to escalate privileges and execute arbitrary code remotely. The post Organizations Warned of Exploited Windows, Adobe Acrob...

14 Apr 2026
TI
The Hacker News

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-...

14 Apr 2026
TI
The Hacker News

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the...

14 Apr 2026
TI
The Hacker News

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalo...

14 Apr 2026
European Gym giant Basic-Fit data breach affects 1 million members
TI
Bleeping Computer

European Gym giant Basic-Fit data breach affects 1 million members

Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers. [...]...

13 Apr 2026
TI
Dark Reading

CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

In a new report from the Cloud Security Alliance (CSA), experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos....

13 Apr 2026
TI
Dark Reading

Adobe Patches Actively Exploited Zero-Day That Lingered for Months

An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months....

13 Apr 2026
Stolen Rockstar Games analytics data leaked by extortion gang
TI
Bleeping Computer

Stolen Rockstar Games analytics data leaked by extortion gang

Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking the stolen data on it...

13 Apr 2026
TI
Dark Reading

Empty Attestations: OT Lacks the Tools for Cryptographic Readiness

OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dr...

13 Apr 2026
FBI takedown of W3LL phishing service leads to developer arrest
TI
Bleeping Computer

FBI takedown of W3LL phishing service leads to developer arrest

The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arresting the alleged de...

13 Apr 2026
OpenAI rotates macOS certs after Axios attack hit code-signing workflow
TI
Bleeping Computer

OpenAI rotates macOS certs after Axios attack hit code-signing workflow

OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package during a recent supply...

13 Apr 2026
New Booking.com data breach forces reservation PIN resets
TI
Bleeping Computer

New Booking.com data breach forces reservation PIN resets

Booking.com has confirmed via a statement to BleepingComputer that it has detected unauthorized access to its systems that has exposed sensitive reservation and...

13 Apr 2026
Next →