{"version":"https://jsonfeed.org/version/1.1","title":"Dragon Security Threat Intelligence Feed","home_page_url":"https://dstif.io","feed_url":"https://dstif.io/json/","next_url":"https://dstif.io/json/?next_cursor=1775867526000&sort=newest_first","description":"<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href=\"https://github.com/DragonSecurity/dstif\" rel=\"noopener noreferrer\" target=\"_blank\">https://github.com/DragonSecurity/dstif</a></p>","icon":"https://cdn.dstif.io\t/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png","favicon":"https://dstif.io/assets/default/favicon.png","authors":[{"name":"Dragon Security"}],"language":"en-us","items":[{"id":"D9zKPKRmLaZ","title":"📢 Shock from Iran war has Trump's vision for US energy dominance flailing","url":"https://arstechnica.com/science/2026/04/shock-from-iran-war-has-trumps-vision-for-us-energy-dominance-flailing/?utm_source=dstif.io","content_html":"Date: 2026-04-12T11:17:26<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/science/2026/04/shock-from-iran-war-has-trumps-vision-for-us-energy-dominance-flailing/?utm_source=dstif.io>https://arstechnica.com/science/2026/04/shock-from-iran-war-has-trumps-vision-for-us-energy-dominance-flailing/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-12T11:17:26\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/science/2026/04/shock-from-iran-war-has-trumps-vision-for-us-energy-dominance-flailing/?utm_source=dstif.io\n","date_published":"2026-04-12T11:17:26.000Z","_microfeed":{"web_url":"https://dstif.io/i/shock-from-iran-war-has-trumps-vision-for-us-e-D9zKPKRmLaZ/","json_url":"https://dstif.io/i/D9zKPKRmLaZ/json/","rss_url":"https://dstif.io/i/D9zKPKRmLaZ/rss/","guid":"D9zKPKRmLaZ","status":"published","date_published_short":"Sun Apr 12 2026","date_published_ms":1775992646000}},{"id":"IXNsNahcvk6","title":"📢 CVE-2026-39856 osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856?utm_source=dstif.io","content_html":"Date: 2026-04-12T08:02:25<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-12T08:02:25\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39856?utm_source=dstif.io\n","date_published":"2026-04-12T08:02:25.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-39856-osslsigncode-has-an-out-of-bound-IXNsNahcvk6/","json_url":"https://dstif.io/i/IXNsNahcvk6/json/","rss_url":"https://dstif.io/i/IXNsNahcvk6/rss/","guid":"IXNsNahcvk6","status":"published","date_published_short":"Sun Apr 12 2026","date_published_ms":1775980945000}},{"id":"mhUOWqmpANz","title":"📢 CVE-2026-28390 Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390?utm_source=dstif.io","content_html":"Date: 2026-04-12T08:02:07<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-12T08:02:07\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28390?utm_source=dstif.io\n","date_published":"2026-04-12T08:02:07.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-28390-possible-null-dereference-when-p-mhUOWqmpANz/","json_url":"https://dstif.io/i/mhUOWqmpANz/json/","rss_url":"https://dstif.io/i/mhUOWqmpANz/rss/","guid":"mhUOWqmpANz","status":"published","date_published_short":"Sun Apr 12 2026","date_published_ms":1775980927000}},{"id":"7Kb34-zYb25","title":"📰 CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads","url":"https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html?utm_source=dstif.io","content_html":"Date: 2026-04-12T05:54:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html?utm_source=dstif.io>https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-12T05:54:00\nSource: Hacker News\nRead more:\nhttps://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html?utm_source=dstif.io\n","date_published":"2026-04-12T05:54:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/cpuid-breach-distributes-stx-rat-via-trojanized-7Kb34-zYb25/","json_url":"https://dstif.io/i/7Kb34-zYb25/json/","rss_url":"https://dstif.io/i/7Kb34-zYb25/rss/","guid":"7Kb34-zYb25","status":"published","date_published_short":"Sun Apr 12 2026","date_published_ms":1775973240000}},{"id":"bLRWlJyFVNW","title":"📰 Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621","url":"https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html?utm_source=dstif.io","content_html":"Date: 2026-04-12T04:25:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html?utm_source=dstif.io>https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-12T04:25:00\nSource: Hacker News\nRead more:\nhttps://thehackernews.com/2026/04/adobe-patches-actively-exploited.html?utm_source=dstif.io\n","date_published":"2026-04-12T04:25:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/adobe-patches-actively-exploited-acrobat-reader-bLRWlJyFVNW/","json_url":"https://dstif.io/i/bLRWlJyFVNW/json/","rss_url":"https://dstif.io/i/bLRWlJyFVNW/rss/","guid":"bLRWlJyFVNW","status":"published","date_published_short":"Sun Apr 12 2026","date_published_ms":1775967900000}},{"id":"sXz4aHIPoje","title":"📢 Over 20,000 crypto fraud victims identified in international crackdown","url":"https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/?utm_source=dstif.io","content_html":"Date: 2026-04-11T14:20:40<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T14:20:40\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/?utm_source=dstif.io\n","date_published":"2026-04-11T14:20:40.000Z","_microfeed":{"web_url":"https://dstif.io/i/over-20000-crypto-fraud-victims-identified-in-sXz4aHIPoje/","json_url":"https://dstif.io/i/sXz4aHIPoje/json/","rss_url":"https://dstif.io/i/sXz4aHIPoje/rss/","guid":"sXz4aHIPoje","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775917240000}},{"id":"HOJOt3i4r1R","title":"📢 Brockton Hospital still dealing with aftermath of ransomware attack","url":"https://databreaches.net/2026/04/11/brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack/?pk_campaign=feed&pk_kwd=brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack?utm_source=dstif.io","content_html":"Date: 2026-04-11T11:50:23<br/>Source:<b> DataBreaches.net</b><br/>Read more: <a href=https://databreaches.net/2026/04/11/brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack/?pk_campaign=feed&pk_kwd=brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack?utm_source=dstif.io>https://databreaches.net/2026/04/11/brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack/?pk_campaign=feed&pk_kwd=brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T11:50:23\nSource: DataBreaches.net\nRead more:\nhttps://databreaches.net/2026/04/11/brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack/?pk_campaign=feed&pk_kwd=brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack?utm_source=dstif.io\n","date_published":"2026-04-11T11:50:23.000Z","_microfeed":{"web_url":"https://dstif.io/i/brockton-hospital-still-dealing-with-aftermath-HOJOt3i4r1R/","json_url":"https://dstif.io/i/HOJOt3i4r1R/json/","rss_url":"https://dstif.io/i/HOJOt3i4r1R/rss/","guid":"HOJOt3i4r1R","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775908223000}},{"id":"to11nRP5XRX","title":"📢 AI models are terrible at betting on soccer—especially xAI Grok","url":"https://arstechnica.com/ai/2026/04/ai-models-are-terrible-at-betting-on-soccer-especially-xai-grok/?utm_source=dstif.io","content_html":"Date: 2026-04-11T11:15:17<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/ai/2026/04/ai-models-are-terrible-at-betting-on-soccer-especially-xai-grok/?utm_source=dstif.io>https://arstechnica.com/ai/2026/04/ai-models-are-terrible-at-betting-on-soccer-especially-xai-grok/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T11:15:17\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/ai/2026/04/ai-models-are-terrible-at-betting-on-soccer-especially-xai-grok/?utm_source=dstif.io\n","date_published":"2026-04-11T11:15:17.000Z","_microfeed":{"web_url":"https://dstif.io/i/ai-models-are-terrible-at-betting-on-socceresp-to11nRP5XRX/","json_url":"https://dstif.io/i/to11nRP5XRX/json/","rss_url":"https://dstif.io/i/to11nRP5XRX/rss/","guid":"to11nRP5XRX","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775906117000}},{"id":"dsRO_qwcMlK","title":"📢 Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise","url":"https://go.theregister.com/feed/www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/?utm_source=dstif.io","content_html":"Date: 2026-04-11T11:11:09<br/>Source:<b> The Register Security</b><br/>Read more: <a href=https://go.theregister.com/feed/www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/?utm_source=dstif.io>https://go.theregister.com/feed/www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T11:11:09\nSource: The Register Security\nRead more:\nhttps://go.theregister.com/feed/www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/?utm_source=dstif.io\n","date_published":"2026-04-11T11:11:09.000Z","_microfeed":{"web_url":"https://dstif.io/i/two-different-attackers-poisoned-popular-open-s-dsRO_qwcMlK/","json_url":"https://dstif.io/i/dsRO_qwcMlK/json/","rss_url":"https://dstif.io/i/dsRO_qwcMlK/rss/","guid":"dsRO_qwcMlK","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775905869000}},{"id":"jrdnd57Hxcb","title":"📢 Your Push Notifications Aren’t Safe From the FBI","url":"https://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/?utm_source=dstif.io","content_html":"Date: 2026-04-11T10:30:00<br/>Source:<b> Wired Security</b><br/>Read more: <a href=https://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/?utm_source=dstif.io>https://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T10:30:00\nSource: Wired Security\nRead more:\nhttps://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/?utm_source=dstif.io\n","date_published":"2026-04-11T10:30:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/your-push-notifications-arent-safe-from-the-fb-jrdnd57Hxcb/","json_url":"https://dstif.io/i/jrdnd57Hxcb/json/","rss_url":"https://dstif.io/i/jrdnd57Hxcb/rss/","guid":"jrdnd57Hxcb","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775903400000}},{"id":"L-BUD7jEm62","title":"📢 How the Internet Broke Everyone’s Bullshit Detectors","url":"https://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/?utm_source=dstif.io","content_html":"Date: 2026-04-11T09:30:00<br/>Source:<b> Wired Security</b><br/>Read more: <a href=https://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/?utm_source=dstif.io>https://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T09:30:00\nSource: Wired Security\nRead more:\nhttps://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/?utm_source=dstif.io\n","date_published":"2026-04-11T09:30:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/how-the-internet-broke-everyones-bullshit-dete-L-BUD7jEm62/","json_url":"https://dstif.io/i/L-BUD7jEm62/json/","rss_url":"https://dstif.io/i/L-BUD7jEm62/rss/","guid":"L-BUD7jEm62","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775899800000}},{"id":"SDqSH6-YTH2","title":"📢 CVE-2026-39881 Vim Ex command injection in Vims NetBeans integration","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881?utm_source=dstif.io","content_html":"Date: 2026-04-11T08:40:57<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T08:40:57\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881?utm_source=dstif.io\n","date_published":"2026-04-11T08:40:57.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-39881-vim-ex-command-injection-in-vims-SDqSH6-YTH2/","json_url":"https://dstif.io/i/SDqSH6-YTH2/json/","rss_url":"https://dstif.io/i/SDqSH6-YTH2/rss/","guid":"SDqSH6-YTH2","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775896857000}},{"id":"bH4XLyDMyH8","title":"📢 Hungarian government creds left in the safe hands of 'FrankLampard'","url":"https://go.theregister.com/feed/www.theregister.com/2026/04/11/hungary_government_logins_breach/?utm_source=dstif.io","content_html":"Date: 2026-04-11T08:30:14<br/>Source:<b> The Register Security</b><br/>Read more: <a href=https://go.theregister.com/feed/www.theregister.com/2026/04/11/hungary_government_logins_breach/?utm_source=dstif.io>https://go.theregister.com/feed/www.theregister.com/2026/04/11/hungary_government_logins_breach/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T08:30:14\nSource: The Register Security\nRead more:\nhttps://go.theregister.com/feed/www.theregister.com/2026/04/11/hungary_government_logins_breach/?utm_source=dstif.io\n","date_published":"2026-04-11T08:30:14.000Z","_microfeed":{"web_url":"https://dstif.io/i/hungarian-government-creds-left-in-the-safe-han-bH4XLyDMyH8/","json_url":"https://dstif.io/i/bH4XLyDMyH8/json/","rss_url":"https://dstif.io/i/bH4XLyDMyH8/rss/","guid":"bH4XLyDMyH8","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775896214000}},{"id":"wCN8XiKH9sr","title":"📢 CVE-2026-27140 Code execution vulnerability in SWIG code generation in cmd/go","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io","content_html":"Date: 2026-04-11T08:10:08<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T08:10:08\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io\n","date_published":"2026-04-11T08:10:08.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-27140-code-execution-vulnerability-in-wCN8XiKH9sr/","json_url":"https://dstif.io/i/wCN8XiKH9sr/json/","rss_url":"https://dstif.io/i/wCN8XiKH9sr/rss/","guid":"wCN8XiKH9sr","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775895008000}},{"id":"7PXsL_K1iu6","title":"📰 Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data","url":"https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html?utm_source=dstif.io","content_html":"Date: 2026-04-11T06:02:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html?utm_source=dstif.io>https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T06:02:00\nSource: Hacker News\nRead more:\nhttps://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html?utm_source=dstif.io\n","date_published":"2026-04-11T06:02:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/citizen-lab-law-enforcement-used-webloc-to-tra-7PXsL_K1iu6/","json_url":"https://dstif.io/i/7PXsL_K1iu6/json/","rss_url":"https://dstif.io/i/7PXsL_K1iu6/rss/","guid":"7PXsL_K1iu6","status":"published","date_published_short":"Sat Apr 11 2026","date_published_ms":1775887320000}},{"id":"TUrLjfBjgPp","title":"📢 The Artemis II mission has ended. Where does NASA go from here?","url":"https://arstechnica.com/space/2026/04/the-artemis-ii-mission-has-ended-where-does-nasa-go-from-here/?utm_source=dstif.io","content_html":"Date: 2026-04-11T03:24:21<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/space/2026/04/the-artemis-ii-mission-has-ended-where-does-nasa-go-from-here/?utm_source=dstif.io>https://arstechnica.com/space/2026/04/the-artemis-ii-mission-has-ended-where-does-nasa-go-from-here/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T03:24:21\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/space/2026/04/the-artemis-ii-mission-has-ended-where-does-nasa-go-from-here/?utm_source=dstif.io\n","date_published":"2026-04-11T03:24:21.000Z","_microfeed":{"web_url":"https://dstif.io/i/the-artemis-ii-mission-has-ended-where-does-na-TUrLjfBjgPp/","json_url":"https://dstif.io/i/TUrLjfBjgPp/json/","rss_url":"https://dstif.io/i/TUrLjfBjgPp/rss/","guid":"TUrLjfBjgPp","status":"published","date_published_short":"Fri Apr 10 2026","date_published_ms":1775877861000}},{"id":"rbHjIgDbev6","title":"📢 ChatGPT rolls out new $100 Pro subscription to challenge Claude","url":"https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude/?utm_source=dstif.io","content_html":"Date: 2026-04-11T02:08:16<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T02:08:16\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude/?utm_source=dstif.io\n","date_published":"2026-04-11T02:08:16.000Z","_microfeed":{"web_url":"https://dstif.io/i/chatgpt-rolls-out-new-dollar100-pro-subscription-to-rbHjIgDbev6/","json_url":"https://dstif.io/i/rbHjIgDbev6/json/","rss_url":"https://dstif.io/i/rbHjIgDbev6/rss/","guid":"rbHjIgDbev6","status":"published","date_published_short":"Fri Apr 10 2026","date_published_ms":1775873296000}},{"id":"rYSZ5TBytKL","title":"📢 Medusa Ransomware Attack","url":"https://fortiguard.fortinet.com/threat-signal-report/6398?utm_source=dstif.io","content_html":"Date: 2026-04-11T01:25:49<br/>Source:<b> FortiGuard Threat Signal</b><br/>Read more: <a href=https://fortiguard.fortinet.com/threat-signal-report/6398?utm_source=dstif.io>https://fortiguard.fortinet.com/threat-signal-report/6398?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T01:25:49\nSource: FortiGuard Threat Signal\nRead more:\nhttps://fortiguard.fortinet.com/threat-signal-report/6398?utm_source=dstif.io\n","date_published":"2026-04-11T01:25:49.000Z","_microfeed":{"web_url":"https://dstif.io/i/medusa-ransomware-attack-rYSZ5TBytKL/","json_url":"https://dstif.io/i/rYSZ5TBytKL/json/","rss_url":"https://dstif.io/i/rYSZ5TBytKL/rss/","guid":"rYSZ5TBytKL","status":"published","date_published_short":"Fri Apr 10 2026","date_published_ms":1775870749000}},{"id":"L1kF615i1wC","title":"📢 Four astronauts are back home after a daring ride around the Moon","url":"https://arstechnica.com/space/2026/04/four-astronauts-are-back-home-after-a-daring-ride-around-the-moon/?utm_source=dstif.io","content_html":"Date: 2026-04-11T01:21:10<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/space/2026/04/four-astronauts-are-back-home-after-a-daring-ride-around-the-moon/?utm_source=dstif.io>https://arstechnica.com/space/2026/04/four-astronauts-are-back-home-after-a-daring-ride-around-the-moon/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T01:21:10\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/space/2026/04/four-astronauts-are-back-home-after-a-daring-ride-around-the-moon/?utm_source=dstif.io\n","date_published":"2026-04-11T01:21:10.000Z","_microfeed":{"web_url":"https://dstif.io/i/four-astronauts-are-back-home-after-a-daring-ri-L1kF615i1wC/","json_url":"https://dstif.io/i/L1kF615i1wC/json/","rss_url":"https://dstif.io/i/L1kF615i1wC/rss/","guid":"L1kF615i1wC","status":"published","date_published_short":"Fri Apr 10 2026","date_published_ms":1775870470000}},{"id":"Jq56BBSzCGN","title":"📢 Chromium: CVE-2026-5919 Insufficient validation of untrusted input in WebSockets","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919?utm_source=dstif.io","content_html":"Date: 2026-04-11T00:32:06<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-11T00:32:06\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919?utm_source=dstif.io\n","date_published":"2026-04-11T00:32:06.000Z","_microfeed":{"web_url":"https://dstif.io/i/chromium-cve-2026-5919-insufficient-validation-Jq56BBSzCGN/","json_url":"https://dstif.io/i/Jq56BBSzCGN/json/","rss_url":"https://dstif.io/i/Jq56BBSzCGN/rss/","guid":"Jq56BBSzCGN","status":"published","date_published_short":"Fri Apr 10 2026","date_published_ms":1775867526000}}],"_microfeed":{"microfeed_version":"0.1.5","base_url":"https://dstif.io","categories":[{"name":"Business"},{"name":"Technology"}],"subscribe_methods":[{"name":"RSS","type":"rss","url":"https://dstif.io/rss/","image":"https://dstif.io/assets/brands/subscribe/rss.png","enabled":true,"editable":false,"id":"NtQvlJdq8M0"},{"name":"JSON","type":"json","url":"https://dstif.io/json/","image":"https://dstif.io/assets/brands/subscribe/json.png","enabled":true,"editable":false,"id":"N1TIyFiPgia"}],"description_text":"The Dragon Security Threat Intelligence Feed project compiles a diverse set of\nRSS feeds from reputable sources in cybersecurity, threat intelligence,\ntechnology news, and other institutions. These feeds are intended for security\nprofessionals, researchers, and enthusiasts to stay informed on the latest\nsecurity threats, vulnerabilities, industry trends, economic indicators, and\npolicy changes.\n\n\n\n\nWe provide this service free of charge to promote the common knowledge of cyber\nand security.\n\n\n\n\nPlease be aware that the feed aggregator is an automated bot, and sometimes\nduplication happens. We apologise for it in advance. Should you wish to report\nany issues, such as duplication, or wish to request additional feeds be added to\nthe aggregator, please let us know by opening an issue on\nhttps://github.com/DragonSecurity/dstif","copyright":"©2024 Dragon Security","itunes:type":"episodic","items_sort_order":"newest_first","items_next_cursor":1775867526000,"next_url":"https://dstif.io/json/?next_cursor=1775867526000&sort=newest_first"}}