{"version":"https://jsonfeed.org/version/1.1","title":"Dragon Security Threat Intelligence Feed","home_page_url":"https://dstif.io","feed_url":"https://www.dstif.io/json/","next_url":"https://www.dstif.io/json/?next_cursor=1777062619000&sort=newest_first","description":"<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href=\"https://github.com/DragonSecurity/dstif\" rel=\"noopener noreferrer\" target=\"_blank\">https://github.com/DragonSecurity/dstif</a></p>","icon":"https://cdn.dstif.io\t/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png","favicon":"https://www.dstif.io/assets/default/favicon.png","authors":[{"name":"Dragon Security"}],"language":"en-us","items":[{"id":"p16hxl7aYOu","title":"📢 Microsoft rolls out revamped Windows Insider Program","url":"https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-revamped-windows-insider-program/?utm_source=dstif.io","content_html":"Date: 2026-04-25T17:07:13<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-revamped-windows-insider-program/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-revamped-windows-insider-program/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T17:07:13\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-revamped-windows-insider-program/?utm_source=dstif.io\n","date_published":"2026-04-25T17:07:13.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/microsoft-rolls-out-revamped-windows-insider-pr-p16hxl7aYOu/","json_url":"https://www.dstif.io/i/p16hxl7aYOu/json/","rss_url":"https://www.dstif.io/i/p16hxl7aYOu/rss/","guid":"p16hxl7aYOu","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777136833000}},{"id":"3ngnnZLPJr8","title":"📢 Threat actor uses Microsoft Teams to deploy new “Snow” malware","url":"https://www.bleepingcomputer.com/news/security/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/?utm_source=dstif.io","content_html":"Date: 2026-04-25T15:07:44<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/security/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/security/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T15:07:44\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/security/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/?utm_source=dstif.io\n","date_published":"2026-04-25T15:07:44.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/threat-actor-uses-microsoft-teams-to-deploy-new-3ngnnZLPJr8/","json_url":"https://www.dstif.io/i/3ngnnZLPJr8/json/","rss_url":"https://www.dstif.io/i/3ngnnZLPJr8/rss/","guid":"3ngnnZLPJr8","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777129664000}},{"id":"OTnwbO1Oa4f","title":"📢 Artemis II broke Fred Haise's distance record, but he is happy to pass it on","url":"https://arstechnica.com/science/2026/04/artemis-ii-broke-fred-haises-distance-record-but-he-is-happy-to-pass-it-on/?utm_source=dstif.io","content_html":"Date: 2026-04-25T11:40:58<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/science/2026/04/artemis-ii-broke-fred-haises-distance-record-but-he-is-happy-to-pass-it-on/?utm_source=dstif.io>https://arstechnica.com/science/2026/04/artemis-ii-broke-fred-haises-distance-record-but-he-is-happy-to-pass-it-on/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T11:40:58\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/science/2026/04/artemis-ii-broke-fred-haises-distance-record-but-he-is-happy-to-pass-it-on/?utm_source=dstif.io\n","date_published":"2026-04-25T11:40:58.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/artemis-ii-broke-fred-haises-distance-record-OTnwbO1Oa4f/","json_url":"https://www.dstif.io/i/OTnwbO1Oa4f/json/","rss_url":"https://www.dstif.io/i/OTnwbO1Oa4f/rss/","guid":"OTnwbO1Oa4f","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777117258000}},{"id":"vaCu2Vny2-V","title":"📢 Palantir employees are talking about company's \"descent into fascism\"","url":"https://arstechnica.com/tech-policy/2026/04/palantir-employees-are-talking-about-companys-descent-into-fascism/?utm_source=dstif.io","content_html":"Date: 2026-04-25T10:49:52<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/tech-policy/2026/04/palantir-employees-are-talking-about-companys-descent-into-fascism/?utm_source=dstif.io>https://arstechnica.com/tech-policy/2026/04/palantir-employees-are-talking-about-companys-descent-into-fascism/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T10:49:52\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/tech-policy/2026/04/palantir-employees-are-talking-about-companys-descent-into-fascism/?utm_source=dstif.io\n","date_published":"2026-04-25T10:49:52.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/palantir-employees-are-talking-about-companys-vaCu2Vny2-V/","json_url":"https://www.dstif.io/i/vaCu2Vny2-V/json/","rss_url":"https://www.dstif.io/i/vaCu2Vny2-V/rss/","guid":"vaCu2Vny2-V","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777114192000}},{"id":"vO9vrpfMCwp","title":"📢 Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos","url":"https://www.wired.com/story/security-news-this-week-discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/?utm_source=dstif.io","content_html":"Date: 2026-04-25T10:30:00<br/>Source:<b> Wired Security</b><br/>Read more: <a href=https://www.wired.com/story/security-news-this-week-discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/?utm_source=dstif.io>https://www.wired.com/story/security-news-this-week-discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T10:30:00\nSource: Wired Security\nRead more:\nhttps://www.wired.com/story/security-news-this-week-discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/?utm_source=dstif.io\n","date_published":"2026-04-25T10:30:00.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/discord-sleuths-gained-unauthorized-access-to-a-vO9vrpfMCwp/","json_url":"https://www.dstif.io/i/vO9vrpfMCwp/json/","rss_url":"https://www.dstif.io/i/vO9vrpfMCwp/rss/","guid":"vO9vrpfMCwp","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777113000000}},{"id":"yZ-1hwyR_uZ","title":"📢 Crime crew impersonates help desk, abuses Microsoft Teams to steal your data","url":"https://go.theregister.com/feed/www.theregister.com/2026/04/25/new_crime_crew_impersonates_help_desks/?utm_source=dstif.io","content_html":"Date: 2026-04-25T09:28:13<br/>Source:<b> The Register Security</b><br/>Read more: <a href=https://go.theregister.com/feed/www.theregister.com/2026/04/25/new_crime_crew_impersonates_help_desks/?utm_source=dstif.io>https://go.theregister.com/feed/www.theregister.com/2026/04/25/new_crime_crew_impersonates_help_desks/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T09:28:13\nSource: The Register Security\nRead more:\nhttps://go.theregister.com/feed/www.theregister.com/2026/04/25/new_crime_crew_impersonates_help_desks/?utm_source=dstif.io\n","date_published":"2026-04-25T09:28:13.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/crime-crew-impersonates-help-desk-abuses-micro-yZ-1hwyR_uZ/","json_url":"https://www.dstif.io/i/yZ-1hwyR_uZ/json/","rss_url":"https://www.dstif.io/i/yZ-1hwyR_uZ/rss/","guid":"yZ-1hwyR_uZ","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777109293000}},{"id":"wC8BdKQBAnp","title":"📰 Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software","url":"https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html?utm_source=dstif.io","content_html":"Date: 2026-04-25T09:26:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html?utm_source=dstif.io>https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T09:26:00\nSource: Hacker News\nRead more:\nhttps://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html?utm_source=dstif.io\n","date_published":"2026-04-25T09:26:00.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/researchers-uncover-pre-stuxnet-fast16-malwar-wC8BdKQBAnp/","json_url":"https://www.dstif.io/i/wC8BdKQBAnp/json/","rss_url":"https://www.dstif.io/i/wC8BdKQBAnp/rss/","guid":"wC8BdKQBAnp","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777109160000}},{"id":"35mcrjp6ZtZ","title":"📢 CVE-2025-13763 Libopensc: opensc: multiple uses of uninitialized variable","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13763?utm_source=dstif.io","content_html":"Date: 2026-04-25T08:05:58<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13763?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13763?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T08:05:58\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13763?utm_source=dstif.io\n","date_published":"2026-04-25T08:05:58.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/cve-2025-13763-libopensc-opensc-multiple-uses-35mcrjp6ZtZ/","json_url":"https://www.dstif.io/i/35mcrjp6ZtZ/json/","rss_url":"https://www.dstif.io/i/35mcrjp6ZtZ/rss/","guid":"35mcrjp6ZtZ","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777104358000}},{"id":"Yf-v6x-ernH","title":"📢 CVE-2026-23340 net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23340?utm_source=dstif.io","content_html":"Date: 2026-04-25T08:04:57<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23340?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23340?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T08:04:57\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23340?utm_source=dstif.io\n","date_published":"2026-04-25T08:04:57.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/cve-2026-23340-net-sched-avoid-qdiscresetal-Yf-v6x-ernH/","json_url":"https://www.dstif.io/i/Yf-v6x-ernH/json/","rss_url":"https://www.dstif.io/i/Yf-v6x-ernH/rss/","guid":"Yf-v6x-ernH","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777104297000}},{"id":"Ccx9-pgaCUr","title":"📢 CVE-2026-23339 nfc: nci: free skb on nci_transceive early error paths","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23339?utm_source=dstif.io","content_html":"Date: 2026-04-25T08:04:52<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23339?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23339?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T08:04:52\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23339?utm_source=dstif.io\n","date_published":"2026-04-25T08:04:52.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/cve-2026-23339-nfc-nci-free-skb-on-ncitransc-Ccx9-pgaCUr/","json_url":"https://www.dstif.io/i/Ccx9-pgaCUr/json/","rss_url":"https://www.dstif.io/i/Ccx9-pgaCUr/rss/","guid":"Ccx9-pgaCUr","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777104292000}},{"id":"NiuNhFcp0BU","title":"📢 CVE-2026-23336 wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336?utm_source=dstif.io","content_html":"Date: 2026-04-25T08:04:47<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T08:04:47\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336?utm_source=dstif.io\n","date_published":"2026-04-25T08:04:47.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/cve-2026-23336-wifi-cfg80211-cancel-rfkillbl-NiuNhFcp0BU/","json_url":"https://www.dstif.io/i/NiuNhFcp0BU/json/","rss_url":"https://www.dstif.io/i/NiuNhFcp0BU/rss/","guid":"NiuNhFcp0BU","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777104287000}},{"id":"bZtmX60kp9b","title":"📰 CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline","url":"https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html?utm_source=dstif.io","content_html":"Date: 2026-04-25T05:08:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html?utm_source=dstif.io>https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T05:08:00\nSource: Hacker News\nRead more:\nhttps://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html?utm_source=dstif.io\n","date_published":"2026-04-25T05:08:00.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/cisa-adds-4-exploited-flaws-to-kev-sets-may-20-bZtmX60kp9b/","json_url":"https://www.dstif.io/i/bZtmX60kp9b/json/","rss_url":"https://www.dstif.io/i/bZtmX60kp9b/rss/","guid":"bZtmX60kp9b","status":"published","date_published_short":"Sat Apr 25 2026","date_published_ms":1777093680000}},{"id":"uNgsG1cVpCW","title":"📢 This is who's developing Golden Dome's orbital interceptors—if they're ever built","url":"https://arstechnica.com/space/2026/04/this-is-whos-developing-golden-domes-orbital-interceptors-if-theyre-ever-built/?utm_source=dstif.io","content_html":"Date: 2026-04-25T02:52:37<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/space/2026/04/this-is-whos-developing-golden-domes-orbital-interceptors-if-theyre-ever-built/?utm_source=dstif.io>https://arstechnica.com/space/2026/04/this-is-whos-developing-golden-domes-orbital-interceptors-if-theyre-ever-built/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-25T02:52:37\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/space/2026/04/this-is-whos-developing-golden-domes-orbital-interceptors-if-theyre-ever-built/?utm_source=dstif.io\n","date_published":"2026-04-25T02:52:37.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/this-is-whos-developing-golden-domes-orbital-uNgsG1cVpCW/","json_url":"https://www.dstif.io/i/uNgsG1cVpCW/json/","rss_url":"https://www.dstif.io/i/uNgsG1cVpCW/rss/","guid":"uNgsG1cVpCW","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777085557000}},{"id":"0F2O-kLjnB4","title":"📢 ADT confirms data breach after ShinyHunters leak threat","url":"https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/?utm_source=dstif.io","content_html":"Date: 2026-04-24T22:53:14<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-24T22:53:14\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/?utm_source=dstif.io\n","date_published":"2026-04-24T22:53:14.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/adt-confirms-data-breach-after-shinyhunters-lea-0F2O-kLjnB4/","json_url":"https://www.dstif.io/i/0F2O-kLjnB4/json/","rss_url":"https://www.dstif.io/i/0F2O-kLjnB4/rss/","guid":"0F2O-kLjnB4","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777071194000}},{"id":"mKpQB_AnNyu","title":"📢 Google will invest as much as $40 billion in Anthropic","url":"https://arstechnica.com/ai/2026/04/google-will-invest-as-much-as-40-billion-in-anthropic/?utm_source=dstif.io","content_html":"Date: 2026-04-24T22:05:45<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/ai/2026/04/google-will-invest-as-much-as-40-billion-in-anthropic/?utm_source=dstif.io>https://arstechnica.com/ai/2026/04/google-will-invest-as-much-as-40-billion-in-anthropic/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-24T22:05:45\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/ai/2026/04/google-will-invest-as-much-as-40-billion-in-anthropic/?utm_source=dstif.io\n","date_published":"2026-04-24T22:05:45.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/google-will-invest-as-much-as-dollar40-billion-in-an-mKpQB_AnNyu/","json_url":"https://www.dstif.io/i/mKpQB_AnNyu/json/","rss_url":"https://www.dstif.io/i/mKpQB_AnNyu/rss/","guid":"mKpQB_AnNyu","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777068345000}},{"id":"AHqYkbMukge","title":"📢 The npm Threat Landscape: Attack Surface and Mitigations","url":"https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/?utm_source=dstif.io","content_html":"Date: 2026-04-24T21:40:33<br/>Source:<b> Unit42 (Palo Alto)</b><br/>Read more: <a href=https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/?utm_source=dstif.io>https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-24T21:40:33\nSource: Unit42 (Palo Alto)\nRead more:\nhttps://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/?utm_source=dstif.io\n","date_published":"2026-04-24T21:40:33.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/the-npm-threat-landscape-attack-surface-and-mi-AHqYkbMukge/","json_url":"https://www.dstif.io/i/AHqYkbMukge/json/","rss_url":"https://www.dstif.io/i/AHqYkbMukge/rss/","guid":"AHqYkbMukge","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777066833000}},{"id":"Y5voZ7hOdlD","title":"📢 Europe—not US—first to authorize Moderna's combo mRNA flu-COVID vaccine","url":"https://arstechnica.com/health/2026/04/europe-not-us-first-to-authorize-modernas-combo-mrna-flu-covid-vaccine/?utm_source=dstif.io","content_html":"Date: 2026-04-24T21:11:43<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/health/2026/04/europe-not-us-first-to-authorize-modernas-combo-mrna-flu-covid-vaccine/?utm_source=dstif.io>https://arstechnica.com/health/2026/04/europe-not-us-first-to-authorize-modernas-combo-mrna-flu-covid-vaccine/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-24T21:11:43\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/health/2026/04/europe-not-us-first-to-authorize-modernas-combo-mrna-flu-covid-vaccine/?utm_source=dstif.io\n","date_published":"2026-04-24T21:11:43.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/europenot-usfirst-to-authorize-modernas-comb-Y5voZ7hOdlD/","json_url":"https://www.dstif.io/i/Y5voZ7hOdlD/json/","rss_url":"https://www.dstif.io/i/Y5voZ7hOdlD/rss/","guid":"Y5voZ7hOdlD","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777065103000}},{"id":"IUHj-1p2T8E","title":"📢 Friday Squid Blogging: How Squid Survived Extinction Events","url":"https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-how-squid-survived-extinction-events.html?utm_source=dstif.io","content_html":"Date: 2026-04-24T21:03:23<br/>Source:<b> Schneier on Security</b><br/>Read more: <a href=https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-how-squid-survived-extinction-events.html?utm_source=dstif.io>https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-how-squid-survived-extinction-events.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-24T21:03:23\nSource: Schneier on Security\nRead more:\nhttps://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-how-squid-survived-extinction-events.html?utm_source=dstif.io\n","date_published":"2026-04-24T21:03:23.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/friday-squid-blogging-how-squid-survived-extin-IUHj-1p2T8E/","json_url":"https://www.dstif.io/i/IUHj-1p2T8E/json/","rss_url":"https://www.dstif.io/i/IUHj-1p2T8E/rss/","guid":"IUHj-1p2T8E","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777064603000}},{"id":"teC3TNfH1DH","title":"📢 Firestarter malware survives Cisco firewall updates, security patches","url":"https://www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/?utm_source=dstif.io","content_html":"Date: 2026-04-24T20:34:08<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-24T20:34:08\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/?utm_source=dstif.io\n","date_published":"2026-04-24T20:34:08.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/firestarter-malware-survives-cisco-firewall-upd-teC3TNfH1DH/","json_url":"https://www.dstif.io/i/teC3TNfH1DH/json/","rss_url":"https://www.dstif.io/i/teC3TNfH1DH/rss/","guid":"teC3TNfH1DH","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777062848000}},{"id":"3FhF-VBzM_k","title":"📢 TGR-STA-1030: New Activity in Central and South America","url":"https://unit42.paloaltonetworks.com/new-activity-central-south-america/?utm_source=dstif.io","content_html":"Date: 2026-04-24T20:30:19<br/>Source:<b> Unit42 (Palo Alto)</b><br/>Read more: <a href=https://unit42.paloaltonetworks.com/new-activity-central-south-america/?utm_source=dstif.io>https://unit42.paloaltonetworks.com/new-activity-central-south-america/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-24T20:30:19\nSource: Unit42 (Palo Alto)\nRead more:\nhttps://unit42.paloaltonetworks.com/new-activity-central-south-america/?utm_source=dstif.io\n","date_published":"2026-04-24T20:30:19.000Z","_microfeed":{"web_url":"https://www.dstif.io/i/tgr-sta-1030-new-activity-in-central-and-south-3FhF-VBzM_k/","json_url":"https://www.dstif.io/i/3FhF-VBzM_k/json/","rss_url":"https://www.dstif.io/i/3FhF-VBzM_k/rss/","guid":"3FhF-VBzM_k","status":"published","date_published_short":"Fri Apr 24 2026","date_published_ms":1777062619000}}],"_microfeed":{"microfeed_version":"0.1.5","base_url":"https://www.dstif.io","categories":[{"name":"Business"},{"name":"Technology"}],"subscribe_methods":[{"name":"RSS","type":"rss","url":"https://www.dstif.io/rss/","image":"https://www.dstif.io/assets/brands/subscribe/rss.png","enabled":true,"editable":false,"id":"NtQvlJdq8M0"},{"name":"JSON","type":"json","url":"https://www.dstif.io/json/","image":"https://www.dstif.io/assets/brands/subscribe/json.png","enabled":true,"editable":false,"id":"N1TIyFiPgia"}],"description_text":"The Dragon Security Threat Intelligence Feed project compiles a diverse set of\nRSS feeds from reputable sources in cybersecurity, threat intelligence,\ntechnology news, and other institutions. These feeds are intended for security\nprofessionals, researchers, and enthusiasts to stay informed on the latest\nsecurity threats, vulnerabilities, industry trends, economic indicators, and\npolicy changes.\n\n\n\n\nWe provide this service free of charge to promote the common knowledge of cyber\nand security.\n\n\n\n\nPlease be aware that the feed aggregator is an automated bot, and sometimes\nduplication happens. We apologise for it in advance. Should you wish to report\nany issues, such as duplication, or wish to request additional feeds be added to\nthe aggregator, please let us know by opening an issue on\nhttps://github.com/DragonSecurity/dstif","copyright":"©2024 Dragon Security","itunes:type":"episodic","items_sort_order":"newest_first","items_next_cursor":1777062619000,"next_url":"https://www.dstif.io/json/?next_cursor=1777062619000&sort=newest_first"}}