FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Malware

20 articles

GBHackers Malware Apple Mar 31

Axios NPM Packages Breached in Ongoing Supply Chain Attack

A severe supply chain attack has compromised the widely used Axios HTTP client on the npm registry. Attackers injected a malicious dependency into specific A...

T1195

GBHackers →

GBHackers Malware Microsoft Mar 31

DeepLoad Malware Uses ClickFix and AI Evasion to Hit Enterprise Networks

New “DeepLoad” malware is turning a single user click into fileless, credential‑stealing persistence inside enterprise networks, leveraging the ClickFix tech...

T1204 T1027

GBHackers →

GBHackers Malware Mar 31

RoadK1ll Malware Turns Hacked Devices Into Network Relays

Hackers are deploying a new Node. js-based implant dubbed RoadK1ll to quietly turn compromised hosts into on-demand network relays, enabling stealthy pivotin...

GBHackers →

GBHackers Malware Mar 31

GhostSocks Hijacks Devices as Proxy Network for Stealthy Cyberattacks

A newly emerging malware known as GhostSocks is quietly reshaping how attackers evade detection by converting compromised systems into residential proxy node...

GBHackers →

Help Net Security Malware Google Mar 31

Cybersecurity jobs available right now: March 31, 2026

Android Malware Research Director Alice | Israel | On-site – View job details As an Android Malware Research Director, you will establish operational process...

Help Net Security →

SC Media Malware Apple Mar 30

Apple: Spyware compromise prevented by Lockdown Mode

TechCrunch reports that Apple has touted that all of its devices with the Lockdown Mode activated have not been impacted by spyware intrusions.

SC Media →

SC Media Malware Microsoft Mar 30

Clandestine BlankGrabber malware examined

Windows systems have been more stealthily compromised by the BlankGrabber malware through the exploitation of a counterfeit certificate holder for multi-stag...

SC Media →

GBHackers Malware Microsoft Mar 30

Russian Hackers Deploy “CTRL” for RDP Hijacking

Russian hackers are using a new remote access toolkit called “CTRL” to silently hijack Remote Desktop Protocol (RDP) sessions via FRP-based reverse tunnels, ...

T1078

GBHackers →

SecurityWeek Malware Mar 30

Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained in Warfare

Iran-linked hacking groups are turning to high-volume, low-impact cyberattacks The post Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fig...

SecurityWeek →

Schneier on Security Malware Apple Mar 30

Apple’s Camera Indicator Lights

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptit...

T1598

Schneier on Security →

Information Security Buzz Malware Mar 30

LiteLLM supply chain attack exposes millions to credential theft

Researchers at Endor Labs, have discovered a supply chain attack on the popular Python package LiteLLM on PyPI, with malicious code injected into versions 1.82.

T1078 T1195

Information Security Buzz →

GBHackers Malware Mar 30

VoidLink Proves AI-Assisted Malware Is No Longer Experimental

VoidLink shows that AI-assisted malware is now a mature, operational tool rather than a lab experiment, compressing what once required a full team into days ...

GBHackers →

Check Point Research Malware Mar 29

AI Threat Landscape Digest January-February 2026

KEY FINDINGS AI-assisted malware development has reached operational maturity.VoidLink framework, which is modular, professionally engineered, and fully func...

Check Point Research →

BleepingComputer Malware Apple Mar 28

New Infinity Stealer malware grabs macOS data via ClickFix lures

A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka co...

BleepingComputer →

SecurityWeek Malware Cloudflare Mar 28

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

The infection chain includes a fake CAPTCHA page, a Bash script, a Nuitka loader, and the Python-based infostealer. The post Cloudflare-Themed ClickFix Attac...

SecurityWeek →

GBHackers Malware Microsoft Mar 28

Fake Certificate Loader Hides BlankGrabber Malware Chain

BlankGrabber’s operators are now abusing a fake “certificate” loader to hide a multi‑stage Rust and Python infection chain, making this commodity stealer sig...

T1041

GBHackers →

BleepingComputer Malware Mar 27

Backdoored Telnyx PyPI package pushes malware hidden in WAV audio

TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidde...

BleepingComputer →

Help Net Security Malware Mar 27

TeamPCP strikes again: Backdoored Telnyx PyPI package delivers malware

TeamPCP continues is supply chain compromise rampage, with telnyx on PyPI being the latest maliciously modified package. What happened?

T1195

Help Net Security →

GBHackers Malware Mar 27

Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks

A South Asian financial institution has been hit by a custom malware toolkit combining a modular backdoor, dubbed BRUSHWORM, and a DLL side‑loaded keylogger ...

T1027

GBHackers →

GBHackers Malware Apple Cloudflare Mar 27

Fake Cloudflare CAPTCHA Pages Deliver Infiniti Stealer Malware on macOS

A newly discovered macOS infostealer dubbed Infiniti Stealer is being actively distributed through deceptive Cloudflare-style CAPTCHA pages, marking a notabl...

T1204 T1598

GBHackers →

« Prev 1 ... 3 4 5 6 7 ... 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA