FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Vulnerability Disclosure

20 articles

Unit 42 Vulnerability Disclosure Kubernetes 4d ago

Understanding Current Threats to Kubernetes Environments

Unit 42 uncovers escalating Kubernetes attacks, detailing how threat actors exploit identities and critical vulnerabilities to compromise cloud environments....

Unit 42 →

BleepingComputer Vulnerability Disclosure Fortinet 4d ago

CISA orders feds to patch Fortinet flaw exploited in attacks by Friday

The U.S.

BleepingComputer →

Wordfence Blog Vulnerability Disclosure WordPress 4d ago

50,000 WordPress Sites affected by Arbitrary File Upload Vulnerability in Ninja Forms – File Upload WordPress Plugin

On January 8th, 2026, we received a submission for an Arbitrary File Upload vulnerability in Ninja Forms - File Upload, a WordPress plugin with an estimated ...

T1190

Wordfence Blog →

SecurityWeek Vulnerability Disclosure Google 4d ago

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show. The res...

SecurityWeek →

SC Media Vulnerability Disclosure 4d ago

5 email threats to watch as identity and AI attacks evolve  

Attacks on email that exploit OAuth consent, lateral phishing, and AI payroll fraud top the list.

T1566

SC Media →

GBHackers Vulnerability Disclosure 4d ago

Critical Claude Code Flaw Silently Bypasses User-Configured Security Rules

Anthropic’s flagship AI coding agent, Claude Code, was recently discovered to contain a critical security flaw that silently bypasses developer-configured sa...

T1041

GBHackers →

GBHackers Vulnerability Disclosure Google 4d ago

Google’s Bug Bounty Program Hits Record $17 Million in 2025 Payouts

Google has announced a record-breaking year for its Vulnerability Reward Program (VRP). In 2025, the tech giant paid out more than $17 million to ethical hac...

GBHackers →

CSO Online Vulnerability Disclosure 4d ago

Authentication is broken: Here’s how security leaders can actually fix it

Authentication keeps breaking where it matters most: On regulated front lines such as healthcare, government, aerospace and travel. The core issue is not a l...

CSO Online →

CSO Online Vulnerability Disclosure 4d ago

6 ways attackers abuse AI services to hack your business

Attackers are starting to exploit AI systems to mount attacks in the same way they once relied on built-in enterprise tools such as PowerShell. Instead of re...

CSO Online →

GBHackers Vulnerability Disclosure 4d ago

36 Malicious Strapi npm Packages Deliver Redis RCE, Persistent C2 Malware

A coordinated supply chain attack has been uncovered involving 36 malicious npm packages masquerading as Strapi CMS plugins, delivering a range of payloads i...

T1190 T1195

GBHackers →

GBHackers Vulnerability Disclosure Google Intel 4d ago

Google DeepMind Flags New Threat as Malicious Web Content Puts AI Agents at Risk

As artificial intelligence evolves from simple chatbots to autonomous agents that actively browse the web, a new cybersecurity threat has emerged. Researcher...

GBHackers →

Exploit Database Vulnerability Disclosure 5d ago

[webapps] WBCE CMS 1.6.4 - Remote Code Execution

WBCE CMS 1.6.

T1190

Exploit Database →

Exploit Database Vulnerability Disclosure 5d ago

[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution

RiteCMS 3.1.

T1190

Exploit Database →

Exploit Database Vulnerability Disclosure 5d ago

[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation

Desktop Window Manager Core Library 10.0.

T1548

Exploit Database →

BleepingComputer Vulnerability Disclosure Fortinet 5d ago

New FortiClient EMS flaw exploited in attacks, emergency patch released

Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively e...

BleepingComputer →

BleepingComputer Vulnerability Disclosure Fortinet 5d ago

New FortiClient EMS flaw exploited in attacks, emergency patch released

Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively e...

BleepingComputer →

SC Media Vulnerability Disclosure Apr 3

Fraudsters exploit vacant properties and postal services for identity theft

The tutorial, analyzed by Flare, outlines a low-cost, difficult-to-detect workflow that begins with identifying vacant residential properties, often found by...

SC Media →

The Record Vulnerability Disclosure Apr 3

CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers

A bug in a popular line of video conferencing software is being exploited by hackers, prompting the U.S.

The Record →

CSO Online Vulnerability Disclosure Cisco Intel Apr 3

Security lapse lets researchers view React2Shell hackers’ dashboard

An apparent security lapse has allowed researchers to peer into the work of a threat group currently exploiting unpatched servers open to the four-month-old ...

CSO Online →

CSO Online Vulnerability Disclosure Apr 3

Claude Code is still vulnerable to an attack Anthropic has already fixed

The leak of Claude Code’s source is already having consequences for the tool’s security. Researchers have spotted a vulnerability documented in the code.

CSO Online →

« Prev 1 2 3 4 5 6 ... 18 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA