FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Defense

20 articles

SC Media Data Breach 7h ago

China supercomputer breach: 10 petabytes of military data allegedly stolen by 'FlamingChina'

The stolen data, reportedly offered for sale, is said to contain simulations and schematics of aircraft, missiles, and bombs, originating from top organizati...

SC Media →

CSO Online Ransomware 8h ago

Hacker Unknown now known, named on Europol’s most-wanted list

German police have pinned a name to one of the world’s most notorious hackers. Danii Shchukin operated under the names of UNKN or Unknown and GandCrab and wa...

CSO Online →

The Record General 10h ago

UK says it exposed Russian submarine activity near undersea cables

A Russian attack submarine and vessels from the country’s Main Directorate of Deep Sea Research (GUGI) were involved in what the UK Ministry of Defence calle...

The Record →

GBHackers General 12h ago

Fake BTS Tour Ticket Scams Target Fans Worldwide

Cybercriminals are exploiting the massive hype around BTS’s return to the global stage by launching a wave of fake ticketing websites targeting fans across m...

GBHackers →

GBHackers Campaigns Google 14h ago

Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy

Hackers are impersonating popular secure messaging apps to deploy a sophisticated Android spyware tool called ProSpy against journalists, activists, and poli...

GBHackers →

GBHackers TTPs Oracle 18h ago

DesckVB RAT Uses Fileless .NET Loader to Evade Detection

DesckVB RAT is emerging as a highly active and stealthy malware threat in 2026, leveraging layered obfuscation and fileless execution techniques to bypass tr...

T1027

GBHackers →

SC Media CVE Trend Micro 1d ago

APT28 deploys PRISMEX malware in espionage campaign against Ukraine and allies

The campaign, uncovered by Trend Micro and attributed to APT28 (also known as Fancy Bear and Pawn Storm), exploits newly disclosed vulnerabilities, including...

2 IOCs

SC Media →

SC Media Campaigns 1d ago

Hack-for-hire group targets MENA journalists and officials

Security researchers from Access Now and Lookout have detailed a sophisticated espionage campaign that began in 2023 and continued through 2025.

SC Media →

Microsoft Security Blog General Microsoft 1d ago

The agentic SOC—Rethinking SecOps for the next decade

In the SOC of the future, autonomous defense moves at machine speed, agents add context and coordination, and humans focus on judgment, risk, and outcomes. T...

Microsoft Security Blog →

SC Media Malware 1d ago

Masjesu botnet: Stealthy DDoS-for-hire service targets IoT devices

Masjesu, also known as XorBot due to its use of XOR encryption, prioritizes low visibility and persistence, deliberately avoiding high-profile targets like D...

SC Media →

GBHackers Campaigns Microsoft Google 1d ago

New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT

A recently observed phishing campaign is abusing Google Cloud Storage to deliver the Remcos remote access trojan (RAT), relying on trusted Google infrastruct...

T1566 1 IOC

GBHackers →

Cyberscoop General 1d ago

Don’t just fight fraud, hunt it

As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize ...

T1598

Cyberscoop →

GBHackers TTPs 1d ago

STX RAT Hides Remote Desktop, Steals Data to Dodge Detection

A stealthy new remote access trojan, dubbed STX RAT, that blends hidden remote desktop control with powerful infostealer capabilities while using advanced ev...

GBHackers →

Infosecurity Magazine Campaigns 1d ago

Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group

A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group

T1566

Infosecurity Magazine →

Security Affairs Data Breach 1d ago

The alleged breach of China’s National Supercomputing Center can have serious geopolitical consequences

A hacker allegedly stole 10+ PB of sensitive military and aerospace data from China’s National Supercomputing Center, risking national security. A massive al...

T1041

Security Affairs →

GBHackers Campaigns 1d ago

China’s Tianjin Supercomputer Center Allegedly Hit in 10-Petabyte Data Theft

A threat actor has allegedly executed one of the largest data heists in China’s history, siphoning an astounding 10 petabytes of highly classified informatio...

T1041

GBHackers →

GBHackers TTPs Sophos 1d ago

RoningLoader Campaign Uses DLL Side-Loading, Code Injection to Slip Past Defenses

A sophisticated cyber-espionage group known as DragonBreath (APT-Q-27) has been linked to a new RoningLoader malware campaign that uses advanced evasion tech...

GBHackers →

SecurityWeek General 1d ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Hackers vowed to revive its efforts against America when the time was right — demonstrating how digital warfare has become ingrained in military conflict. Th...

T1598

SecurityWeek →

Elastic Security Labs General 1d ago

Elastic on Defence Cyber Marvel 2026: A Technical overview from the Exercise Floor

An overview of the Elastic Security and AI infrastructure deployed to support the UK Ministry of Defence's flagship cyber exercise, Defence Cyber Marvel 2026.

Elastic Security Labs →

SC Media Ransomware 2d ago

Malaysia faces structural shift in cyber threats

Malaysia's cyber threat landscape is undergoing a significant structural transformation as rapid digitization across critical sectors outpaces defensive capa...

SC Media →

1 2 3 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA