FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

BleepingComputer

20 articles

BleepingComputer Data Breach Cisco Mar 31

Cisco source code stolen in Trivy-linked dev environment breach

Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development env...

T1078 T1195

BleepingComputer →

BleepingComputer General Mar 31

How to Categorize AI Agents and Prioritize Risk

AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize ...

BleepingComputer →

BleepingComputer Malware Microsoft Apple Oracle Linux Mar 31

Hackers compromise Axios npm package to drop cross-platform malware

Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windo...

BleepingComputer →

BleepingComputer General Microsoft Mar 31

Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in

​Microsoft has resolved a known issue that rendered the classic Outlook email client unusable for users who enabled the Microsoft Teams Meeting Add-in. [.

BleepingComputer →

BleepingComputer General Mar 31

Hacker charged with stealing $53 million from Uranium crypto exchange

U.S.

BleepingComputer →

BleepingComputer Data Breach Mar 31

Dutch Finance Ministry takes treasury banking portal offline after breach

The Dutch Ministry of Finance took some of its systems offline, including the digital portal for treasury banking, while investigating a cyberattack detected...

BleepingComputer →

BleepingComputer Vulnerability Disclosure Citrix Mar 31

CISA orders feds to patch actively exploited Citrix flaw by Thursday

The U.S.

BleepingComputer →

BleepingComputer Data Breach Mar 30

Healthcare tech firm CareCloud says hackers stole patient data

Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hou...

BleepingComputer →

BleepingComputer General Mar 30

New RoadK1ll WebSocket implant used to pivot on breached networks

A newly identified malicious implant named RoadK1ll is enabling threat actors to quietly move from a compromised host to other systems on the network. [.

BleepingComputer →

BleepingComputer CVE Citrix Mar 30

Critical Citrix NetScaler memory flaw actively exploited in attacks

Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix NetScaler ADC and NetScaler Gateway appliances to obtain sensit...

1 IOC

BleepingComputer →

BleepingComputer General Apple Mar 30

Apple adds macOS Terminal warning to block ClickFix attacks

Apple has introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to po...

BleepingComputer →

BleepingComputer General Mar 30

How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking

AI SOC agents can reduce alert fatigue, but most teams fail to measure real outcomes. Prophet Security breaks down Gartner's questions for evaluating AI SOC ...

BleepingComputer →

BleepingComputer Vulnerability Disclosure F5 Mar 30

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are ex...

T1190

BleepingComputer →

BleepingComputer General Microsoft Mar 30

Microsoft pulls KB5079391 Windows update over install issues

Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation. [.

BleepingComputer →

BleepingComputer Vulnerability Disclosure Fortinet Intel Mar 30

Critical Fortinet Forticlient EMS flaw now exploited in attacks

Attackers are now actively exploiting a critical vulnerability in Fortinet's FortiClient EMS platform, according to threat intelligence company Defused. [.

BleepingComputer →

BleepingComputer Data Breach Mar 30

European Commission confirms data breach after Europa.eu hack

The European Commission has confirmed a data breach after its Europa.eu web platform was hacked in a cyberattack claimed by the ShinyHunters extortion gang.

BleepingComputer →

BleepingComputer General Mar 29

FBI confirms hack of Director Patel's personal email inbox

The Handala hackers associated with Iran have breached the personal email account of FBI Director Kash Patel and published photos and documents. [.

BleepingComputer →

BleepingComputer Vulnerability Disclosure WordPress Mar 29

File read flaw in Smart Slider plugin impacts 500K WordPress sites

A vulnerability in the Smart Slider 3 WordPress plugin, active on more than 800,000 websites, can be exploited to allow subscriber-level users access to arbi...

BleepingComputer →

BleepingComputer Malware Apple Mar 28

New Infinity Stealer malware grabs macOS data via ClickFix lures

A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka co...

BleepingComputer →

BleepingComputer Malware Mar 27

Backdoored Telnyx PyPI package pushes malware hidden in WAV audio

TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidde...

BleepingComputer →

« Prev 1 ... 3 4 5 6 7 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA