FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers Phishing Mar 27

Phishing ZIP Files Used to Deploy PXA Stealer Targeting Financial Firms

A sharp rise in PXA Stealer campaigns targeting global financial institutions during the first quarter of 2026. The activity marks a notable shift in the inf...

T1566

GBHackers →

GBHackers Campaigns Rapid7 Linux Mar 27

Hackers Implant Stealthy BPFdoor Backdoors in Telecom Networks for Persistent Access

A China-nexus threat actor known as Red Menshen is planting stealthy backdoors deep inside global telecommunications networks. According to a recent investig...

GBHackers →

GBHackers Malware Apple Cloudflare Mar 27

Fake Cloudflare CAPTCHA Pages Deliver Infiniti Stealer Malware on macOS

A newly discovered macOS infostealer dubbed Infiniti Stealer is being actively distributed through deceptive Cloudflare-style CAPTCHA pages, marking a notabl...

T1204 T1598

GBHackers →

GBHackers CVE Mar 27

ISC Issues Critical Warning Over Kea DHCP Vulnerability That Could Remotely Crash Services

The Internet Systems Consortium (ISC) has released a critical security advisory addressing a high-severity vulnerability in its Kea DHCP server software. Kea...

1 IOC

GBHackers →

GBHackers Malware Microsoft Apple Mar 26

New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware

Threat actors are standardizing a powerful ClickFix-based attack that abuses the Windows Run dialog box and macOS Terminal to deliver malware while sidestepp...

1 IOC

GBHackers →

GBHackers Data Breach Mar 26

Leak Bazaar Converts Stolen Corporate Data Into Organized Criminal Marketplace

A new cybercriminal service called “Leak Bazaar” has surfaced on the Russian-speaking TierOne forum, advertised on March 25, 2026, by a user known as Snow of...

GBHackers →

GBHackers Malware Linux Mar 26

VoidLink Rootkit Leverages eBPF and Kernel Modules to Stealthily Infiltrate Linux Systems

VoidLink is a new Linux rootkit family that combines classic kernel modules with eBPF to hide processes and network activity deep inside modern cloud environ...

GBHackers →

GBHackers Malware Apple GitHub Mar 26

GhostClaw AI Malware Targets macOS Users with Credential-Stealing Payloads

GhostClaw is a multi-stage macOS infostealer that now abuses both GitHub and AI-assisted development workflows to harvest credentials and deploy secondary pa...

GBHackers →

GBHackers CVE Mar 26

CISA Issues Urgent Warning on Langflow Code Injection Vulnerability Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical code-injection vulnerability in Langflow. Tracked a...

1 IOC

GBHackers →

GBHackers Zero-Day Ivanti Mar 26

Critical Ivanti EPMM Vulnerabilities Expose Systems to Arbitrary Code Execution Attacks

In February 2026, threat actors actively exploited two critical remote code execution (RCE) vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). A recen...

T1190 T1041

GBHackers →

GBHackers Vulnerability Disclosure NVIDIA Mar 26

Critical NVIDIA Vulnerabilities Risk Remote Code Execution and Denial-of-Service Attacks

NVIDIA has recently published its March 2026 security bulletins, addressing a wave of newly discovered vulnerabilities across its hardware and software ecosy...

T1190

GBHackers →

GBHackers Campaigns Intel Mar 26

Silver Fox Tax Audit Phishing Campaign Shifts from RATs to Python Stealers

Threat intelligence teams have tracked Silver Fox (also known as Void Arachne), a China-based intrusion set that sits at the intersection of financially moti...

T1566

GBHackers →

GBHackers TTPs Cloudflare Mar 26

Torg Grabber Malware Shifts from Telegram Exfiltration to Encrypted REST API for C2

A fast-evolving information‑stealing malware dubbed “Torg Grabber” that has shifted from simple Telegram‑based exfiltration to a hardened, encrypted REST API...

T1041

GBHackers →

GBHackers Campaigns Amazon Mar 26

Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack

Fake screenshot links are being used to quietly deploy a multi‑stage backdoor against Web3 customer support teams, in a campaign assessed to be linked to the...

GBHackers →

GBHackers CVE Microsoft Mar 26

IDrive for Windows Vulnerability Allows Attackers to Escalate Privileges and Gain Unauthorized Access

A critical security flaw has been identified in the IDrive Cloud Backup Client for Windows, exposing users to local privilege escalation attacks. Tracked as ...

T1548 T1068 1 IOC

GBHackers →

GBHackers TTPs Mar 26

Kiss Loader Malware Targets with Early Bird APC Injection in New Attack Campaign

A newly identified malware loader dubbed “Kiss Loader” is emerging as a potential threat, leveraging advanced process injection techniques and dynamic delive...

GBHackers →

GBHackers Malware Mar 26

Preventing Account Takeovers: A Practical Guide to Detection and Response

Yesterday’s password leak can become tomorrow’s identity crisis. According to research firm Gitnux, account-takeover attacks jumped 354 percent in 2023, driv...

T1078 T1598

GBHackers →

GBHackers Vulnerability Disclosure Mar 26

Synology DiskStation Manager Vulnerability Puts Users at Risk of Remote Command Execution Attacks

Synology has issued an urgent security update for its DiskStation Manager (DSM) software to address a critical vulnerability. If left unpatched, this flaw co...

GBHackers →

GBHackers Campaigns Mar 26

Fake npm Install Messages Conceal RAT Malware in New Open Source Supply Chain Attack

Fake npm install messages are the latest social engineering trick in the open source supply chain, with attackers abusing npm post‑install scripts to silentl...

T1204 T1195

GBHackers →

GBHackers Campaigns Mar 26

LeakBase Forum Admin Arrested by Russian Authorities in Global Cybercrime Operation

Russian law enforcement agencies have successfully apprehended the suspected administrator of LeakBase, a prominent international cybercrime forum. The arres...

GBHackers →

« Prev 1 ... 9 10 11 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA