FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers General Amazon IBM 2d ago

IBM Security Verify Access Flaws Let Remote Attackers Access Sensitive Data

IBM has issued an urgent security bulletin addressing a slew of vulnerabilities impacting IBM Verify Identity Access and IBM Security Verify Access. These fl...

T1041

GBHackers →

GBHackers Malware 2d ago

Masjesu Botnet Targets Routers in Commercial DDoS Attacks

Hackers are abusing the Masjesu botnet to run high-volume DDoS-for-hire attacks against routers, gateways, and other exposed IoT infrastructure, turning ever...

T1498

GBHackers →

GBHackers TTPs 2d ago

GreyNoise Launches C2 Detection for Exploited Edge Devices

GreyNoise has introduced a new capability, C2 Detection, to identify compromised edge devices such as firewalls, routers, and VPN systems assets that are inc...

GBHackers →

GBHackers Phishing 2d ago

Top 10 Best Multi-Factor Authentication (MFA) Providers in 2026

In the digital realm of 2026, the traditional password stands as a flimsy barrier against an onslaught of sophisticated cyber threats. From phishing campaign...

T1566 T1078

GBHackers →

GBHackers CVE Amazon 2d ago

Multiple OpenSSL Flaws Expose Sensitive Data in RSA KEM Handling

A newly disclosed flaw in OpenSSL could allow attackers to access sensitive data stored in application memory. Tracked as CVE-2026-31790, this moderate-sever...

1 IOC

GBHackers →

GBHackers CVE Docker 2d ago

Docker Authorization Bypass Flaw Exposed Hosts to Potential Attackers

A high-severity security vulnerability has been discovered in Docker Engine, exposing hosts to potential authorization bypass attacks. Tracked as CVE-2026-34...

1 IOC

GBHackers →

GBHackers TTPs 2d ago

Remus Infostealer Debuts With Stealthy New Credential-Theft Tactics

Hackers are rolling out a new 64‑bit infostealer dubbed Remus. The code strongly suggests it is a direct successor to the notorious Lumma Stealer, arriving j...

T1555

GBHackers →

GBHackers Data Breach GitHub 2d ago

Claude Code Leak Exploited to Spread Vidar and GhostSocks via GitHub Releases

Hackers are turning the Claude Code source leak into an active malware-delivery channel, using GitHub Releases to push the Vidar stealer and GhostSocks under...

GBHackers →

GBHackers Campaigns Intel 2d ago

FBI Takes Down Russian Campaign That Compromised Thousands of Routers

In a major counter-cyberespionage action dubbed “Operation Masquerade,” the U.S.

GBHackers →

GBHackers TTPs Microsoft Zoom 2d ago

Cybercriminals Use Fake Zoom, Teams Calls to Deliver Malware

Hackers are increasingly using fake Zoom and Microsoft Teams meetings to trick victims into infecting their own systems with malware. SEAL says it has blocke...

T1566

GBHackers →

GBHackers Campaigns Microsoft Intel 2d ago

Russian Threat Actors Abuse Home Routers in Expanding DNS Hijacking Wave

Russian military-linked hackers are actively compromising poorly secured home and small-office routers to hijack internet traffic and spy on organizations wo...

GBHackers →

GBHackers General 2d ago

Fiber Optic Cables Turned Into Hidden Microphones to Spy on Private Conversations

Internet users worldwide rely on fiber optic cables for blazing-fast and secure web connections. However, a groundbreaking discovery reveals that these very ...

GBHackers →

GBHackers Malware 2d ago

ComfyUI Servers Hijacked for Cryptomining, Proxy Botnet Ops

Hackers are aggressively hijacking Internet-exposed ComfyUI servers and converting them into high‑value cryptomining rigs and proxy botnet nodes, abusing wea...

GBHackers →

GBHackers CVE Apache 2d ago

Claude Identifies Critical 13-Year-Old RCE Vulnerability in Apache ActiveMQ

An AI assistant recently uncovered a critical remote code execution (RCE) vulnerability in Apache ActiveMQ Classic that went unnoticed for 13 years. Tracked ...

T1190 1 IOC

GBHackers →

GBHackers Vulnerability Disclosure Amazon Linux 3d ago

CUPS Vulnerabilities Could Allow Remote Attackers to Achieve Root-Level Code Execution

A team of AI-driven vulnerability hunting agents directed by security researcher Asim Viladi Oglu Manizada has discovered two critical security flaws in CUPS...

T1190

GBHackers →

GBHackers TTPs Linux 3d ago

BPFDoor Variants Hide with Stateless C2 and ICMP Relay Tactics

Seven new BPFDoor variants that push Linux backdoor tradecraft deep into the kernel, making them harder to spot in large telecom networks. These implants use...

GBHackers →

GBHackers Vulnerability Disclosure Amazon 3d ago

Windmill Developer Platform Flaws Expose Users to RCE Attacks, Proof-of-Concept Published

Cybersecurity researchers have discovered critical vulnerabilities in the Windmill developer platform and Nextcloud Flow, an integration embedding the Windmi...

T1041

GBHackers →

GBHackers General Amazon Docker Kubernetes 3d ago

Kubernetes Flaws Let Hackers Jump From Containers to Cloud Accounts

Hackers are increasingly abusing Kubernetes misconfigurations to jump from containers into high‑value cloud accounts, turning a single compromised pod into f...

GBHackers →

GBHackers Vulnerability Disclosure 3d ago

GPUBreach Attack Could Lead to Full System Takeover and Root Shell Access

A newly discovered vulnerability dubbed “GPUBreach” demonstrates that GPU-based Rowhammer attacks can now achieve complete system compromise. Scheduled for p...

GBHackers →

GBHackers General 3d ago

Fake Gemini npm Package Steals AI Tool Tokens

Hackers are abusing a fake Gemini-themed npm package to steal tokens and secrets from developers using AI coding tools like Claude, Cursor, Windsurf, PearAI,...

GBHackers →

« Prev 1 2 3 4 5 ... 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA