FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers Data Breach Cisco 3d ago

Hackers Exploit Next.js React2Shell Vulnerability, Breach 766 Hosts in 24 Hours

Hackers are abusing a critical React2Shell vulnerability in Next.js applications to run an automated credential‑theft operation that has already compromised ...

GBHackers →

GBHackers Campaigns Microsoft 3d ago

Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows

Hackers are using a deceptive technique known as “ClickFix” to deliver a sophisticated Node. js-based remote access Trojan (RAT) targeting Windows users.

GBHackers →

GBHackers Vulnerability Disclosure Google 3d ago

Critical Android Flaw Allows Zero-Interaction Denial-of-Service Attacks

Google has rolled out its April 2026 Android Security Bulletin, addressing multiple vulnerabilities across the mobile operating system. The most alarming dis...

GBHackers →

GBHackers CVE 3d ago

Attackers Exploit Flowise Injection Vulnerability as 15,000+ Instances Remain Exposed

A critical security flaw in Flowise, a popular open-source AI development platform, is currently being exploited in the wild. Tracked as CVE-2025-59528, this...

1 IOC

GBHackers →

GBHackers Campaigns 3d ago

Fake Installers Spread RATs, Monero Miners in Ongoing Malware Campaign

Fake software installers are being used in a long-running malware operation to drop remote access trojans (RATs), Monero cryptominers, and a new .NET implant...

GBHackers →

GBHackers Vulnerability Disclosure Sophos 3d ago

Threat Actors Exploit LogMeIn Resolve, ScreenConnect in Phishing Campaigns

Threat actors are abusing legitimate remote monitoring and management (RMM) tools LogMeIn Resolve and ScreenConnect in a multi‑stage phishing campaign that b...

T1566 T1204

GBHackers →

GBHackers Campaigns Microsoft 3d ago

Iran-Linked Hackers Hit M365 Tenants in Middle East Password Spray Campaign

Iran-linked threat actors have launched a coordinated password-spraying campaign targeting Microsoft 365 environments across the Middle East, according to ne...

GBHackers →

GBHackers Malware Microsoft Intel 3d ago

New Microsoft Defender Update Issued for Windows 11, Windows 10, and Server Images

Microsoft has rolled out a fresh security intelligence update for Microsoft Defender Antivirus to help secure Windows 11, Windows 10, and Windows Server imag...

GBHackers →

GBHackers Ransomware Microsoft 3d ago

Microsoft Warns Storm-1175 Exploiting Web-Facing Vulnerabilities to Deploy Medusa Ransomware

Microsoft is warning that a fast‑moving threat actor it tracks as Storm‑1175 is aggressively exploiting vulnerabilities in internet‑exposed systems to delive...

GBHackers →

GBHackers CVE WordPress 3d ago

50,000 WordPress Sites Running Ninja Forms Vulnerable to Critical File Upload RCE

A severe security flaw has been discovered in the Ninja Forms File Upload plugin, a widely utilized WordPress add-on that allows website administrators to ac...

1 IOC

GBHackers →

GBHackers Zero-Day Fortinet 3d ago

CISA Alerts Defenders to Actively Exploited Fortinet Zero-Day Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical zero-day vulnerability in Fortinet products. Th...

GBHackers →

GBHackers Campaigns Microsoft Apple 3d ago

Fake TradingView Premium Reddit Posts Spread Vidar and AMOS Stealers

A new malware campaign is abusing Reddit to distribute fake “cracked” builds of TradingView Premium that secretly install Vidar and AMOS information‑stealing...

GBHackers →

GBHackers Zero-Day Microsoft 3d ago

Windows Defender 0-Day Published Online, Giving Attackers Potential Full Access

A newly discovered zero-day vulnerability, dubbed “BlueHammer,” has been publicly disclosed. The flaw, which has been linked to Windows Defender, allows atta...

T1548 T1068 T1598

GBHackers →

GBHackers General 4d ago

Trojanized PyPI AI Proxy Steals Claude Prompt, Exfiltrates Data

A malicious PyPI package, hermes-px, that masquerades as a “Secure AI Inference Proxy” while secretly stealing user prompts and abusing a private university ...

T1041

GBHackers →

GBHackers General Google 4d ago

Google Brings Lazy Loading to Media Files in New Chrome Release

Google has announced a significant update for its Chrome browser, extending native lazy loading capabilities to audio and video elements. This highly anticip...

GBHackers →

GBHackers General 4d ago

Drift Protocol Hit in $286M Suspected North Korea-Linked Crypto Heist

Hackers have stolen approximately $286 million from Drift Protocol, a leading decentralized perpetual futures exchange on the Solana blockchain, in what secu...

GBHackers →

GBHackers Campaigns Microsoft GitHub 4d ago

GitHub-Backed Malware Spread via LNK Files in South Korea

Hackers are abusing Windows shortcut files and GitHub to run a stealthy, multi‑stage malware campaign against organizations in South Korea. The operation cha...

GBHackers →

GBHackers Campaigns GitHub 4d ago

Fake GitHub CI Update Steals Secrets and Tokens

An automated campaign abusing GitHub’s pull_request_target workflow trigger to steal CI/CD secrets at scale. The attacker, using the handle ezmtebo, fired of...

GBHackers →

GBHackers Malware 4d ago

North Korea’s Modular Malware Strategy Hides Attribution, Defies Takedowns

North Korea’s cyber program is shifting from monolithic “families” to a modular, portfolio-style malware ecosystem designed to survive exposure, frustrate at...

GBHackers →

GBHackers Vulnerability Disclosure 4d ago

Critical Claude Code Flaw Silently Bypasses User-Configured Security Rules

Anthropic’s flagship AI coding agent, Claude Code, was recently discovered to contain a critical security flaw that silently bypasses developer-configured sa...

T1041

GBHackers →

« Prev 1 2 3 4 5 6 ... 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA