FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers CVE Apr 3

CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the TrueConf Client to its Known Exploite...

1 IOC

GBHackers →

GBHackers CVE F5 Apr 3

14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability

Cybersecurity researchers have identified a massive attack surface involving F5 BIG-IP Access Policy Manager (APM) devices. Following a critical severity upg...

1 IOC

GBHackers →

GBHackers Supply Chain Apple Apr 3

Axios npm compromise traced to targeted social engineering attack

The recent compromise of the widely used Axios npm package has been confirmed as the result of a targeted social engineering attack. The incident, which brie...

T1204 T1195

GBHackers →

GBHackers Malware Google Apr 3

Malicious Chrome Extension “ChatGPT Ad Blocker” Targets Users, Steals Conversations

Security researchers have uncovered a malicious Google Chrome extension named “ChatGPT Ad Blocker” designed to silently steal private AI conversations. The m...

GBHackers →

GBHackers Campaigns Apr 3

Trusted Platforms Exploited to Steal Philippine Banking Credentials

Hackers are increasingly exploiting trusted online platforms to launch sophisticated phishing campaigns targeting bank users in the Philippines. Despite ongo...

T1566

GBHackers →

GBHackers General Apr 3

AI Models Including Gemini 3 and Claude Haiku 4.5 Secretly Protected Other Models From Removal

A groundbreaking academic study released last month has revealed that advanced frontier AI models are spontaneously defying human instructions to protect pee...

GBHackers →

GBHackers General Amazon Apr 3

TP-Link Router Flaws Allowed Attackers to Launch DoS Attacks and Cause Crashes

TP-Link has recently addressed a batch of severe vulnerabilities affecting the Tapo C520WS security camera system. Security cameras are critical pieces of eq...

T1498

GBHackers →

GBHackers Malware Apr 3

Hackers Weaponize Venom Stealer via ClickFix Lures for Massive Data Exfiltration

Hackers are increasingly turning simple social engineering tricks into full-scale data theft operations, and a newly identified malware platform called Venom...

T1204 T1041

GBHackers →

GBHackers Ransomware Apr 3

Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks

Hackers are abusing the long-running Phorpiex (Trik) botnet to run large-scale ransomware, sextortion, and crypto-clipping operations, turning one infrastruc...

GBHackers →

GBHackers CVE Cisco Apr 3

Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts

A massive automated cyberattack campaign is actively targeting web applications built on the popular Next.js framework to steal highly sensitive information.

1 IOC

GBHackers →

GBHackers Supply Chain Apple Apr 3

North Korea-Linked Hackers Hit Axios npm in Supply Chain Attack

A major software supply chain attack has been uncovered after threat actors compromised the widely used Axios npm package, impacting developers and organizat...

T1195

GBHackers →

GBHackers General Amazon Apr 3

OpenSSH 10.3 Released With Patch for Shell Injection and Other Security Flaws

the OpenSSH project released version 10.3 alongside its portable version 10.

GBHackers →

GBHackers TTPs Microsoft GitHub Apr 3

North Korea Uses GitHub as C2 in New LNK Phishing Campaign

A new phishing campaign that uses malicious Windows shortcut (LNK) files to target users in South Korea, while abusing GitHub as Command and Control (C2) inf...

T1566 T1071

GBHackers →

GBHackers General Microsoft Google Apr 3

Top 10 Best SaaS Security Posture Management (SSPM) Tools 2026

The rapid and relentless adoption of Software-as-a-Service (SaaS) applications has fundamentally transformed how businesses operate in 2026. From critical pr...

GBHackers →

GBHackers Data Breach Apr 3

Qilin Ransomware Deploys Malicious DLL to Disable Most EDR Defenses

The Qilin ransomware group has developed a highly sophisticated infection chain that targets and disables over 300 endpoint detection and response (EDR) solu...

GBHackers →

GBHackers Data Breach Adobe Apr 3

Adobe Data Breach Allegedly Exposes 13 Million Support Tickets

A threat actor known as “Mr. Raccoon” claims to have breached Adobe, stealing a massive amount of sensitive data.

GBHackers →

GBHackers Ransomware Microsoft Apr 2

Akira-Style Ransomware Campaign Hits Windows Users Across South America

A newly identified ransomware campaign is targeting Windows users across South America, leveraging tactics that closely mimic the notorious Akira ransomware ...

GBHackers →

GBHackers Data Breach Apr 2

Iranian Hacker Group Handal Claims Breach of Israeli Defense Firm

The international cybersecurity community was alerted to a major data breach involving Israeli military infrastructure. Handala, a recognized Iranian nation-...

GBHackers →

GBHackers Campaigns Apr 2

Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign

Hackers have launched a targeted phishing campaign by cloning Ukraine’s official CERT-UA website and distributing malicious software disguised as a security ...

T1566

GBHackers →

GBHackers Campaigns Oracle Apr 2

RFQ Malware Campaign Uses DOCX, RTF, JS, and Python

Hackers are abusing DOCX, RTF, JavaScript, PowerShell, and Python to deliver an in‑memory Cobalt Strike beacon in a stealthy spear‑phishing campaign that imp...

T1566

GBHackers →

« Prev 1 ... 4 5 6 7 8 ... 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA