FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers General Apr 1

Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec

New York, New York, April 1st, 2026, CyberNewswire TAC Infosec, a global leader in cybersecurity (NSE: TAC), with presence across 100+ countries, announced a...

GBHackers →

GBHackers Vulnerability Disclosure Apr 1

Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests

Hackers are increasingly targeting hotel booking workflows to trick travelers into handing over payment details, using a technique that blends real reservati...

T1204

GBHackers →

GBHackers CVE F5 Apr 1

PoC Exploit Code Published for nginx-ui Backup Restore Security Flaw

A critical security flaw in the nginx-ui backup restore mechanism, tracked as CVE-2026-33026, allows attackers to manipulate encrypted backups and execute ar...

1 IOC

GBHackers →

GBHackers Data Breach Microsoft Apple Linux Apr 1

North Korean Hackers Breach Axios Package, Target Windows, macOS, and Linux Systems

A North Korea–nexus threat actor has hijacked the popular Axios NPM package in a high‑impact software supply chain attack that can silently backdoor Windows,...

T1195

GBHackers →

GBHackers General Amazon Apr 1

CrewAI Hit by Critical Vulnerabilities Enabling Sandbox Escape and Host Compromise

CrewAI, a prominent tool used by developers to orchestrate multi-agent AI systems, is currently vulnerable to a chain of critical security flaws. By using di...

GBHackers →

GBHackers General Microsoft Apr 1

Windows 11 Update Fixes Critical Installation Loop Problem

Microsoft has rolled out an urgent, out-of-band update to fix a frustrating installation glitch plaguing Windows 11 users. On March 31, 2026, the company rel...

GBHackers →

GBHackers Malware Microsoft Apple Linux Apr 1

PyPI Telnyx Python SDK Backdoored to Steal Credentials on Windows, macOS, and Linux

Telnyx Python SDK on PyPI, using a multi‑stage WAV steganography payload to steal credentials across Windows, macOS, and Linux systems. The backdoor lives in...

GBHackers →

GBHackers Zero-Day Check Point Apr 1

TrueConf Vulnerability Under Active Exploitation in Southeast Asia Government Attacks

Check Point Research has discovered a critical zero-day vulnerability in the TrueConf video conferencing client. Tracked as CVE-2026-3502 with a CVSS score o...

1 IOC

GBHackers →

GBHackers Supply Chain Apr 1

NPM Supply Chain Attack Uses undicy-http to Deploy RAT

A highly sophisticated npm supply chain attack that abuses a fake HTTP client package to deliver both a powerful RAT and a stealthy browser stealer. The mali...

T1195

GBHackers →

GBHackers Vulnerability Disclosure Google Palo Alto Networks Intel Apr 1

Google Cloud’s Vertex AI Hit by Vulnerability Enabling Sensitive Data Access

Artificial intelligence agents are transforming enterprise workflows, but they also introduce dangerous new attack vectors. Security researchers from Palo Al...

T1041

GBHackers →

GBHackers CVE Oracle Apr 1

Hackers Actively Exploit Critical WebLogic RCE Vulnerabilities in Ongoing Attacks

A maximum-severity vulnerability in Oracle WebLogic Server is facing rapid exploitation in the wild. Tracked as CVE-2026-21962, this unauthenticated Remote C...

T1190 1 IOC

GBHackers →

GBHackers TTPs Apr 1

XLoader malware Sharpens Obfuscation, Masks C2 Traffic via Decoy Servers

XLoader’s developers have released new versions that significantly harden the malware’s code and hide its command‑and‑control (C2) traffic behind layers of e...

T1027

GBHackers →

GBHackers Ransomware Microsoft Mar 31

Windows Tools Abused to Kill AV Ahead of Ransomware Attacks

Hackers are increasingly turning legitimate Windows administration tools into stealthy weapons to disable antivirus and EDR before launching ransomware, maki...

T1562 T1598

GBHackers →

GBHackers Malware Apple Mar 31

Axios NPM Packages Breached in Ongoing Supply Chain Attack

A severe supply chain attack has compromised the widely used Axios HTTP client on the npm registry. Attackers injected a malicious dependency into specific A...

T1195

GBHackers →

GBHackers Data Breach Mar 31

Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline

The Dutch Ministry of Finance is actively managing a significant cybersecurity incident after discovering unauthorized access to its internal Information and...

T1021 T1041

GBHackers →

GBHackers TTPs Microsoft Mar 31

Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence

Hackers are deploying a new Windows malware called ResokerRAT, a Telegram‑based Remote Access Trojan (RAT) that gives attackers stealthy remote control over ...

T1041

GBHackers →

GBHackers General Amazon Mar 31

PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data

Security researchers have disclosed two high-severity vulnerabilities in libpng, the widely deployed reference library used for processing Portable Network G...

GBHackers →

GBHackers Phishing Microsoft Mar 31

EvilTokens Launches New Phishing Service Targeting Microsoft Accounts

EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that industrialises Microsoft account takeover by abusing the OAuth device code flow rather than t...

T1566 T1598

GBHackers →

GBHackers Ransomware Google Mar 31

Google Introduces Advanced Ransomware Defense and Recovery Features in Drive

Google has officially moved its advanced ransomware detection and file restoration features for Google Drive out of beta, making them generally available to ...

GBHackers →

GBHackers General Apple Mar 31

Apple Adds ClickFix Attack Warnings in New macOS Tahoe Security Feature

Apple has silently introduced a new security mechanism in macOS Tahoe 26.4 to protect users against social engineering campaigns known as ClickFix attacks.

T1204

GBHackers →

« Prev 1 ... 6 7 8 9 10 ... 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA