FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers Phishing Mar 31

Tax Filing Scams Used to Deliver Malware in New Cybercrime Campaigns

Cybercriminals are once again exploiting global tax seasons, abusing IRS and tax filing lures to deliver malware, remote monitoring and management (RMM) tool...

T1566 T1598

GBHackers →

GBHackers Data Breach Mar 31

CareCloud Data Breach Exposes Patient Data After Hackers Access IT Systems

CareCloud, Inc., a prominent healthcare technology provider, has disclosed a material cybersecurity incident involving unauthorized access to its electronic ...

GBHackers →

GBHackers Malware Microsoft Mar 31

DeepLoad Malware Uses ClickFix and AI Evasion to Hit Enterprise Networks

New “DeepLoad” malware is turning a single user click into fileless, credential‑stealing persistence inside enterprise networks, leveraging the ClickFix tech...

T1204 T1027

GBHackers →

GBHackers Vulnerability Disclosure Check Point Intel Mar 31

ChatGPT Vulnerability Enabled Silent Leakage of Prompts and Sensitive Information

Artificial intelligence assistants increasingly handle our most sensitive data, operating under the assumption that enclosed environments keep this informati...

GBHackers →

GBHackers Malware Mar 31

RoadK1ll Malware Turns Hacked Devices Into Network Relays

Hackers are deploying a new Node. js-based implant dubbed RoadK1ll to quietly turn compromised hosts into on-demand network relays, enabling stealthy pivotin...

GBHackers →

GBHackers Zero-Day Amazon Intel Mar 31

Claude AI Uncovers Zero-Day RCE Vulnerabilities in Vim and Emacs

Security researchers at Calif recently demonstrated the evolving power of artificial intelligence in vulnerability research by using Claude AI to uncover zer...

T1190

GBHackers →

GBHackers Malware Mar 31

GhostSocks Hijacks Devices as Proxy Network for Stealthy Cyberattacks

A newly emerging malware known as GhostSocks is quietly reshaping how attackers evade detection by converting compromised systems into residential proxy node...

GBHackers →

GBHackers Vulnerability Disclosure Mar 31

Notepad++ v8.9.3 Released With Fixes for cURL Security Flaw and Crash Bugs

Notepad++ rolled out version 8.9.

GBHackers →

GBHackers Malware Microsoft Mar 30

Russian Hackers Deploy “CTRL” for RDP Hijacking

Russian hackers are using a new remote access toolkit called “CTRL” to silently hijack Remote Desktop Protocol (RDP) sessions via FRP-based reverse tunnels, ...

T1078

GBHackers →

GBHackers Ransomware Mar 30

Exposed Server Leaks TheGentlemen Ransomware Toolkit, Credentials, and Ngrok Tokens

A fully operational TheGentlemen ransomware toolkit on an exposed server, revealing victim credentials, ngrok tokens, and a complete pre-encryption playbook....

GBHackers →

GBHackers General Intel Mar 30

North Korean IT Worker Used Stolen Identity, AI-Generated Resume in Job Scam

A recent investigation as exposed how a suspected North Korean IT worker allegedly used a stolen identity, AI-generated resume content, and scripted intervie...

GBHackers →

GBHackers TTPs Microsoft Mar 30

CrySome RAT: Stealthy .NET Malware Adds AV Killer, HVNC Features

CrySome RAT is a newly observed, advanced .NET remote access trojan that combines full‑featured post‑exploitation tooling with unusually hardened persistence...

GBHackers →

GBHackers General Mar 30

India Set to Ban Hikvision, TP-Link Devices in April

Starting April 1, 2026, the Indian government will officially enforce a nationwide ban on the sale of internet-connected CCTV cameras from major Chinese manu...

GBHackers →

GBHackers General Microsoft Mar 30

ClickFix Evades PowerShell Detection via Rundll32 and WebDAV

A new variant of the ClickFix attack technique that shifts execution away from commonly monitored tools like PowerShell and mshta, instead abusing native Win...

GBHackers →

GBHackers Vulnerability Disclosure WordPress Mar 30

WordPress Plugin Flaw Exposes Sensitive Data Across 800,000+ Sites

A severe security flaw has been disclosed in Smart Slider 3, a highly popular WordPress plugin currently active on more than 800,000 websites. Discovered by ...

GBHackers →

GBHackers Data Breach Apple Mar 30

TA446 Uses DarkSword Exploit Kit to Target iPhone Users

TA446, a Russia-linked espionage group, has started using the DarkSword exploit kit to compromise iOS devices in a new phishing wave that abuses Atlantic Cou...

T1566 T1588

GBHackers →

GBHackers TTPs Mar 30

New Homoglyph Tricks Let Cybercriminals Mimic Trusted Domains

New homoglyph attack techniques are turning tiny visual differences in text into a reliable way to spoof trusted domains, steal credentials, and bypass weak ...

GBHackers →

GBHackers Campaigns GitHub Kubernetes Mar 30

Telnyx Python SDK Backdoored on PyPI to Steal Cloud Credentials

The popular Telnyx Python SDK on PyPI to deploy a multi‑stage credential‑stealing operation that targets cloud infrastructure, Kubernetes clusters, and devel...

GBHackers →

GBHackers CVE Fortinet Intel Mar 30

Critical Fortinet FortiClient EMS Vulnerability Actively Exploited in Attacks

Threat intelligence researchers have detected active exploitation of a critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS). T...

1 IOC

GBHackers →

GBHackers Vulnerability Disclosure Atlassian Mar 30

Stored XSS Vulnerability in Jira Work Management Could Enable Full Organization Takeover

Security researchers recently uncovered a critical stored Cross-Site Scripting (XSS) vulnerability within Atlassian’s Jira Work Management platform. This fla...

GBHackers →

« Prev 1 ... 7 8 9 10 11 12 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA