FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine Ransomware Check Point 10h ago

Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month

Qilin, Akira and Dragonforce were responsible for 40% of 672 ransomware incidents reported in March, says Check Point

Infosecurity Magazine →

Infosecurity Magazine General Google 10h ago

Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies

Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie

Infosecurity Magazine →

Infosecurity Magazine TTPs 1d ago

STX RAT Targets Finance Sector With Advanced Stealth Tactics

STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods

Infosecurity Magazine →

Infosecurity Magazine Data Breach 1d ago

Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

Bitcoin Depot has disclosed a cyber-attack that led to the theft of more than 50 Bitcoin, worth $3.

Infosecurity Magazine →

Infosecurity Magazine General Apple 1d ago

Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings

macOS 26.

Infosecurity Magazine →

Infosecurity Magazine Campaigns 1d ago

Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group

A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group

T1566

Infosecurity Magazine →

Infosecurity Magazine General 1d ago

Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs

SANS Institute reveals that AI agents are behind a 76% surge in non-human identities

Infosecurity Magazine →

Infosecurity Magazine General Google Intel 1d ago

Google Warns of New Threat Group Targeting BPOs and Helpdesks

Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises

Infosecurity Magazine →

Infosecurity Magazine General Google 2d ago

Google API Keys Quietly Gain Access to Gemini on Android Devices

Google API key flaw exposes mobile apps to Gemini AI access, private files and billing risks

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure WordPress 2d ago

Critical Vulnerability in Ninja Forms Exposes WordPress Sites

Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.

Infosecurity Magazine →

Infosecurity Magazine General 2d ago

Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities

Anthropic launches Project Glasswing, using its Claude Mythos Preview AI to autonomously identify and fix undiscovered vulnerabilities in critical software

Infosecurity Magazine →

Infosecurity Magazine Campaigns 2d ago

US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers

The FBI deployed a method to unplug US-based routers compromised by APT28 from the threat actor’s malicious network

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Apache 2d ago

Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years

Anthropic’s Claude AI has helped researchers find a vulnerability in Apache ActiveMQ Classic

Infosecurity Magazine →

Infosecurity Magazine General 2d ago

Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets

CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms

Infosecurity Magazine →

Infosecurity Magazine Campaigns 3d ago

Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns

Newly identified malicious campaigns are linked to virtual private servers modified by APT28 to operate as malicious DNS servers

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure 3d ago

GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise

GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root

T1548

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Amazon 3d ago

GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration

GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data

T1041

Infosecurity Magazine →

Infosecurity Magazine General 3d ago

Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI

Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI

Infosecurity Magazine →

Infosecurity Magazine Ransomware Microsoft Amazon 3d ago

Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks

Microsoft has released a new report about the Storm-1175 group and its connection to Medusa ransomware

Infosecurity Magazine →

Infosecurity Magazine Zero-Day Fortinet 3d ago

Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited

Fortinet has updated its FortiClient EMS product after zero-day attacks surfaced

Infosecurity Magazine →

1 2 3 ... 16 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA