FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Google

20 articles

HackRead Malware Google NEW 1h ago

Android Banking Trojan Linked to Cambodia Scam Compounds Hits 21 Countries

Android banking trojan linked to Cambodia scam compounds uses forced labour to target users in 21 countries, bypassing security to steal funds.

HackRead →

SC Media General Google NEW 1h ago

EngageLab SDK bug threatened expansive Android crypto wallet compromise

Popular third-party Android software development kit EngageLab SDK has been impacted by an already addressed intent redirection flaw, which could have been e...

SC Media →

Google Security Blog General Google 7h ago

Bringing Rust to the Pixel Baseband

Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have been focusing on hardenin...

Google Security Blog →

GBHackers Vulnerability Disclosure Google 8h ago

EngageSDK Vulnerability puts millions of crypto wallets at risk

A newly disclosed vulnerability in the widely used Android library EngageSDK has raised serious concerns across the cryptocurrency ecosystem, potentially exp...

T1041

GBHackers →

Infosecurity Magazine General Google 10h ago

Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies

Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie

Infosecurity Magazine →

SecurityWeek General Google Amazon 11h ago

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000

The critical vulnerabilities affect Chrome’s WebML component and they have been reported by anonymous researchers. The post Chrome 147 Patches 60 Vulnerabili...

SecurityWeek →

BleepingComputer General Google Apple 11h ago

Google rolls out Gmail end-to-end encryption on mobile devices

Google says Gmail end-to-end encryption (E2EE) is now available on all Android and iOS devices, allowing enterprise users to read and compose emails without ...

BleepingComputer →

Help Net Security General Google Apple 12h ago

Gmail’s end-to-end encryption comes to mobile, no extra apps required

Google has expanded Gmail client-side encryption to Android and iOS devices, allowing users to engage with their organization’s most sensitive data on mobile...

Help Net Security →

Help Net Security Malware Google 13h ago

To counter cookie theft, Chrome ships device-bound session credentials

Cookie theft follows a well-established pattern. Infostealer malware infiltrates a device, extracts authentication cookies, and exfiltrates them to an attack...

T1078 T1041 T1598

Help Net Security →

GBHackers Campaigns Google 13h ago

Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy

Hackers are impersonating popular secure messaging apps to deploy a sophisticated Android spyware tool called ProSpy against journalists, activists, and poli...

GBHackers →

GBHackers General Google Intel 14h ago

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action

9th, 2026, CyberNewswire Built by a veteran security team and led by a former Google and Mandiant executive, Mallory delivers intelligence that drives action...

GBHackers →

SecurityWeek General Google 14h ago

Google Rolls Out Cookie Theft Protections in Chrome

New Device Bound Session Credentials render stolen session cookies unusable by cryptographically binding authentication. The post Google Rolls Out Cookie The...

SecurityWeek →

Cyberscoop General Google 1d ago

Why is the timeline to quantum-proof everything constantly shrinking?

Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroughs are pushing Google and others to call for speedier mig...

Cyberscoop →

CSO Online General Google Cloudflare 1d ago

Cloudflare ‘actively adjusting’ quantum priorities in wake of Google warning

Google’s accelerated post-quantum encryption deadline has spurred other leaders in the industry, including Cloudflare, to consider pushing forward their own ...

T1598

CSO Online →

SC Media Phishing Google 1d ago

Actor tied to Raccoon targets 'several dozen' companies by exploiting BPOs and helpdesks

Google says UNC6783 leverages social engineering and phishing campaigns to gain entry to the BPOs.

T1566 T1204

SC Media →

SecurityWeek General Google 1d ago

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini endpoints. The post Google API Keys in Android Apps Expose Gemin...

SecurityWeek →

SecurityWeek Campaigns Google Adobe 1d ago

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

Tracked as UNC6783, the threat actor is likely linked to Mr. Raccoon, the hacker behind the alleged theft of Adobe data from a BPO.

SecurityWeek →

Infosecurity Magazine General Google Intel 1d ago

Google Warns of New Threat Group Targeting BPOs and Helpdesks

Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises

Infosecurity Magazine →

BleepingComputer Campaigns Google 2d ago

Google: New UNC6783 hackers steal corporate Zendesk support tickets

A threat actor tracked as UNC6783 is compromising business process outsourcing (BPO) providers to gain access to high-value companies across multiple sectors...

BleepingComputer →

SANS ISC Data Breach Google Cisco Intel 2d ago

TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)

This is the seventh update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0;"When the Security Scanner Became the We...

T1598

SANS ISC →

1 2 3 ... 10 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA