FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet GitHub Linux Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Microsoft

20 articles

Microsoft Security Blog Vulnerability Disclosure Microsoft Google 2d ago

Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk

A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers detail ...

Microsoft Security Blog →

Rapid7 Blog General Microsoft Rapid7 2d ago

What’s New in Rapid7 Products and Services: Q1 2026 in Review

If product releases had a runway moment, Q1 at Rapid7 would’ve walked out in Cloud Dancer; crisp, confident, and quietly powerful, before breaking into a ful...

Rapid7 Blog →

GBHackers Campaigns Microsoft Google 2d ago

New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT

A recently observed phishing campaign is abusing Google Cloud Storage to deliver the Remcos remote access trojan (RAT), relying on trusted Google infrastruct...

T1566 1 IOC

GBHackers →

Help Net Security General Microsoft Google Amazon Docker 2d ago

Intruder expands cloud security with agentless container image scanning

Intruder has announced the release of Container Image Scanning, a new upgrade to its cloud security capabilities that automatically scans container images fo...

Help Net Security →

Trail of Bits General Microsoft Linux 2d ago

Master C and C++ with our new Testing Handbook chapter

We added a new chapter to our Testing Handbook: a comprehensive security checklist for C and C++ code. We’ve identified a broad range of common bug classes, ...

Trail of Bits →

Schneier on Security General Microsoft 2d ago

On Microsoft’s Lousy Cloud Security

ProPublica has a scoop: In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud comp...

Schneier on Security →

GBHackers General Microsoft Intel 2d ago

Microsoft Details How Defender Protects High-Value Assets in Real-World Attacks

Microsoft has significantly upgraded its Defender platform to automatically detect and block sophisticated cyberattacks targeting High-Value Assets (HVAs) li...

T1598

GBHackers →

CSO Online Vulnerability Disclosure Microsoft Rapid7 2d ago

Patch windows collapse as time-to-exploit accelerates

The gap between vulnerability disclosure and exploitation is drastically decreasing, putting security teams’ patching practices on notice. According to Rapid...

CSO Online →

GBHackers Advisory Microsoft Google Amazon Linux 3d ago

Critical Chrome Flaws Let Attackers Execute Arbitrary Code

Google has released an urgent security update for its Chrome browser, resolving multiple dangerous vulnerabilities. The Chrome team promoted version 147 to t...

GBHackers →

BleepingComputer General Microsoft 3d ago

Microsoft suspends dev accounts for high-profile open source projects

Microsoft has suspended developer accounts used to maintain multiple high-profile open-source projects without proper notification and no way to quickly rein...

BleepingComputer →

GBHackers CVE Microsoft Palo Alto Networks 3d ago

Palo Alto Cortex XSOAR Flaw in Microsoft Teams Integration Lets Attackers Access Data

Palo Alto Networks has released a high-priority security update to address a serious vulnerability in its Cortex XSOAR and Cortex XSIAM platforms. Tracked as...

1 IOC

GBHackers →

GBHackers General Microsoft 3d ago

Microsoft Confirms Windows 11 Update Breaks Start Menu Search

Microsoft recently addressed a disruptive server-side flaw that completely disabled Start Menu search functionality for some Windows 11 23H2 users. The tech ...

T1598

GBHackers →

CSO Online Campaigns Microsoft 3d ago

Questions raised about how LinkedIn uses the petabytes of data it collects

Through LinkedIn’s more than one billion business users, the Microsoft unit has access to a vast array of personally-identifiable information, including data...

CSO Online →

SC Media Campaigns Microsoft Apple 3d ago

Infostealers deployed via fraudulent TradingView Premium posts on Reddit

Inauthentic Reddit posts offering free access to the popular charting platform TradingView have been published using multiple aged and compromised accounts t...

SC Media →

Help Net Security Data Breach Microsoft GitHub 3d ago

BlueHammer: Windows zero-day exploit leaked

A buggy but functional proof-of-concept (PoC) exploit for an unpatched Windows local privilege escalation vulnerability dubbed BlueHammer has been published ...

T1548 T1068

Help Net Security →

CSO Online DDoS Microsoft Amazon 3d ago

Arelion employs NETSCOUT Arbor DDoS protection products

Arelion operates the world’s best-connected IP fiber backbone, providing high-capacity transit services to a variety of the globe’s leading ISPs as well as m...

CSO Online →

HackRead Ransomware Microsoft Amazon 3d ago

Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Flaw Disclosure

Microsoft researchers have uncovered a fast-moving group, Storm-1175, launching high-speed Medusa ransomware attacks against healthcare and education sectors...

HackRead →

Help Net Security Advisory Microsoft Apple 3d ago

Social engineering attacks on open source developers are escalating

North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microso...

T1204

Help Net Security →

GBHackers Phishing Microsoft 3d ago

EvilTokens Uses Stolen Microsoft 365 Tokens, AI to Supercharge BEC

EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that turns stolen Microsoft 365 tokens and AI into an end‑to‑end factory for Business Email Compro...

T1566 T1598

GBHackers →

HackRead General Microsoft Intel 3d ago

Russian Forest Blizzard Hackers Hijack Home Routers for Global Spying

Microsoft Threat Intelligence reveals how Russian hacking group Forest Blizzard uses home routers for DNS hijacking and spying.

HackRead →

« Prev 1 2 3 4 ... 13 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA