FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Microsoft

20 articles

Microsoft Security Blog General Microsoft Linux Apr 2

Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments

Cookie-gated PHP webshells use obfuscation, php-fpm execution, and cron-based persistence to evade detection in Linux hosting environments. This post examine...

T1190 T1027

Microsoft Security Blog →

HackRead Malware Microsoft SAP Apr 2

Microsoft Warns of WhatsApp Attachments Spreading Backdoor on Windows PCs

Microsoft warns of a WhatsApp attachments spreading VBS malware that installs backdoors on Windows PCs, giving hackers remote access and control systems.

HackRead →

GBHackers Ransomware Microsoft Apr 2

Akira-Style Ransomware Campaign Hits Windows Users Across South America

A newly identified ransomware campaign is targeting Windows users across South America, leveraging tactics that closely mimic the notorious Akira ransomware ...

GBHackers →

CSO Online Campaigns Microsoft Apr 2

EvilTokens abuses Microsoft device code flow for account takeovers

A new phishing-as-a-service (PhaaS) campaign is abusing Microsoft’s device code authentication flow to gain unauthorized access to user accounts. Sekoia rese...

T1566 T1204

CSO Online →

BleepingComputer General Microsoft Apr 2

Microsoft links Classic Outlook issue to email delivery problems

Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com.

1 IOC

BleepingComputer →

GBHackers Data Breach Microsoft Apple SAP Apr 2

Axios npm Supply Chain Breach: Microsoft Shares Mitigation Steps

Microsoft has detailed how organizations can detect and mitigate a recent supply chain compromise involving malicious Axios npm releases and infrastructure a...

T1195

GBHackers →

GBHackers Campaigns Microsoft SAP Apr 2

WhatsApp Attack Chain Delivers VBS, Cloud Payloads, MSI Backdoor

A new malware campaign that abuses WhatsApp messages to deliver malicious Visual Basic Script (VBS) files to Windows users, enabling persistent remote access...

GBHackers →

GBHackers Phishing Microsoft Apr 2

Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools

Remcos RAT operators are abusing obfuscated scripts and trusted Windows binaries to deliver a stealthy, largely fileless infection chain that runs almost ent...

T1566

GBHackers →

GBHackers CVE Microsoft Broadcom Apr 2

Symantec DLP Agent Flaw Exposed Systems to Privilege Escalation Attacks

A high-severity vulnerability in the Symantec Data Loss Prevention (DLP) Agent for Windows could allow low-privileged attackers to take complete control of a...

T1548 T1068 1 IOC

GBHackers →

Zero Day Initiative CVE Microsoft Apr 2

ZDI-26-253: Microsoft Visual Studio Code mcp.json Command Injection Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Visual Studio Code. User interaction is required ...

T1190 T1059 1 IOC

Zero Day Initiative →

Help Net Security General Microsoft Apr 2

Microsoft adds high-volume email sending to Exchange Online

Organizations that rely on Exchange Online for internal communications have long needed a way to send large volumes of automated messages, such as payroll no...

Help Net Security →

Microsoft Security Blog TTPs Microsoft Apple Oracle Intel SAP Apr 1

Mitigating the Axios npm supply chain compromise

On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages for version updates (1.14.

T1071 T1195

Microsoft Security Blog →

SC Media Campaigns Microsoft Amazon SAP Apr 1

Campaign combines WhatsApp with legit cloud platforms to deliver malicious VBS files

Attackers continue to evade defenders by using legitimate platforms like AWS and Microsoft utilities.

SC Media →

BleepingComputer Phishing Microsoft Apr 1

New EvilTokens service fuels Microsoft device code phishing attacks

A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced feat...

T1566 T1598

BleepingComputer →

SC Media Campaigns Microsoft Apr 1

Widespread Microsoft 365 account compromise sought by Iran-linked hackers

Widespread Microsoft 365 account compromise sought by Iran-linked hackers More than 300 organizations in Israel, over 25 others in the United Arab Emirates, ...

T1110

SC Media →

Help Net Security General Microsoft Google Apr 1

Exabeam expands ABA to detect AI agent threats across ChatGPT, Copilot, and Gemini

Exabeam has announced the expansion of Exabeam Agent Behavior Analytics (ABA). Without direct visibility into how employees use AI assistants, what they quer...

Help Net Security →

Help Net Security General Microsoft Oracle Apache Apr 1

CIS Benchmarks March 2026 Update

The following CIS Benchmarks and CIS Build Kits have been updated or recently released. The Center for Internet Security has highlighted the major updates be...

Help Net Security →

GBHackers Zero-Day Microsoft Google Linux Apr 1

Google Warns of New Chrome Zero-Day Under Active Exploitation – Users Urged to Update Immediately

Google has released an urgent security update for its Chrome desktop browser to address 21 vulnerabilities, including a critical zero-day flaw that is active...

GBHackers →

The Hacker News Campaigns Microsoft Trend Micro Apr 1

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans lik...

T1566

The Hacker News →

GBHackers General Microsoft Apr 1

Microsoft Teams to Improve Privacy With EXIF Data Removal Feature

Microsoft is rolling out a wave of privacy and security updates for Microsoft Teams, headlining with a critical new feature that automatically removes EXIF m...

GBHackers →

« Prev 1 ... 4 5 6 7 8 ... 13 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA