FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Malware

20 articles

Infosecurity Magazine Malware 4d ago

Phantom Project Bundles Infostealer, Crypter and RAT For Sale

Phantom Stealer .

Infosecurity Magazine →

BleepingComputer Malware Microsoft Apple Oracle Linux 4d ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windo...

BleepingComputer →

HackRead Malware Apple 4d ago

Hackers Poison Axios npm Package with 100 Million Weekly Downloads

Axios npm Package compromised in a supply chain attack, exposing developers to malware, data theft, and full system takeover risks worldwide.

T1041 T1195

HackRead →

SC Media Malware Apple 4d ago

Axios npm supply chain attack: Malicious updates add remote access trojan

The axios npm package, with about 100 million weekly downloads, was compromised via a maintainer’s account.

T1195

SC Media →

GBHackers Malware Apple 4d ago

Axios NPM Packages Breached in Ongoing Supply Chain Attack

A severe supply chain attack has compromised the widely used Axios HTTP client on the npm registry. Attackers injected a malicious dependency into specific A...

T1195

GBHackers →

GBHackers Malware Microsoft 4d ago

DeepLoad Malware Uses ClickFix and AI Evasion to Hit Enterprise Networks

New “DeepLoad” malware is turning a single user click into fileless, credential‑stealing persistence inside enterprise networks, leveraging the ClickFix tech...

T1204 T1027

GBHackers →

GBHackers Malware 4d ago

RoadK1ll Malware Turns Hacked Devices Into Network Relays

Hackers are deploying a new Node. js-based implant dubbed RoadK1ll to quietly turn compromised hosts into on-demand network relays, enabling stealthy pivotin...

GBHackers →

GBHackers Malware 4d ago

GhostSocks Hijacks Devices as Proxy Network for Stealthy Cyberattacks

A newly emerging malware known as GhostSocks is quietly reshaping how attackers evade detection by converting compromised systems into residential proxy node...

GBHackers →

Help Net Security Malware Google 4d ago

Cybersecurity jobs available right now: March 31, 2026

Android Malware Research Director Alice | Israel | On-site – View job details As an Android Malware Research Director, you will establish operational process...

Help Net Security →

SC Media Malware Apple 5d ago

Apple: Spyware compromise prevented by Lockdown Mode

TechCrunch reports that Apple has touted that all of its devices with the Lockdown Mode activated have not been impacted by spyware intrusions.

SC Media →

SC Media Malware Microsoft 5d ago

Clandestine BlankGrabber malware examined

Windows systems have been more stealthily compromised by the BlankGrabber malware through the exploitation of a counterfeit certificate holder for multi-stag...

SC Media →

GBHackers Malware Microsoft 5d ago

Russian Hackers Deploy “CTRL” for RDP Hijacking

Russian hackers are using a new remote access toolkit called “CTRL” to silently hijack Remote Desktop Protocol (RDP) sessions via FRP-based reverse tunnels, ...

T1078

GBHackers →

SecurityWeek Malware 5d ago

Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained in Warfare

Iran-linked hacking groups are turning to high-volume, low-impact cyberattacks The post Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fig...

SecurityWeek →

Schneier on Security Malware Apple 5d ago

Apple’s Camera Indicator Lights

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptit...

T1598

Schneier on Security →

Information Security Buzz Malware 5d ago

LiteLLM supply chain attack exposes millions to credential theft

Researchers at Endor Labs, have discovered a supply chain attack on the popular Python package LiteLLM on PyPI, with malicious code injected into versions 1.82.

T1078 T1195

Information Security Buzz →

GBHackers Malware 5d ago

VoidLink Proves AI-Assisted Malware Is No Longer Experimental

VoidLink shows that AI-assisted malware is now a mature, operational tool rather than a lab experiment, compressing what once required a full team into days ...

GBHackers →

Check Point Research Malware 6d ago

AI Threat Landscape Digest January-February 2026

KEY FINDINGS AI-assisted malware development has reached operational maturity.VoidLink framework, which is modular, professionally engineered, and fully func...

Check Point Research →

BleepingComputer Malware Apple Mar 28

New Infinity Stealer malware grabs macOS data via ClickFix lures

A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka co...

BleepingComputer →

SecurityWeek Malware Cloudflare Mar 28

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

The infection chain includes a fake CAPTCHA page, a Bash script, a Nuitka loader, and the Python-based infostealer. The post Cloudflare-Themed ClickFix Attac...

SecurityWeek →

GBHackers Malware Microsoft Mar 28

Fake Certificate Loader Hides BlankGrabber Malware Chain

BlankGrabber’s operators are now abusing a fake “certificate” loader to hide a multi‑stage Rust and Python infection chain, making this commodity stealer sig...

T1041

GBHackers →

« Prev 1 2 3 4 5 ... 7 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA