FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Vulnerability Disclosure

20 articles

SC Media Vulnerability Disclosure 19h ago

Fraudsters exploit vacant properties and postal services for identity theft

The tutorial, analyzed by Flare, outlines a low-cost, difficult-to-detect workflow that begins with identifying vacant residential properties, often found by...

SC Media →

The Record Vulnerability Disclosure 19h ago

CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers

A bug in a popular line of video conferencing software is being exploited by hackers, prompting the U.S.

The Record →

CSO Online Vulnerability Disclosure Cisco Intel 20h ago

Security lapse lets researchers view React2Shell hackers’ dashboard

An apparent security lapse has allowed researchers to peer into the work of a threat group currently exploiting unpatched servers open to the four-month-old ...

CSO Online →

CSO Online Vulnerability Disclosure 22h ago

Claude Code is still vulnerable to an attack Anthropic has already fixed

The leak of Claude Code’s source is already having consequences for the tool’s security. Researchers have spotted a vulnerability documented in the code.

CSO Online →

The Hacker News Vulnerability Disclosure Microsoft Linux 23h ago

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, accord...

T1190

The Hacker News →

SecurityWeek Vulnerability Disclosure Amazon 1d ago

Critical ShareFile Flaws Lead to Unauthenticated RCE

The vulnerabilities can be chained together to bypass authentication and upload arbitrary files to the server. The post Critical ShareFile Flaws Lead to Unau...

SecurityWeek →

SC Media Vulnerability Disclosure Apple 1d ago

Apple expands updates to iOS 18 devices affected by DarkSword exploit

Experts say Apple’s move shows it understood that older iOS and iPadOS devices were vulnerable and being exploited by DarkSword.

SC Media →

Wordfence Blog Vulnerability Disclosure WordPress 1d ago

200,000 WordPress Sites Affected by Arbitrary File Deletion Vulnerability in Perfmatters WordPress Plugin

On March 1st, 2026, we received a submission for an Arbitrary File Deletion vulnerability in Perfmatters, a WordPress plugin with more than 200,000 active in...

T1190

Wordfence Blog →

SC Media Vulnerability Disclosure 1d ago

Claude Code vulnerable to prompt injection due to subcommand limit

The vulnerability was discovered by Adversa, a security firm, after the leak of Claude Code's source code.

SC Media →

Schneier on Security Vulnerability Disclosure 1d ago

US Bans All Foreign-Made Consumer Routers

This is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduc...

Schneier on Security →

Wordfence Blog Vulnerability Disclosure Intel WordPress 1d ago

Wordfence Intelligence Weekly WordPress Vulnerability Report (March 23, 2026 to March 29, 2026)

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were that contributed to WordPres...

Wordfence Blog →

SecurityWeek Vulnerability Disclosure Apple 1d ago

Apple Rolls Out DarkSword Exploit Protection to More Devices

The DarkSword exploit kit has been used by both state-sponsored hackers and commercial spyware vendors. The post Apple Rolls Out DarkSword Exploit Protection...

T1588

SecurityWeek →

BleepingComputer Vulnerability Disclosure 2d ago

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abu...

BleepingComputer →

BleepingComputer Vulnerability Disclosure Amazon 2d ago

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from...

T1041

BleepingComputer →

Infosecurity Magazine Vulnerability Disclosure Apple 2d ago

Apple Expands iOS 18 Security Updates Amid DarkSword Threat

iOS/iPadOS 18.7.

T1588

Infosecurity Magazine →

SecurityWeek Vulnerability Disclosure Cisco 2d ago

Cisco Patches Critical and High-Severity Vulnerabilities

The bugs could lead to authentication bypass, remote code execution, information disclosure, and privilege escalation. The post Cisco Patches Critical and Hi...

T1190 T1548 T1556

SecurityWeek →

Help Net Security Vulnerability Disclosure Apple 2d ago

DarkSword exploit forces Apple to loosen its patching policy

Apple has extended security updates to a wider range of devices still running iOS 18, aiming to protect users from the DarkSword exploit kit. This is not the...

T1588

Help Net Security →

GBHackers Vulnerability Disclosure Apple 2d ago

Apple Releases iOS 18.7.7 Update to Defend Against DarkSword Exploit

Apple has officially expanded the rollout of iOS 18.7.

GBHackers →

BleepingComputer Vulnerability Disclosure F5 2d ago

Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks

Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote ...

T1190

BleepingComputer →

The Hacker News Vulnerability Disclosure Apple 2d ago

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

Apple on Wednesday expanded the availability of iOS 18.7.

T1588

The Hacker News →

1 2 3 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA