FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Defense

20 articles

GBHackers Malware Microsoft 4d ago

DeepLoad Malware Uses ClickFix and AI Evasion to Hit Enterprise Networks

New “DeepLoad” malware is turning a single user click into fileless, credential‑stealing persistence inside enterprise networks, leveraging the ClickFix tech...

T1204 T1027

GBHackers →

GBHackers General 5d ago

India Set to Ban Hikvision, TP-Link Devices in April

Starting April 1, 2026, the Indian government will officially enforce a nationwide ban on the sale of internet-connected CCTV cameras from major Chinese manu...

GBHackers →

GBHackers Data Breach Apple 5d ago

TA446 Uses DarkSword Exploit Kit to Target iPhone Users

TA446, a Russia-linked espionage group, has started using the DarkSword exploit kit to compromise iOS devices in a new phishing wave that abuses Atlantic Cou...

T1566 T1588

GBHackers →

Help Net Security General 5d ago

Why risk alone doesn’t get you to yes

I have been in security rooms for years, from military operations centers to corporate boardrooms. In all those years I can tell you that the hardest mission...

Help Net Security →

Microsoft Security Blog TTPs Microsoft Apple Mar 27

How Microsoft Defender protects high-value assets in real-world attack scenarios

High-value assets including domain controllers, web servers, and identity infrastructure are frequent targets in sophisticated attacks. Microsoft Defender ap...

Microsoft Security Blog →

SC Media General Mar 27

Doppel's Bobby Ford on why legacy controls are failing

Doppel's Bobby Ford explains how AI-powered impersonation and deepfake-enabled campaigns are exposing critical gaps in legacy defenses.

SC Media →

GBHackers TTPs Mar 27

Hackers Deploy USB Malware, RATs, and Stealers in Southeast Asian Government Attacks

A multi-cluster cyberespionage operation in which attackers used USB-propagated malware, multiple RATs, loaders, and a custom stealer to target a Southeast A...

T1021

GBHackers →

Security Affairs Campaigns Rapid7 Mar 27

China-linked Red Menshen APT deploys stealthy BPFDoor implants in telecom networks

China-linked Red Menshen APT group used stealthy BPFDoor implants in telecom networks to spy on government targets. Rapid7 Labs uncovered a China-linked thre...

Security Affairs →

GBHackers Campaigns Rapid7 Linux Mar 27

Hackers Implant Stealthy BPFdoor Backdoors in Telecom Networks for Persistent Access

A China-nexus threat actor known as Red Menshen is planting stealthy backdoors deep inside global telecommunications networks. According to a recent investig...

GBHackers →

Unit 42 General Mar 26

Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government

Unit 42 uncovers multiple clusters of cyberespionage targeting a Southeast Asian government organization with USBFect, RATs and loaders. The post Converging ...

Unit 42 →

The Hacker News Campaigns Mar 26

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government net...

The Hacker News →

Cyberscoop General Mar 26

Former NSA chiefs worry American offensive edge in cybersecurity is slipping

A systemic numbness to cyberattacks has exposed the U.S.

Cyberscoop →

BleepingComputer Vulnerability Disclosure Apple Mar 26

Coruna iOS exploit framework linked to Triangulation attacks

The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via zero-click...

T1588

BleepingComputer →

SecurityWeek Campaigns Linux Mar 26

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

The state-sponsored threat actor deployed kernel implants and passive backdoors enabling long-term, high-level espionage. The post Chinese Hackers Caught Dee...

SecurityWeek →

Rapid7 Blog Campaigns Rapid7 Mar 26

BPFdoor in Telecom Networks: Sleeper Cells in the backbone

Executive overview The strategic positioning of covert access within the world’s telecommunication networks A months-long investigation by Rapid7 Labs has un...

Rapid7 Blog →

The Hacker News General Intel Mar 26

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in.

The Hacker News →

Help Net Security Malware Mar 26

A nearly undetectable LLM attack needs only a handful of poisoned samples

Prompt engineering has become a standard part of how large language models are deployed in production, and it introduces an attack surface most organizations...

T1598

Help Net Security →

Help Net Security Supply Chain Mar 26

Your facilities run on fragile supply chains and nobody wants to admit it

In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building...

Help Net Security →

SC Media Vulnerability Disclosure Mar 26

Quantro Security's Mehul Revankar on AI agents for vulnerability management

Mehul Revankar discusses Quantro Security, Inc., and its approach to AI-aided defense.

SC Media →

Cisco Advisories Vulnerability Disclosure Apple Cisco Mar 25

Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerability

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security ...

T1498

Cisco Advisories →

« Prev 1 2 3 4 ... 6 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA