FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Government

20 articles

SC Media General Citrix 3d ago

Citrix NetScaler ADC bug added to CISA list of known exploits

Security agency gives federal agencies until April 2, 2026, to make the patch.

SC Media →

SC Media Malware 3d ago

RoadK1ll malware enables stealthy network pivoting

RoadK1ll functions as a lightweight reverse tunneling implant, designed to blend into normal network traffic and transform an infected machine into a relay p...

SC Media →

The Hacker News Zero-Day 4d ago

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting...

1 IOC

The Hacker News →

Check Point Research Zero-Day Check Point 4d ago

Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

Key Points Introduction At the beginning of 2026, Check Point Research observed a series of targeted attacks against government entities in Southeast Asia ca...

1 IOC

Check Point Research →

The Record General Citrix 4d ago

CISA tells federal agencies to patch Citrix NetScaler bug by Thursday

The bug enables threat actors to send requests that disclose sensitive information and carries a severity score of 9.3 out of 10, indicating a critical risk.

The Record →

Rapid7 Blog Ransomware Rapid7 4d ago

Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing

Initial Access Brokers (IABs) are a key component of the cybercrime ecosystem, offering hassle-free building blocks for ransomware, data theft, and extortion...

T1041

Rapid7 Blog →

BleepingComputer Vulnerability Disclosure Citrix 4d ago

CISA orders feds to patch actively exploited Citrix flaw by Thursday

The U.S.

BleepingComputer →

GBHackers Malware 4d ago

RoadK1ll Malware Turns Hacked Devices Into Network Relays

Hackers are deploying a new Node. js-based implant dubbed RoadK1ll to quietly turn compromised hosts into on-demand network relays, enabling stealthy pivotin...

GBHackers →

Help Net Security General 4d ago

Hottest cybersecurity open-source tools of the month: March 2026

Presented here is a curated selection of noteworthy open-source cybersecurity solutions that have drawn recognition for their ability to enhance security pos...

Help Net Security →

The Record Campaigns 4d ago

Pro-Russian hackers pose as Ukraine's cyber agency to target government, businesses

A pro-Russian hacker group impersonated Ukraine’s national cyber incident response team in a phishing campaign targeting government agencies, businesses, and...

T1566

The Record →

Security Affairs Campaigns 4d ago

China-Linked groups target Southeast Asian government with advanced malware in 2025

China-linked groups hit a Southeast Asian government in 2025, deploying multiple malware families in a sophisticated cyber campaign. In 2025, three China-lin...

Security Affairs →

CISA Advisories CVE Citrix 5d ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-3055 Citrix Net...

1 IOC

CISA Advisories →

GBHackers CVE Fortinet Intel 5d ago

Critical Fortinet FortiClient EMS Vulnerability Actively Exploited in Attacks

Threat intelligence researchers have detected active exploitation of a critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS). T...

1 IOC

GBHackers →

The Hacker News Campaigns 5d ago

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a "complex ...

The Hacker News →

Help Net Security Data Breach 5d ago

Don’t count on government guidance after a smart home breach

People are filling their homes with internet-connected cameras, speakers, locks, and routers. When one of those devices is compromised, the next steps are of...

Help Net Security →

Security Affairs TTPs Google Docker 6d ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 90

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape New Malware Targets Use...

T1195

Security Affairs →

Help Net Security General 6d ago

Week in review: NIST updates DNS security guidance, compromised LiteLLM PyPI packages

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST updates its DNS security guidance for the first time i...

Help Net Security →

The Hacker News Data Breach Mar 28

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S.

T1529

The Hacker News →

Security Affairs General Mar 28

Iran-linked group Handala hacked FBI Director Kash Patel’s personal email account

Iran-linked group Handala claims it hacked FBI Director Kash Patel’s personal email, leaking files. The FBI says no government data was exposed.

Security Affairs →

The Record General Mar 27

European Parliament rejects extension of CSAM scanning rules for tech platforms

The 311 members of Parliament who voted against an extension did so despite strong support from law enforcement, children’s rights groups, German Chancellor ...

The Record →

« Prev 1 2 3 4 5 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA