FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Manufacturing

20 articles

SecurityWeek Supply Chain 2d ago

Mercor Hit by LiteLLM Supply Chain Attack

The AI recruiting firm is investigating the incident as Lapsus$ claimed the theft of 4TB of Mercor data. The post Mercor Hit by LiteLLM Supply Chain Attack a...

T1195

SecurityWeek →

GBHackers Data Breach Microsoft Apple SAP 2d ago

Axios npm Supply Chain Breach: Microsoft Shares Mitigation Steps

Microsoft has detailed how organizations can detect and mitigate a recent supply chain compromise involving malicious Axios npm releases and infrastructure a...

T1195

GBHackers →

Elastic Security Labs Supply Chain Apple 2d ago

How we caught the Axios supply chain attack

Joe Desimone shares the story of how he caught the Axios supply chain attack with a proof of concept tool built in an afternoon.

T1195

Elastic Security Labs →

Microsoft Security Blog TTPs Microsoft Apple Oracle Intel SAP 2d ago

Mitigating the Axios npm supply chain compromise

On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages for version updates (1.14.

T1071 T1195

Microsoft Security Blog →

Security Affairs Zero-Day Google 2d ago

Google fixes fourth actively exploited Chrome zero-day of 2026

Google fixed a new Chrome zero-day, tracked as CVE-2026-5281, in the WebGPU Dawn component that is already exploited in the wild. Google released Chrome upda...

1 IOC

Security Affairs →

CSO Online TTPs 2d ago

5 essential steps to bulletproof your endpoint security (and avoid the biggest mistakes)

Business resilience starts at the endpoint. Between March and December 2025, the N-able SOC processed over 900,000 alerts—and a staggering 18% originated fro...

CSO Online →

The Record Supply Chain 2d ago

Mercor confirms security incident tied to LiteLLM supply chain attack

Although the LiteLLM attack was reportedly tied to a group called TeamPCP, the hacking gang Lapsus$ claimed on its website that it obtained hundreds of gigab...

T1195

The Record →

Unit 42 Supply Chain Apple 2d ago

Threat Brief: Widespread Impact of the Axios Supply Chain Attack

Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup.

T1195

Unit 42 →

SC Media Campaigns 3d ago

Report sheds more light on Phantom Stealer

Attacks involving the .NET-based Phantom Stealer, which has been bundled with a crypter and a remote access tool under the Phantom Project cybercrime kit, ha...

T1566

SC Media →

SC Media Vulnerability Disclosure Cisco 3d ago

Trivy supply chain intrusion reportedly compromises Cisco source code

Cisco was reported to have had its source code stolen by threat actors following an attack linked to the recent supply chain attack against Aqua Security's T...

T1195

SC Media →

SC Media Campaigns Apple Amazon 3d ago

AWS environments targeted by TeamPCP

Threat operation TeamPCP, also known as PCPcat, DeadCatx3, and ShellForce, has tapped credentials siphoned from its sweeping supply chain attacks against Tri...

T1041 T1195

SC Media →

SC Media Campaigns Google Apple Intel 3d ago

North Korean hackers blamed for axios supply chain hack

North Korean threat operation UNC1069 was noted by the Google Threat Intelligence Group to have perpetrated the npm supply chain attack against the widely us...

T1195

SC Media →

SC Media Supply Chain 3d ago

AI startup Mercor confirms security incident linked to LiteLLM supply chain attack

The incident at Mercor is believed to stem from malicious code injected into the LiteLLM project, an open-source tool used by numerous companies to manage AI...

T1195

SC Media →

Help Net Security General Microsoft Google 3d ago

Exabeam expands ABA to detect AI agent threats across ChatGPT, Copilot, and Gemini

Exabeam has announced the expansion of Exabeam Agent Behavior Analytics (ABA). Without direct visibility into how employees use AI assistants, what they quer...

Help Net Security →

SANS ISC Ransomware Apple Intel 3d ago

TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)

This is the fifth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026).

T1598

SANS ISC →

GBHackers Data Breach Amazon Cisco Salesforce 3d ago

Cisco Faces Alleged Data Leak as ShinyHunters Claims Responsibility

Cisco is actively dealing with a major cybersecurity incident after threat actors breached its internal development networks. The notorious hacking group Shi...

T1195

GBHackers →

Trail of Bits Vulnerability Disclosure 3d ago

Mutation testing for the agentic era

Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measu...

Trail of Bits →

Security Affairs Supply Chain Apple SentinelOne 3d ago

SentinelOne autonomous detection blocks trojaned LiteLLM triggered by Claude Code

SentinelOne AI stopped a LiteLLM supply chain attack in seconds, blocking malicious code automatically without human intervention. SentinelOne’s AI-based sec...

T1195

Security Affairs →

SecurityWeek Supply Chain Apple GitHub 3d ago

Axios NPM Package Breached in North Korean Supply Chain Attack

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions. The post Axios...

T1195

SecurityWeek →

GBHackers Data Breach Microsoft Apple Linux 3d ago

North Korean Hackers Breach Axios Package, Target Windows, macOS, and Linux Systems

A North Korea–nexus threat actor has hijacked the popular Axios NPM package in a high‑impact software supply chain attack that can silently backdoor Windows,...

T1195

GBHackers →

« Prev 1 2 3 4 ... 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA