FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Manufacturing

20 articles

CISA Advisories CVE Mar 26

WAGO GmbH & Co. KG Industrial Managed Switches

View CSAF Summary An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full comp...

1 IOC

CISA Advisories →

Information Security Buzz General Mar 26

Expert panel: Cyber conflict in a fractured world

No longer are geopolitical standoffs settled on the traditional battlefields of diplomacy and arms; now, the digital realm has emerged as the arena for these...

Information Security Buzz →

GBHackers CVE Microsoft Mar 26

Microsoft Unveils New Guidance to Detect and Defend Against Trivy Supply Chain Attack

Aqua Security’s vulnerability scanner, Trivy, suffered a sophisticated CI/CD supply chain compromise. The threat actor, identified as TeamPCP, leveraged prio...

T1195 1 IOC

GBHackers →

SC Media Campaigns Mar 25

Widespread cloud environment compromise facilitated by Trivy supply chain hack

More than 1,000 software-as-a-service environments were reported by Mandiant Consulting Chief Technology Officer Charles Carmakal to have already been compro...

SC Media →

SC Media Supply Chain Mar 25

FCC bans foreign-made routers in bid to secure supply chain

Security pros OK with FCC’s move to ban foreign routers, but say the real risk lies with unmanaged identities.

SC Media →

The Record Supply Chain Mar 25

Supply chain attack hits widely-used AI package, risks impacting thousands of companies

The incident highlights growing concerns over the security of the open-source software supply chain, where widely-used tools maintained by small teams can pr...

T1195

The Record →

Infosecurity Magazine Vulnerability Disclosure SentinelOne Mar 25

Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne

Cybersecurity company’s annual report issues warning over a “mass-marketed impersonation crisis” over attackers abusing legitimate credentials

Infosecurity Magazine →

HackRead General Mar 25

Best Klaviyo Alternatives for Revenue Growth and Advanced Analytics

Top Klaviyo alternatives offer advanced analytics, automation, and insights to help e-commerce brands improve campaigns, boost revenue, and track performance.

HackRead →

SecurityWeek Supply Chain Mar 25

AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link

PwC finds AI is amplifying speed and scale of attacks, as identity theft evolves into a cybercriminal supply chain. The post AI Speeds Attacks, But Identity ...

SecurityWeek →

BleepingComputer Supply Chain Mar 25

Paid AI Accounts Are Now a Hot Underground Commodity

AI accounts are becoming part of the cybercrime supply chain, sold like email accounts or VPS access. Flare Systems shows how underground markets bundle and ...

T1598

BleepingComputer →

Help Net Security General Mar 25

Vorlon adds forensics and response to secure AI agents

Vorlon has unveiled AI Agent Flight Recorder and AI Agent Action Center, adding forensics and coordinated response to secure enterprise agentic ecosystems an...

T1598

Help Net Security →

GBHackers CVE Docker Mar 25

GoHarbor Issues Urgent Patch for Harbor Flaw Allowing Full Registry Compromise

A critical security flaw in GoHarbor’s Harbor container registry exposes organizations to severe supply chain attacks. Tracked as CVE-2026-4404, this vulnera...

T1195 T1598 1 IOC

GBHackers →

CSO Online Data Breach Google Cisco Mar 25

Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave

What started as a supply chain attack on Trivy, a widely used security scanner, has become a Lapsus$-linked extortion campaign, with more than 1,000 enterpri...

T1195 T1598

CSO Online →

Infosecurity Magazine Campaigns Mar 25

TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise

Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group

Infosecurity Magazine →

SC Media Supply Chain Mar 25

2026 SC Award winner Black Duck — Best Supply Chain Security Solution

Black Duck earns honor for delivering visibility at scale.

SC Media →

SC Media Insider Threat Mar 25

2026 SC Award winner Securonix UEBA – Best Insider Threat Solution

AI-driven UEBA platform detects insider threats using behavioral analytics and automation.

SC Media →

Help Net Security Supply Chain Mar 25

LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks

A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose t...

T1195

Help Net Security →

GBHackers Vulnerability Disclosure Adobe Mar 25

Hackers Exploiting Magento Flaw to Execute Remote Code and Seize Full Account Access

A critical vulnerability dubbed “PolyShell” is actively being exploited across Magento and Adobe Commerce platforms. Discovered by the Sansec Forensics Team ...

T1598

GBHackers →

GBHackers Vulnerability Disclosure Mar 25

ClawHub Vulnerability Lets Attackers Manipulate Rankings to Become Top Skill

Silverfort researchers recently uncovered a critical security flaw in ClawHub, the main public registry for the OpenClaw agent ecosystem. This vulnerability ...

T1598

GBHackers →

Security Affairs Data Breach Kubernetes Mar 25

Malicious LiteLLM versions linked to TeamPCP supply chain attack

TeamPCP backdoored LiteLLM v1.82.

T1195

Security Affairs →

« Prev 1 ... 3 4 5 6 7 ... 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA