FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Manufacturing

20 articles

Zero Day Initiative CVE Feb 3

ZDI-26-058: AzeoTech DAQFactory Pro CTL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploi...

T1190 1 IOC

Zero Day Initiative →

Zero Day Initiative CVE Apple Intel Feb 3

ZDI-26-056: Apple macOS AppleIntelKBLGraphics Out-Of-Bounds Read Information Disclosure Vulnerability

This vulnerability allows local attackers to disclose sensitive information on affected installations of Apple macOS. An attacker must first obtain the abili...

1 IOC

Zero Day Initiative →

Infosecurity Magazine Supply Chain Feb 2

Notepad++ Update Hijacking Linked to Hosting Provider Compromise

A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure

T1195

Infosecurity Magazine →

WeLiveSecurity General Feb 2

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.

WeLiveSecurity →

Mandiant Blog TTPs Jan 30

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Introduction Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-...

T1566 T1041

Mandiant Blog →

Infosecurity Magazine General Jan 28

Researchers Uncover 454,000+ Malicious Open Source Packages

Sonatype warns that open source threats became industrialized with a surge in malicious packages in 2025

T1598

Infosecurity Magazine →

WeLiveSecurity TTPs Google Jan 28

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation

WeLiveSecurity →

Zero Day Initiative CVE Jan 28

ZDI-26-049: Delta Electronics DIAView Exposed Dangerous Method Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DIAView. User interaction is required to ...

T1190 1 IOC

Zero Day Initiative →

Infosecurity Magazine Phishing Jan 21

Phishing and Spoofed Sites Remain Primary Entry Points For Olympics

Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors

T1566

Infosecurity Magazine →

Recorded Future Supply Chain Jan 21

PurpleBravo’s Targeting of the IT Software Supply Chain

Discover how PurpleBravo, a North Korean threat group, exploits fake job offers to target software supply chains, using RATs and infostealers like BeaverTail.

T1195

Recorded Future →

Infosecurity Magazine General Jan 15

Global Agencies Release New Guidance to Secure Industrial Networks

CISA, NCSC and the FBI have released a new security guide to enhance protection for OT environments

Infosecurity Magazine →

Infosecurity Magazine Ransomware Jan 15

Hackers Increasingly Shun Encryption in Favour of Pure Data Theft and Extortion

While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data

T1041

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Jan 15

Cyber Threat Actors Ramp Up Attacks on Industrial Environments

Hacktivists and cybercriminals have intensified their efforts to exploit vulnerabilities in industrial systems, according to a Cyble report

Infosecurity Magazine →

Infosecurity Magazine Supply Chain Amazon Jan 15

CodeBuild Flaw Put AWS Console Supply Chain At Risk

A critical AWS CodeBuild misconfiguration has exposed core repositories to potential attack

Infosecurity Magazine →

Recorded Future Ransomware Jan 5

New ransomware tactics to watch out for in 2026

Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker ...

Recorded Future →

Trail of Bits General Dec 31

Detect Go’s silent arithmetic bugs with go-panikint

Go’s arithmetic operations on standard integer types are silent by default, meaning overflows “wrap around” without panicking. This behavior has hidden an en...

Trail of Bits →

Recorded Future TTPs Dec 11

Palestine Action: Operations and Global Network

Explores Palestine Action’s post-designation global network, tactics, and targets, and evaluates key physical risks and mitigations for organizations.

Recorded Future →

Recorded Future Supply Chain Dec 9

5 Real-Word Third-Party Risk Examples

Explore 5 third-party risk examples, from vendor data breaches to supply chain attacks and learn how third-party risk management can prevent cyberattacks.

T1195

Recorded Future →

Recorded Future General Nov 20

The Future of Humanoid Robotics

Humanoid robots are arriving faster than anyone expected. Discover the hidden risks, global power shifts, and breakthroughs shaping the future — before your ...

Recorded Future →

Google Security Blog General Google Aug 12

Android’s pKVM Becomes First Globally Certified Software to Achieve Prestigious SESIP Level 5 Security Certification

Posted by Dave Kleidermacher, VP Engineering, Android Security & Privacy Today marks a watershed moment and new benchmark for open-source security and the fu...

T1598

Google Security Blog →

« Prev 1 ... 6 7 8 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA