Skip to main content
FreeIntelHub
Feed Threat Feed Search Trending
Intelligence CVE Priority Vulnerability IOC Lookup IOC Feed YARA Rules Phishing Lookup Exploit Lookup Pastes Dark Web
Adversaries Threat Groups Software Campaigns
Explore Dashboard Geo Map Heatmap MITRE ATT&CK
Browse Sources Vendors Categories Sectors
RSS API
FreeIntelHub
/
Sign In

Technology

16 articles

BleepingComputer Zero-Day Microsoft Trend Micro 2d ago

Trend Micro warns of Apex One zero-day exploited in the wild

Japanese cybersecurity software company Trend Micro has addressed an Apex One zero-day vulnerability exploited in attacks targeting Windows systems. [.

BleepingComputer →

The Hacker News Ransomware Microsoft 4d ago

Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company's Artifact Signing system to deliver mali...

The Hacker News →

BleepingComputer Ransomware Microsoft 5d ago

Cybercrime service disrupted for abusing Microsoft platform to sign malware

Microsoft says it has disrupted a malware-signing-as-a-service (MSaaS) operation that abused the company's Artifact Signing service to generate fraudulent co...

BleepingComputer →

GBHackers General Intel 5d ago

What to Look for When Choosing an ASPM Platform 

Application security posture management (ASPM) has become a foundational capability for software-as-a-service (SaaS) and software companies building increasi...

T1598

GBHackers →

Cyberscoop Data Breach 6d ago

The Canvas breach proved that prevention is no longer enough

Cybercriminals brought down the most widely used learning platform in North America. The Canvas breach is a blueprint for how SaaS attacks now work — and a w...

Cyberscoop →

Help Net Security General Microsoft Cisco May 17

Week in review: Cisco patches SD-WAN 0-day, unpatched Microsoft Exchange Server flaw exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: Foundations of Cybersecurity, 2nd edition Jason And...

Help Net Security →

CSO Online Zero-Day Microsoft May 15

Exchange Server zero-day vulnerability can be triggered by opening a malicious email

A newly discovered zero-day vulnerability in Microsoft Exchange Server has experts declaring an emergency and urging CSOs to think about the need to abandon ...

T1598

CSO Online →

SecurityWeek General May 14

Enhancing Data Center Security Without Sacrificing Performance

For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. T...

SecurityWeek →

SecurityWeek General May 7

Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking

Mitiga researchers say attackers can silently redirect Claude Code MCP traffic, intercept OAuth tokens, and maintain persistent access to connected SaaS plat...

SecurityWeek →

Recorded Future Ransomware May 6

Threat Activity Enablers: The Backbone of Today’s Threat Landscape

Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center.

Recorded Future →

Palo Alto Networks Phishing Palo Alto Networks May 5

The Dangerous Momentum of Autodownload Phishing

Learn how attackers weaponize SaaS auto-download links and rotating phishing lures to deliver RMM malware. See how Cortex Email Security stops this forced-mo...

T1566

Palo Alto Networks →

The Hacker News General May 1

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the confines of Saa...

T1041

The Hacker News →

Proofpoint Blog General Apr 28

AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants

Proofpoint Blog →

Zero Day Initiative CVE Mar 16

ZDI-26-212: Schneider Electric EcoStruxure Data Center Expert Hard-coded Password Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric EcoStruxure Data Center Expert. Authenti...

T1190 1 IOC

Zero Day Initiative →

Palo Alto Networks General Palo Alto Networks Mar 2

Why Service Providers Must Become Secure AI Factories

Discover AI factories – the next evolution in data centers powering AI models. Understand their role, challenges and deployment best practices for 2026.

T1598

Palo Alto Networks →

Mandiant Blog Advisory Salesforce Sep 30

Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations

Written by: Omar ElAhdan, Matthew McWhirt, Michael Rudden, Aswad Robinson, Bhavesh Dhake, Laith Al, Ravi Kumar Raja Update (Nov. 21): In response to the Sale...

Mandiant Blog →

FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA