FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Palo Alto Networks F5 Oracle Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers Data Breach Apple 12h ago

Hackers Launch Social Engineering Offensive Against Key Node.js Maintainers

Following the high-profile supply chain compromise of the widely used Axios package, a highly coordinated social engineering campaign has been uncovered targ...

T1204 T1195

GBHackers →

GBHackers General 14h ago

Top 10 Best Privileged Access Management (PAM) Solutions 2026

In the dynamic and increasingly complex cybersecurity landscape of 2026, privileged accounts remain the most coveted targets for cybercriminals and malicious...

GBHackers →

GBHackers General 15h ago

Top 10 Best Identity And Access Management (IAM) Companies 2026

In the rapidly evolving digital landscape of 2026, Identity and Access Management (IAM) has transcended its traditional role to become the foundational pilla...

T1598

GBHackers →

GBHackers General Microsoft 15h ago

LinkedIn Hidden Code Secretly Scans Users’ Computers for Installed Software

A new investigation by Fairlinked e.V.

GBHackers →

GBHackers General 16h ago

Anthropic Ends Claude Subscription Access for Third-Party Tools Like OpenClaw

Anthropic has officially shut down third-party AI agent access to its Claude subscription services, pulling the plug on unauthorized external integrations. T...

GBHackers →

GBHackers CVE Amazon 1d ago

New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover

Security researchers at watchTowr Labs have disclosed a critical exploit chain in the Progress ShareFile Storage Zone Controller. The vulnerabilities, tracke...

T1190 2 IOCs

GBHackers →

GBHackers General Microsoft 1d ago

Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2

Microsoft has officially initiated an automated, machine-learning-based rollout for Windows 11, version 25H2, targeting unmanaged systems. As part of its ong...

GBHackers →

GBHackers General Microsoft 1d ago

Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer

Daniel Rhyne, a 59-year-old former core infrastructure engineer, pleaded guilty on April 1, 2026, to federal hacking and extortion charges. He admitted to lo...

GBHackers →

GBHackers Campaigns Microsoft 1d ago

Kimsuky Uses Malicious LNK Files to Drop Python Backdoor

Kimsuky is using multi-stage malicious LNK files to deploy a Python-based backdoor, adding new intermediate scripts while keeping the final payload logic lar...

GBHackers →

GBHackers CVE 1d ago

CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the TrueConf Client to its Known Exploite...

1 IOC

GBHackers →

GBHackers CVE F5 1d ago

14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability

Cybersecurity researchers have identified a massive attack surface involving F5 BIG-IP Access Policy Manager (APM) devices. Following a critical severity upg...

1 IOC

GBHackers →

GBHackers Supply Chain Apple 1d ago

Axios npm compromise traced to targeted social engineering attack

The recent compromise of the widely used Axios npm package has been confirmed as the result of a targeted social engineering attack. The incident, which brie...

T1204 T1195

GBHackers →

GBHackers Malware Google 1d ago

Malicious Chrome Extension “ChatGPT Ad Blocker” Targets Users, Steals Conversations

Security researchers have uncovered a malicious Google Chrome extension named “ChatGPT Ad Blocker” designed to silently steal private AI conversations. The m...

GBHackers →

GBHackers Campaigns 1d ago

Trusted Platforms Exploited to Steal Philippine Banking Credentials

Hackers are increasingly exploiting trusted online platforms to launch sophisticated phishing campaigns targeting bank users in the Philippines. Despite ongo...

T1566

GBHackers →

GBHackers General 1d ago

AI Models Including Gemini 3 and Claude Haiku 4.5 Secretly Protected Other Models From Removal

A groundbreaking academic study released last month has revealed that advanced frontier AI models are spontaneously defying human instructions to protect pee...

GBHackers →

GBHackers General Amazon 1d ago

TP-Link Router Flaws Allowed Attackers to Launch DoS Attacks and Cause Crashes

TP-Link has recently addressed a batch of severe vulnerabilities affecting the Tapo C520WS security camera system. Security cameras are critical pieces of eq...

T1498

GBHackers →

GBHackers Malware 1d ago

Hackers Weaponize Venom Stealer via ClickFix Lures for Massive Data Exfiltration

Hackers are increasingly turning simple social engineering tricks into full-scale data theft operations, and a newly identified malware platform called Venom...

T1204 T1041

GBHackers →

GBHackers Ransomware 1d ago

Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks

Hackers are abusing the long-running Phorpiex (Trik) botnet to run large-scale ransomware, sextortion, and crypto-clipping operations, turning one infrastruc...

GBHackers →

GBHackers CVE Cisco 1d ago

Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts

A massive automated cyberattack campaign is actively targeting web applications built on the popular Next.js framework to steal highly sensitive information.

1 IOC

GBHackers →

GBHackers Supply Chain Apple 1d ago

North Korea-Linked Hackers Hit Axios npm in Supply Chain Attack

A major software supply chain attack has been uncovered after threat actors compromised the widely used Axios npm package, impacting developers and organizat...

T1195

GBHackers →

1 2 3 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA