FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers Phishing Microsoft 2d ago

Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools

Remcos RAT operators are abusing obfuscated scripts and trusted Windows binaries to deliver a stealthy, largely fileless infection chain that runs almost ent...

T1566

GBHackers →

GBHackers CVE Microsoft Broadcom 2d ago

Symantec DLP Agent Flaw Exposed Systems to Privilege Escalation Attacks

A high-severity vulnerability in the Symantec Data Loss Prevention (DLP) Agent for Windows could allow low-privileged attackers to take complete control of a...

T1548 T1068 1 IOC

GBHackers →

GBHackers TTPs 3d ago

Ethereum-Based EtherRAT, EtherHiding Power Stealthy Malware Campaigns

Hackers are abusing the Ethereum blockchain to hide and control a new Node.js backdoor called EtherRAT, using a stealthy technique known as EtherHiding to ma...

GBHackers →

GBHackers Zero-Day Microsoft Google Linux 3d ago

Google Warns of New Chrome Zero-Day Under Active Exploitation – Users Urged to Update Immediately

Google has released an urgent security update for its Chrome desktop browser to address 21 vulnerabilities, including a critical zero-day flaw that is active...

GBHackers →

GBHackers General Microsoft 3d ago

Microsoft Teams to Improve Privacy With EXIF Data Removal Feature

Microsoft is rolling out a wave of privacy and security updates for Microsoft Teams, headlining with a critical new feature that automatically removes EXIF m...

GBHackers →

GBHackers Data Breach Amazon Cisco Salesforce 3d ago

Cisco Faces Alleged Data Leak as ShinyHunters Claims Responsibility

Cisco is actively dealing with a major cybersecurity incident after threat actors breached its internal development networks. The notorious hacking group Shi...

T1195

GBHackers →

GBHackers General 3d ago

Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2026

In today’s fast-paced software development world, where applications are released at an unprecedented rate, ensuring their security is more critical than eve...

GBHackers →

GBHackers CVE 3d ago

Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution

Vim is a widely used, highly configurable text editor, but a recently disclosed flaw highlights the risks associated with its file-parsing features. Tracked ...

1 IOC

GBHackers →

GBHackers Campaigns 3d ago

CrystalX Malware-as-a-Service Spreads via Telegram With Stealer, RAT Tools

Hackers are actively promoting a new malware-as-a-service (MaaS) platform called CrystalX RAT through private Telegram channels, offering cybercriminals a po...

T1041 T1588

GBHackers →

GBHackers General 3d ago

Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec

New York, New York, April 1st, 2026, CyberNewswire TAC Infosec, a global leader in cybersecurity (NSE: TAC), with presence across 100+ countries, announced a...

GBHackers →

GBHackers Vulnerability Disclosure 3d ago

Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests

Hackers are increasingly targeting hotel booking workflows to trick travelers into handing over payment details, using a technique that blends real reservati...

T1204

GBHackers →

GBHackers CVE F5 3d ago

PoC Exploit Code Published for nginx-ui Backup Restore Security Flaw

A critical security flaw in the nginx-ui backup restore mechanism, tracked as CVE-2026-33026, allows attackers to manipulate encrypted backups and execute ar...

1 IOC

GBHackers →

GBHackers Data Breach Microsoft Apple Linux 3d ago

North Korean Hackers Breach Axios Package, Target Windows, macOS, and Linux Systems

A North Korea–nexus threat actor has hijacked the popular Axios NPM package in a high‑impact software supply chain attack that can silently backdoor Windows,...

T1195

GBHackers →

GBHackers General Amazon 3d ago

CrewAI Hit by Critical Vulnerabilities Enabling Sandbox Escape and Host Compromise

CrewAI, a prominent tool used by developers to orchestrate multi-agent AI systems, is currently vulnerable to a chain of critical security flaws. By using di...

GBHackers →

GBHackers General Microsoft 3d ago

Windows 11 Update Fixes Critical Installation Loop Problem

Microsoft has rolled out an urgent, out-of-band update to fix a frustrating installation glitch plaguing Windows 11 users. On March 31, 2026, the company rel...

GBHackers →

GBHackers Malware Microsoft Apple Linux 3d ago

PyPI Telnyx Python SDK Backdoored to Steal Credentials on Windows, macOS, and Linux

Telnyx Python SDK on PyPI, using a multi‑stage WAV steganography payload to steal credentials across Windows, macOS, and Linux systems. The backdoor lives in...

GBHackers →

GBHackers Zero-Day Check Point 3d ago

TrueConf Vulnerability Under Active Exploitation in Southeast Asia Government Attacks

Check Point Research has discovered a critical zero-day vulnerability in the TrueConf video conferencing client. Tracked as CVE-2026-3502 with a CVSS score o...

1 IOC

GBHackers →

GBHackers Supply Chain 3d ago

NPM Supply Chain Attack Uses undicy-http to Deploy RAT

A highly sophisticated npm supply chain attack that abuses a fake HTTP client package to deliver both a powerful RAT and a stealthy browser stealer. The mali...

T1195

GBHackers →

GBHackers Vulnerability Disclosure Google Palo Alto Networks Intel 3d ago

Google Cloud’s Vertex AI Hit by Vulnerability Enabling Sensitive Data Access

Artificial intelligence agents are transforming enterprise workflows, but they also introduce dangerous new attack vectors. Security researchers from Palo Al...

T1041

GBHackers →

GBHackers CVE Oracle 3d ago

Hackers Actively Exploit Critical WebLogic RCE Vulnerabilities in Ongoing Attacks

A maximum-severity vulnerability in Oracle WebLogic Server is facing rapid exploitation in the wild. Tracked as CVE-2026-21962, this unauthenticated Remote C...

T1190 1 IOC

GBHackers →

« Prev 1 2 3 4 5 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA