FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

GBHackers

20 articles

GBHackers TTPs 3d ago

XLoader malware Sharpens Obfuscation, Masks C2 Traffic via Decoy Servers

XLoader’s developers have released new versions that significantly harden the malware’s code and hide its command‑and‑control (C2) traffic behind layers of e...

T1027

GBHackers →

GBHackers Ransomware Microsoft 4d ago

Windows Tools Abused to Kill AV Ahead of Ransomware Attacks

Hackers are increasingly turning legitimate Windows administration tools into stealthy weapons to disable antivirus and EDR before launching ransomware, maki...

T1562 T1598

GBHackers →

GBHackers Malware Apple 4d ago

Axios NPM Packages Breached in Ongoing Supply Chain Attack

A severe supply chain attack has compromised the widely used Axios HTTP client on the npm registry. Attackers injected a malicious dependency into specific A...

T1195

GBHackers →

GBHackers Data Breach 4d ago

Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline

The Dutch Ministry of Finance is actively managing a significant cybersecurity incident after discovering unauthorized access to its internal Information and...

T1021 T1041

GBHackers →

GBHackers TTPs Microsoft 4d ago

Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence

Hackers are deploying a new Windows malware called ResokerRAT, a Telegram‑based Remote Access Trojan (RAT) that gives attackers stealthy remote control over ...

T1041

GBHackers →

GBHackers General Amazon 4d ago

PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data

Security researchers have disclosed two high-severity vulnerabilities in libpng, the widely deployed reference library used for processing Portable Network G...

GBHackers →

GBHackers Phishing Microsoft 4d ago

EvilTokens Launches New Phishing Service Targeting Microsoft Accounts

EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that industrialises Microsoft account takeover by abusing the OAuth device code flow rather than t...

T1566 T1598

GBHackers →

GBHackers Ransomware Google 4d ago

Google Introduces Advanced Ransomware Defense and Recovery Features in Drive

Google has officially moved its advanced ransomware detection and file restoration features for Google Drive out of beta, making them generally available to ...

GBHackers →

GBHackers General Apple 4d ago

Apple Adds ClickFix Attack Warnings in New macOS Tahoe Security Feature

Apple has silently introduced a new security mechanism in macOS Tahoe 26.4 to protect users against social engineering campaigns known as ClickFix attacks.

T1204

GBHackers →

GBHackers Phishing 4d ago

Tax Filing Scams Used to Deliver Malware in New Cybercrime Campaigns

Cybercriminals are once again exploiting global tax seasons, abusing IRS and tax filing lures to deliver malware, remote monitoring and management (RMM) tool...

T1566 T1598

GBHackers →

GBHackers Data Breach 4d ago

CareCloud Data Breach Exposes Patient Data After Hackers Access IT Systems

CareCloud, Inc., a prominent healthcare technology provider, has disclosed a material cybersecurity incident involving unauthorized access to its electronic ...

GBHackers →

GBHackers Malware Microsoft 4d ago

DeepLoad Malware Uses ClickFix and AI Evasion to Hit Enterprise Networks

New “DeepLoad” malware is turning a single user click into fileless, credential‑stealing persistence inside enterprise networks, leveraging the ClickFix tech...

T1204 T1027

GBHackers →

GBHackers Vulnerability Disclosure Check Point Intel 4d ago

ChatGPT Vulnerability Enabled Silent Leakage of Prompts and Sensitive Information

Artificial intelligence assistants increasingly handle our most sensitive data, operating under the assumption that enclosed environments keep this informati...

GBHackers →

GBHackers Malware 4d ago

RoadK1ll Malware Turns Hacked Devices Into Network Relays

Hackers are deploying a new Node. js-based implant dubbed RoadK1ll to quietly turn compromised hosts into on-demand network relays, enabling stealthy pivotin...

GBHackers →

GBHackers Zero-Day Amazon Intel 4d ago

Claude AI Uncovers Zero-Day RCE Vulnerabilities in Vim and Emacs

Security researchers at Calif recently demonstrated the evolving power of artificial intelligence in vulnerability research by using Claude AI to uncover zer...

T1190

GBHackers →

GBHackers Malware 4d ago

GhostSocks Hijacks Devices as Proxy Network for Stealthy Cyberattacks

A newly emerging malware known as GhostSocks is quietly reshaping how attackers evade detection by converting compromised systems into residential proxy node...

GBHackers →

GBHackers Vulnerability Disclosure 4d ago

Notepad++ v8.9.3 Released With Fixes for cURL Security Flaw and Crash Bugs

Notepad++ rolled out version 8.9.

GBHackers →

GBHackers Malware Microsoft 5d ago

Russian Hackers Deploy “CTRL” for RDP Hijacking

Russian hackers are using a new remote access toolkit called “CTRL” to silently hijack Remote Desktop Protocol (RDP) sessions via FRP-based reverse tunnels, ...

T1078

GBHackers →

GBHackers Ransomware 5d ago

Exposed Server Leaks TheGentlemen Ransomware Toolkit, Credentials, and Ngrok Tokens

A fully operational TheGentlemen ransomware toolkit on an exposed server, revealing victim credentials, ngrok tokens, and a complete pre-encryption playbook....

GBHackers →

GBHackers General Intel 5d ago

North Korean IT Worker Used Stolen Identity, AI-Generated Resume in Job Scam

A recent investigation as exposed how a suspected North Korean IT worker allegedly used a stolen identity, AI-generated resume content, and scripted intervie...

GBHackers →

« Prev 1 2 3 4 5 6 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA