Skip to main content
FreeIntelHub
Feed Threat Feed Search Trending
Intelligence CVE Priority Vulnerability IOC Lookup IOC Feed YARA Rules Phishing Lookup Exploit Lookup Pastes Dark Web
Adversaries Threat Groups Software Campaigns
Explore Dashboard Geo Map Heatmap MITRE ATT&CK
Browse Sources Vendors Categories Sectors
RSS API
FreeIntelHub
/
Sign In

HackRead

20 articles

HackRead Vulnerability Disclosure 1d ago

RondoDox Botnet Exploits Critical 2018 Vulnerability to Hijack ASUS Routers

Cybersecurity firm VulnCheck reveals hackers are using a critical 2018 vulnerability to bypass authentication and hack over a million ASUS routers.

HackRead →

HackRead Phishing Microsoft 2d ago

FBI Warns of Kali365 Phishing Service Targeting Microsoft 365 Account

FBI warns of Kali365, a PaaS scam kit that lets cybercriminals bypass MFA and hijack Microsoft 365 accounts without passwords.

T1566

HackRead →

HackRead Supply Chain GitHub 2d ago

5,561 GitHub Repositories Hit by Megalodon Supply Chain Attack in Six Hours

SafeDep uncovered the Megalodon attack targeting 5,561 GitHub repositories with malicious CI workflows and cloud credential theft.

T1078 T1195

HackRead →

HackRead General Google 3d ago

Deleted Google API Keys Remain Active up to 23 Minutes, Study Finds

Deleted Google API Keys remain active for up to 23 minutes after deletion, exposing GCP, Gemini, BigQuery, and Maps data to attackers.

HackRead →

HackRead Ransomware 3d ago

Europol Seizes First VPN Used by Ransomware Gangs, Arrests Administrator

Europol has seized First VPN, a service used by ransomware gangs, arrested its administrator and gained access to data linked to thousands of users.

HackRead →

HackRead Campaigns Google 3d ago

Android Malware Spotted Subscribing Victims to Paid Services Without Consent

Cybersecurity researchers expose a 10-month global Android malware campaign using fake apps to secretly charge users through premium SMS bills.

HackRead →

HackRead Malware Microsoft 3d ago

Microsoft’s Retired IE Tool MSHTA Now Being Used in Fileless Malware Attacks

Bitdefender researchers reveal how cyberattackers are abusing the built-in Windows MSHTA utility to silently deploy loaders and infostealers.

HackRead →

HackRead General 4d ago

Understanding Trend Structure: Higher Highs and Lower Lows Explained

Before indicators, before oscillators, before anything that requires a formula – the market communicates through price structure.

HackRead →

HackRead Data Breach GitHub 4d ago

GitHub Breach: TeamPCP Steals 3,800 Repositories via VS Code Extension

GitHub Breach: TeamPCP stole 3,800 internal repositories through a malicious VS Code extension and is now selling the data online for $95,000.

HackRead →

HackRead Vulnerability Disclosure Amazon 4d ago

Verizon DBIR: AI Helped Hackers Exploit Vulnerabilities in 31% of Recent Breaches

Verizon DBIR 2026 reveals software vulnerabilities overtook stolen passwords in cyberattacks, with AI helping hackers exploit flaws within hours.

HackRead →

HackRead Phishing 4d ago

Fake Word Phishing Reveals Enterprise Blind Spot in Trusted Remote Access Tools

Disclosure: This article was provided by ANY.RUN.

T1566

HackRead →

HackRead Advisory 4d ago

Banana RAT Malware in Fake Invoices Hits Customers at 16 Brazilian Banks

Banana RAT malware hidden in fake invoices and security update screens targets customers at 16 Brazilian banks stealing data with QR fraud.

HackRead →

HackRead Data Breach 5d ago

AI Agent Security: Automating Workflow Without Creating Prompt Injection or Data Leak Risks

AI agent security starts with a simple fact: the more authority an agent has, the tighter its access…

HackRead →

HackRead General 5d ago

How Parts Inventory Management Software Fixes Inventory Challenges

Why do maintenance teams struggle? Is it because they lack skills?

T1598

HackRead →

HackRead Zero-Day 5d ago

Pwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts

Cybersecurity researchers successfully demonstrated 47 unique zero-day exploits at Pwn2Own Berlin 2026, targeting major enterprise software and AI platforms.

HackRead →

HackRead General 5d ago

Criminal IP Returns to Infosecurity Europe 2026 with Advanced AI-Driven TI & ASM

Torrance, United States / California, 19th May 2026, CyberNewswire

HackRead →

HackRead General 5d ago

Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity Gap Report

New York, United States, 19th May 2026, CyberNewswire

HackRead →

HackRead General 5d ago

Hosting Service Standards That Define High-Performing Agencies

There’s a quiet pattern among the agencies that consistently outperform their competitors. Their client retention rates are higher.

HackRead →

HackRead Vulnerability Disclosure F5 5d ago

Hackers Actively Exploit ‘Nginx Rift’ Vulnerability Affecting NGINX, F5 Products

Hackers are actively exploiting the Nginx Rift vulnerability affecting NGINX and F5 products, exposing servers to denial-of-service attacks.

HackRead →

HackRead General 6d ago

10 Top OSINT Tools Every Investigator Should Know in 2026

Modern OSINT platforms rely more on AI and automation, while older social tracking methods keep losing access due to privacy and API restrictions.

HackRead →

1 2 3 4 Next page»
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA