FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine Campaigns 1d ago

New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs

A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom

T1566 T1078

Infosecurity Magazine →

Infosecurity Magazine Malware 2d ago

New 'Storm' Infostealer Remotely Decrypts Stolen Credentials

This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls

T1078

Infosecurity Magazine →

Infosecurity Magazine General SAP 2d ago

NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts

The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks

T1204

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Apple 2d ago

Apple Expands iOS 18 Security Updates Amid DarkSword Threat

iOS/iPadOS 18.7.

T1588

Infosecurity Magazine →

Infosecurity Magazine Ransomware 2d ago

Researchers Observe Sub-One-Hour Ransomware Attacks

Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour

Infosecurity Magazine →

Infosecurity Magazine TTPs GitHub 2d ago

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration

T1572 T1041

Infosecurity Magazine →

Infosecurity Magazine General 2d ago

Most CNI Firms Face Up to £5m in Downtime from OT Attacks

E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks

Infosecurity Magazine →

Infosecurity Magazine General Google 3d ago

Google Introduces Android Dev Verification Amid Openness Debate

Android requires dev identity verification for sideloaded apps; phased global rollout from September

Infosecurity Magazine →

Infosecurity Magazine Malware 3d ago

New Venom Stealer MaaS Platform Automates Continuous Data Theft

Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration

T1204 T1041 T1588

Infosecurity Magazine →

Infosecurity Magazine Campaigns Proofpoint 3d ago

Chinese Hackers Target European Governments in Espionage Campaigns

Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint

Infosecurity Magazine →

Infosecurity Magazine General 3d ago

Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year

Most UK manufacturers compromised last year suffered financial loss, says ESET

Infosecurity Magazine →

Infosecurity Magazine Malware Apple 3d ago

Hackers Hijack Axios npm Package to Spread RATs

Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn

Infosecurity Magazine →

Infosecurity Magazine General Amazon 4d ago

Maryland Man Charged Over $53m Uranium Finance Crypto Hack

Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds

Infosecurity Magazine →

Infosecurity Magazine Malware 4d ago

Phantom Project Bundles Infostealer, Crypter and RAT For Sale

Phantom Stealer .

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Check Point 4d ago

ChatGPT Security Issue Enabled Data Theft via Single Prompt

OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole

T1041 T1598

Infosecurity Magazine →

Infosecurity Magazine Ransomware 4d ago

TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets

TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs

T1195

Infosecurity Magazine →

Infosecurity Magazine General 4d ago

Employee Data Breaches Surge to Seven-Year High

Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches

Infosecurity Magazine →

Infosecurity Magazine CVE F5 4d ago

NCSC Urges Immediate Patching of F5 BIG-IP Bug

The National Cyber Security Centre wants UK firms to patch CVE-2025-53521

1 IOC

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure 5d ago

Cybercriminals Exploit Tax Season With New Phishing Tactics

Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams

T1566 T1078 T1598

Infosecurity Magazine →

Infosecurity Magazine General 5d ago

Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers

Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update

Infosecurity Magazine →

1 2 3 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA