FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Fortinet
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine Ransomware Feb 12

World Leaks Ransomware Group Adds Stealthy, Custom Malware ‘RustyRocket’ to Attacks

Accenture Cybersecurity warns over difficult to detect, “sophisticated toolset” being deployed as part of extortion campaigns

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Feb 12

Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds

Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle

Infosecurity Magazine →

Infosecurity Magazine General Feb 12

AI Skills Represent Dangerous New Attack Surface, Says TrendAI

New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Amazon Feb 12

Time to Exploit Plummets as N-Day Flaws Dominate

Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation

Infosecurity Magazine →

Infosecurity Magazine Campaigns Zoom Feb 11

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware

Infosecurity Magazine →

Infosecurity Magazine General Feb 11

US Court Hands Crypto Scammer 20 Years in $73m Case

A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Feb 11

FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026

This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed

Infosecurity Magazine →

Infosecurity Magazine Zero-Day Microsoft Feb 11

Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday

Six actively exploited zero-day bug have been patched by Microsoft

Infosecurity Magazine →

Infosecurity Magazine Ransomware Microsoft Feb 10

Phorpiex Phishing Delivers Low-Noise Global Group Ransomware

High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files

T1566

Infosecurity Magazine →

Infosecurity Magazine General Feb 10

“Digital Parasite” Warning as Attackers Favor Stealth for Extortion

Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden

Infosecurity Magazine →

Infosecurity Magazine Malware Google Apple Feb 10

New Mobile Spyware ZeroDayRAT Targets Android and iOS

ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access

Infosecurity Magazine →

Infosecurity Magazine Campaigns Feb 10

Singapore Takes Down Chinese Hackers Targeting Telco Networks

Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation

Infosecurity Magazine →

Infosecurity Magazine Malware Feb 10

NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure

NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers

Infosecurity Magazine →

Infosecurity Magazine Zero-Day Ivanti Feb 10

European Governments Breached in Zero-Day Attacks Targeting Ivanti

The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Feb 9

New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix

Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution

T1190

Infosecurity Magazine →

Infosecurity Magazine General Feb 9

Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme

Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms

Infosecurity Magazine →

Infosecurity Magazine TTPs Linux Feb 9

VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code

VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds

T1078 T1041

Infosecurity Magazine →

Infosecurity Magazine Ransomware Feb 9

BridgePay Confirms Ransomware Attack, No Card Data Compromised

The services of Florida-based payments platform BridgePay are offline due to a ransomware attack

Infosecurity Magazine →

Infosecurity Magazine General Feb 9

Social Media Platforms Earn Billions from Scam Ads

Revolut claims social media sites make £3.

Infosecurity Magazine →

Infosecurity Magazine General Feb 9

Researchers Find 40,000+ Exposed OpenClaw Instances

SecurityScorecard has identified over 40,000 OpenClaw deployments exposed to potential attack

Infosecurity Magazine →

« Prev 1 ... 8 9 10 11 12 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA