FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine General Feb 9

US Agencies Told to Scrap End of Support Edge Devices

CISA has issued a new directive requiring federal agencies to decommission all end of support edge devices within 12 months to reduce ongoing exploitation risks

Infosecurity Magazine →

Infosecurity Magazine Malware Feb 6

Chinese-Made Malware Kit Targets Chinese-Based Routers and Edge Devices

DKnife is a Chinese made malware framework that targets Chinese-based users

Infosecurity Magazine →

Infosecurity Magazine Data Breach Feb 6

Substack Confirms Data Breach, "Limited User Data" Compromised

Substack did not specify the number of users affected by the data breach

Infosecurity Magazine →

Infosecurity Magazine General Feb 6

New Cyber Startup Programme to Debut at Infosecurity Europe 2026

Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase ...

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Amazon GitHub Feb 5

Malicious Commands in GitHub Codespaces Enable RCE

Flaws in GitHub Codespaces allow RCE via crafted repositories or pull requests

Infosecurity Magazine →

Infosecurity Magazine General Feb 5

Smartphones Now Involved in Nearly Every Police Investigation

Cellebrite data confirms digital evidence is now central to almost all cases

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Microsoft Check Point Feb 5

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation

Infosecurity Magazine →

Infosecurity Magazine General Feb 5

AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+

Pindrop warns of 1210% increase in AI-powered fraud last year

Infosecurity Magazine →

Infosecurity Magazine Malware Feb 4

Global SystemBC Botnet Found Active Across 10,000 Infected Systems

SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure

Infosecurity Magazine →

Infosecurity Magazine Ransomware Feb 4

New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure

ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops

Infosecurity Magazine →

Infosecurity Magazine Phishing Feb 4

AI Drives Doubling of Phishing Attacks in a Year

Cofense claims AI is making phishing emails more personalized and sophisticated

T1566

Infosecurity Magazine →

Infosecurity Magazine Supply Chain Amazon Feb 4

Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover

Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover at...

T1195

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Feb 4

SolarWinds Web Help Desk Vulnerability Actively Exploited

CISA has added a critical CVE in SolarWinds Web Help Desk to its KEV Catalog

Infosecurity Magazine →

Infosecurity Magazine General Feb 3

Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw

A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure WordPress Feb 3

SQL Injection Flaw Affects 40,000 WordPress Sites

40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Docker Feb 3

DockerDash Exposes AI Supply Chain Weakness In Docker's Ask Gordon

DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon

T1041

Infosecurity Magazine →

Infosecurity Magazine General Feb 3

UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery

UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform

Infosecurity Magazine →

Infosecurity Magazine Ransomware Feb 3

Researchers Warn of New “Vect” RaaS Variant

A new ransomware-as-a-service operation dubbed “Vect” features custom malware

T1588

Infosecurity Magazine →

Infosecurity Magazine General Feb 3

Cybercrime Unit of Paris Prosecutors Raid Elon Musk’s X Offices in France

Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026

Infosecurity Magazine →

Infosecurity Magazine Campaigns Feb 3

New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials

Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF

T1566

Infosecurity Magazine →

« Prev 1 ... 9 10 11 12 13 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA