FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine General Feb 3

Vibe-Coded Moltbook Exposes User Data, API Keys and More

Wiz Security claims Moltbook misconfiguration allowed full read and write access

Infosecurity Magazine →

Infosecurity Magazine General Feb 2

NSA Publishes New Zero Trust Implementation Guidelines

NSA released new guidelines to help organizations achieve target-level Zero Trust maturity

Infosecurity Magazine →

Infosecurity Magazine Supply Chain Feb 2

Notepad++ Update Hijacking Linked to Hosting Provider Compromise

A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure

T1195

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Microsoft Feb 2

Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks

Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Feb 2

Android RAT Uses Hugging Face to Host Malware

Bitdefender has discovered a new Android malware campaign that uses Hugging Face

Infosecurity Magazine →

Infosecurity Magazine General Google Feb 2

Former Google Engineer Found Guilty of Stealing AI Secrets

Linwei Ding, a former Google engineer, has been found guilty of stealing trade secrets for China

Infosecurity Magazine →

Infosecurity Magazine Campaigns CrowdStrike Jan 30

Labyrinth Chollima Evolves into Three North Korean Hacking Groups

CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 30

New AI-Developed Malware Campaign Targets Iranian Protests

The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran

Infosecurity Magazine →

Infosecurity Magazine General Jan 30

National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat

Cyber fraudsters targeting corporate finance departments costs businesses millions a year

Infosecurity Magazine →

Infosecurity Magazine General Google Jan 29

Google Disrupts Extensive Residential Proxy Networks

Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 29

Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity

The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats

Infosecurity Magazine →

Infosecurity Magazine Data Breach Jan 29

France Fines National Employment Agency €5m Over 2024 Data Breach

The French data protection regulator said that France Travail’s response to a 2024 data breach violated GDPR

Infosecurity Magazine →

Infosecurity Magazine Insider Threat Jan 29

New CISA Guidance Targets Insider Threat Risks

CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks

Infosecurity Magazine →

Infosecurity Magazine Ransomware Jan 29

FBI Takes Down RAMP Ransomware Forum

The dark web forum administrator confirmed the takedown and said they had “no plans to rebuild”

Infosecurity Magazine →

Infosecurity Magazine Ransomware Jan 29

Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups

Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report

Infosecurity Magazine →

Infosecurity Magazine General Jan 29

US Data Breaches Hit Record High but Victim Numbers Decline

Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025

Infosecurity Magazine →

Infosecurity Magazine General Jan 29

Number of Cybersecurity Pros Surges 194% in Four Years

Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura

Infosecurity Magazine →

Infosecurity Magazine General Jan 29

Cybersecurity Teams Embrace AI, Just Not at the Scale Marketing Suggests

Despite the seemingly widespread adoption of AI for security operations, security leaders primarily use it for “relatively basic use cases,” said a Sumo Logi...

Infosecurity Magazine →

Infosecurity Magazine General Amazon Jan 28

Autonomous System Uncovers Long-Standing OpenSSL Flaws

A recent update has fixed 12 vulnerabilities in OpenSSL, some existing in the codebase for years

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Amazon Jan 28

Critical and High Severity n8n Sandbox Flaws Allow RCE

Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers

T1190

Infosecurity Magazine →

« Prev 1 ... 10 11 12 13 14 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA