FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine Campaigns 5d ago

DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection

Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials

Infosecurity Magazine →

Infosecurity Magazine CVE Citrix 5d ago

Critical Citrix NetScaler Vulnerability Exploited in the Wild

Researchers from watchTowr and Defused have found evidence that attackers are actively exploiting CVE-2026-3055, a critical NetScaler vulnerability

1 IOC

Infosecurity Magazine →

Infosecurity Magazine General 5d ago

ICO Fines UK Nuisance Call Scammers £100,000

The UK Information Commissioner’s Office has handed a £100,000 fine to Birmingham-based TMAC

Infosecurity Magazine →

Infosecurity Magazine Data Breach Amazon 5d ago

European Commission Confirms Cloud Data Breach

The European Commission has revealed details of a data breach impacting its AWS infrastructure

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Mar 27

New Wave of AiTM Phishing Targets TikTok for Business

Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google and TikTok themed login pages

T1566 T1557

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 27

TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack

Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware

T1195

Infosecurity Magazine →

Infosecurity Magazine General Google Mar 27

Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google

‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration

Infosecurity Magazine →

Infosecurity Magazine General Mar 27

UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs

The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”

Infosecurity Magazine →

Infosecurity Magazine General Mar 26

Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Oracle Mar 26

Attackers Rapidly Weaponize Critical Oracle WebLogic RCE, Honeypot Study Finds

Attackers rapidly exploited a critical Oracle WebLogic RCE flaw the same day exploit code was released, according to a CloudSEK honeypot study

Infosecurity Magazine →

Infosecurity Magazine TTPs Mar 26

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

EtherRAT hides C2 in Ethereum smart contracts via EtherHiding, steals wallets and credentials

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Mar 26

AI Becomes the Top Cybersecurity Priority for Defenders as Criminals Exploit It, PwC Warns

PwC Annual Threat Dynamics report says AI-threats are the biggest concern of clients

T1598

Infosecurity Magazine →

Infosecurity Magazine General Amazon Mar 26

OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns

OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws

Infosecurity Magazine →

Infosecurity Magazine Ransomware Mar 26

Iran-Linked Pay2Key Ransomware Group Re-Emerges

Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key

Infosecurity Magazine →

Infosecurity Magazine General Mar 26

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

The National Crime Agency has warned construction firms about surging invoice fraud

Infosecurity Magazine →

Infosecurity Magazine General Google Mar 25

Cloud Phones Linked to Rising Financial Fraud Threat

Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure SentinelOne Mar 25

Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne

Cybersecurity company’s annual report issues warning over a “mass-marketed impersonation crisis” over attackers abusing legitimate credentials

Infosecurity Magazine →

Infosecurity Magazine General Mar 25

US: FCC Bans Foreign-Made Routers Over National Security Concerns

The US Federal Communications Commission has placed all “consumer-grade” internet routers produced outside the US on its “covered list”

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 25

TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise

Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group

Infosecurity Magazine →

Infosecurity Magazine General Google Mar 25

Experts Sound Alarm Over “Prompt Poaching” Browser Extensions

Expel has warned of malicious Chrome extensions stealing users’ AI conversations

Infosecurity Magazine →

« Prev 1 2 3 4 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA