FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine Zero-Day Amazon Cisco Mar 19

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says

Infosecurity Magazine →

Infosecurity Magazine General Mar 19

UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs

35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs

Infosecurity Magazine →

Infosecurity Magazine CVE Linux Mar 18

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit

1 IOC

Infosecurity Magazine →

Infosecurity Magazine Malware Google Mar 18

Crypto Scam "ShieldGuard" Dismantled After Malware Discovery

ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Rapid7 Mar 18

AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure

Rapid7 says median time from publication to CISA KEV inclusion dropped to five days

Infosecurity Magazine →

Infosecurity Magazine Malware GitHub Mar 18

Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats

The Vidar 2.

Infosecurity Magazine →

Infosecurity Magazine General Mar 18

AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner

Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response

Infosecurity Magazine →

Infosecurity Magazine General Google Mar 17

Android OS-Level Attack Bypasses Mobile Payment Security

Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass

Infosecurity Magazine →

Infosecurity Magazine General Mar 17

'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 17

Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears

Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks

Infosecurity Magazine →

Infosecurity Magazine General Akamai Mar 17

Average Number of Daily API Attacks Up 113% Annually

Akamai says 87% of organizations suffered an API-related security incident last year

Infosecurity Magazine →

Infosecurity Magazine General Mar 17

UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch

The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership

Infosecurity Magazine →

Infosecurity Magazine Phishing Mar 16

Researchers Warn of Global Surge in Fake Shipment Tracking Scams

Some of these campaigns are linked to Darcula, a Chinese-language phishing-as-a-service platform

T1566

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Amazon Linux Docker Mar 16

CrackArmor Flaws Expose Linux Systems to Privilege Escalation

CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks

T1548 T1498

Infosecurity Magazine →

Infosecurity Magazine General Amazon Mar 16

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data

T1041

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 16

FBI Calls for Help to Track Steam Malware Campaign

The FBI wants to hear from gamers who have downloaded Steam titles containing malware

Infosecurity Magazine →

Infosecurity Magazine General Mar 16

UK: Companies House Web Glitch Exposes Corporate Details to Fraudsters

An issue with the Companies House website has put the personal and corporate information of millions at risk

Infosecurity Magazine →

Infosecurity Magazine Ransomware Mar 13

Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep

A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses

T1566

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 13

Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning

Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide

Infosecurity Magazine →

Infosecurity Magazine Malware Google Mar 12

PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time

PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse

Infosecurity Magazine →

« Prev 1 2 3 4 5 6 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA