FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Fortinet
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Infosecurity Magazine

20 articles

Infosecurity Magazine General Feb 19

Researchers Reveal Six New OpenClaw Vulnerabilities

Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw

Infosecurity Magazine →

Infosecurity Magazine TTPs Feb 18

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics

Infosecurity Magazine →

Infosecurity Magazine TTPs Microsoft Feb 18

AI Assistants Used as Covert Command-and-Control Relays

AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication

Infosecurity Magazine →

Infosecurity Magazine Ransomware Feb 18

Record Number of Ransomware Victims and Groups in 2025

Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025

Infosecurity Magazine →

Infosecurity Magazine Zero-Day Feb 18

Chinese APT Group Exploits Dell Zero-Day for Two Years

Mandiant reveals campaign featuring exploit of a CVSS 10.

Infosecurity Magazine →

Infosecurity Magazine General Google Feb 17

Android 17 Beta Introduces Secure-By-Default Architecture

Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development

Infosecurity Magazine →

Infosecurity Magazine General Apple Feb 17

Apple Expands RCS Encryption and Memory Protections in iOS 26.4

iOS 26.

Infosecurity Magazine →

Infosecurity Magazine TTPs Feb 17

Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks

Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics

Infosecurity Magazine →

Infosecurity Magazine General Feb 17

Over-Privileged AI Drives 4.5 Times Higher Incident Rates

Teleport study reveals that organizations running over-privileged AI have a 76% incident rate

Infosecurity Magazine →

Infosecurity Magazine Ransomware Feb 17

Significant Rise in Ransomware Attacks Targeting Industrial Operations

Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments

Infosecurity Magazine →

Infosecurity Magazine Malware Feb 17

Infostealer Targets OpenClaw to Loot Victim’s Digital Life

Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files

Infosecurity Magazine →

Infosecurity Magazine General Feb 16

Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords

Security researchers have challenged end-to-end encryption claims from popular commercial password managers

Infosecurity Magazine →

Infosecurity Magazine General Feb 16

SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns

NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations

Infosecurity Magazine →

Infosecurity Magazine TTPs Feb 16

OysterLoader Evolves With New C2 Infrastructure and Obfuscation

OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages

T1027 T1583

Infosecurity Magazine →

Infosecurity Magazine Campaigns Feb 16

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft

New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo

T1566 T1078

Infosecurity Magazine →

Infosecurity Magazine Zero-Day Google Feb 16

Google Warns of In the Wild Exploit as It Patches New Chrome Zero Day

A high severity vulnerability in Google Chrome and allows remote attackers to execute code

Infosecurity Magazine →

Infosecurity Magazine General Feb 16

Crypto Payments to Human Traffickers Surges 85%

Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations

Infosecurity Magazine →

Infosecurity Magazine Data Breach Feb 16

Odido Breach Impacts Millions of Dutch Telco Users

Dutch telco Odido has revealed a major data breach impacting over six million customers

Infosecurity Magazine →

Infosecurity Magazine General Feb 13

Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third

G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk

Infosecurity Magazine →

Infosecurity Magazine General Google Feb 13

Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails

Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at La...

Infosecurity Magazine →

« Prev 1 ... 7 8 9 10 11 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA