FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Amazon

20 articles

BleepingComputer Data Breach Amazon Mar 27

European Commission investigating breach after Amazon cloud hack

The European Commission, the European Union's main executive body, is investigating a security breach after a threat actor gained access to its Amazon cloud ...

BleepingComputer →

BleepingComputer Data Breach Amazon Mar 27

European Commission investigating breach after Amazon cloud account hack

The European Commission, the European Union's main executive body, is investigating a security breach after a threat actor gained access to its Amazon cloud ...

BleepingComputer →

Help Net Security CVE Amazon Mar 27

CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation

The US Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2026-330...

T1195 2 IOCs

Help Net Security →

The Hacker News General Amazon Mar 27

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose files...

The Hacker News →

The Record General Amazon Mar 26

EU investigating Snapchat and pornography sites in child safety crackdown

The European Commission opened an investigation into Snapchat and warned four pornographic platforms they could face penalties for failing to follow child sa...

The Record →

Infosecurity Magazine General Amazon Mar 26

OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns

OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws

Infosecurity Magazine →

GBHackers Campaigns Amazon Mar 26

Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack

Fake screenshot links are being used to quietly deploy a multi‑stage backdoor against Web3 customer support teams, in a campaign assessed to be linked to the...

GBHackers →

BleepingComputer Zero-Day Amazon Citrix Mar 25

Citrix urges admins to patch NetScaler flaws as soon as possible

Citrix has patched two NetScaler ADC and NetScaler Gateway vulnerabilities, one of which is very similar to the CitrixBleed and CitrixBleed2 flaws exploited ...

BleepingComputer →

AWS Security Blog General Amazon Mar 23

IAM policy types: How and when to use them

June 3, 2022: Original publication date of this post. This post has been updated to add the additional IAM policy types: Resource control policies.

AWS Security Blog →

The Hacker News General Amazon Salesforce Mar 23

We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

AWS Bedrock is Amazon's platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models ...

The Hacker News →

Infosecurity Magazine Zero-Day Amazon Cisco Mar 19

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says

Infosecurity Magazine →

The Hacker News Zero-Day Amazon Cisco Oracle Intel Mar 18

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secur...

1 IOC

The Hacker News →

AWS Security Blog Ransomware Amazon Cisco Oracle Intel Mar 18

Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls

Amazon threat intelligence has identified an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewal...

1 IOC

AWS Security Blog →

The Hacker News General Amazon Mar 18

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which can grant attac...

The Hacker News →

AWS Security Blog General Amazon Mar 17

AWS completes the second GDV community audit with participant insurers in Germany

We’re excited to announce that Amazon Web Services (AWS) has completed its second GDV (German Insurance Association) community audit with 36 members from the...

AWS Security Blog →

The Hacker News Vulnerability Disclosure Amazon Intel Mar 17

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environment...

T1041

The Hacker News →

Infosecurity Magazine Vulnerability Disclosure Amazon Linux Docker Mar 16

CrackArmor Flaws Expose Linux Systems to Privilege Escalation

CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks

T1548 T1498

Infosecurity Magazine →

Infosecurity Magazine General Amazon Mar 16

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data

T1041

Infosecurity Magazine →

AWS Security Blog General Amazon Mar 14

Deploy AWS applications and access AWS accounts across multiple Regions with IAM Identity Center

If your organization relies on AWS IAM Identity Center for workforce access, you can now extend that access across multiple AWS Regions with multi-Region rep...

AWS Security Blog →

AWS Security Blog General Amazon Mar 12

How to manage the lifecycle of Amazon Machine Images using AMI Lineage for AWS

As organizations scale their cloud infrastructure, maintaining proper lifecycle management of Amazon Machine Images (AMIs) is a critical component of their s...

AWS Security Blog →

« Prev 1 2 3 4 5 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA