FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Google

20 articles

Tenable Blog Campaigns Google Apple Intel 2d ago

Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069

A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of d...

T1195

Tenable Blog →

BleepingComputer Malware Google 2d ago

'NoVoice' Android malware on Google Play infected 2.3 million devices

A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times.

BleepingComputer →

SC Media Campaigns Google Apple Intel 3d ago

North Korean hackers blamed for axios supply chain hack

North Korean threat operation UNC1069 was noted by the Google Threat Intelligence Group to have perpetrated the npm supply chain attack against the widely us...

T1195

SC Media →

Infosecurity Magazine General Google 3d ago

Google Introduces Android Dev Verification Amid Openness Debate

Android requires dev identity verification for sideloaded apps; phased global rollout from September

Infosecurity Magazine →

SecurityWeek Zero-Day Google 3d ago

Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome

Google has announced fixes for CVE-2026-5281, a zero-day affecting Chrome’s Dawn component. The post Exploited Zero-Day Among 21 Vulnerabilities Patched in C...

1 IOC

SecurityWeek →

SC Media General Google 3d ago

Google paper reveals quantum computing threat to cryptocurrency

A paper published by Google indicates that a quantum computer with 500,000 qubits could be used to steal cryptocurrency, a significantly lower threshold than...

SC Media →

SC Media Ransomware Google 3d ago

Google Drive enhances ransomware protection with AI

The AI model, which has seen significant improvements since its beta phase, can now detect 14 times more ransomware infections at a faster rate.

SC Media →

Security Affairs Campaigns Google Apple 3d ago

Google links Axios npm supply chain attack to North Korea-linked APT UNC1069

Google links the Axios npm supply chain attack to North Korean threat group UNC1069, targeting financial gain. Google has attributed the recent Axios npm sup...

T1195

Security Affairs →

SC Media General Google 3d ago

Free Android VPNs expose users to tracking and risky servers, research finds

The analysis, using MobSF, focused on app permissions, third-party trackers, hardcoded network endpoints, and developer emails.

SC Media →

CISA Advisories CVE Google 3d ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-5281 Google Daw...

1 IOC

CISA Advisories →

The Hacker News Zero-Day Google 3d ago

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploi...

1 IOC

The Hacker News →

Help Net Security Zero-Day Google 3d ago

Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281)

Google has fixed 21 vulnerabilities affecting its popular Chrome browser, among them a zero-day (CVE-2026-5281) with an in-the-wild exploit. About CVE-2026-5...

1 IOC

Help Net Security →

BleepingComputer Zero-Day Google 3d ago

Google fixes fourth Chrome zero-day exploited in attacks in 2026

Google has fixed the fourth Chrome vulnerability exploited in zero-day attacks since the start of the year. [.

BleepingComputer →

The Hacker News Campaigns Google Apple Intel 3d ago

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster t...

T1195

The Hacker News →

SecurityWeek General Google Palo Alto Networks 3d ago

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks has disclosed the details of its analysis of Google Cloud Platform’s Vertex AI. The post Google Addresses Vertex Security Issues After Res...

SecurityWeek →

Security Affairs General Google 3d ago

Free VPNs leak your data while claiming privacy

Most free Android VPNs track users, request dangerous permissions, and connect to risky servers, privacy comes at a hidden cost. Free VPN apps are some of th...

Security Affairs →

BleepingComputer Ransomware Google 3d ago

Google Drive ransomware detection now on by default for paying users

Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying ...

BleepingComputer →

GBHackers Vulnerability Disclosure Google Palo Alto Networks Intel 3d ago

Google Cloud’s Vertex AI Hit by Vulnerability Enabling Sensitive Data Access

Artificial intelligence agents are transforming enterprise workflows, but they also introduce dangerous new attack vectors. Security researchers from Palo Al...

T1041

GBHackers →

BleepingComputer General Google 3d ago

Google now allows you to change your @gmail.com address

Google is rolling out a new feature in the U.S.

1 IOC

BleepingComputer →

SC Media Vulnerability Disclosure Google Linux 3d ago

New critical Telegram zero-click issue threatens total device compromise

Cybernews reports that Telegram for Android and Telegram Desktop for Linux have been affected by a critical zero-click vulnerability that could enable remote...

T1190

SC Media →

« Prev 1 2 3 4 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA