FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Google

20 articles

The Hacker News Malware Google Mar 19

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim to conduct dev...

The Hacker News →

The Hacker News Vulnerability Disclosure Google Apple Amazon Intel Mar 19

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover

A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least November 2025, accord...

T1588

The Hacker News →

Infosecurity Magazine Malware Google Mar 18

Crypto Scam "ShieldGuard" Dismantled After Malware Discovery

ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data

Infosecurity Magazine →

Mandiant Blog Zero-Day Google Apple Intel Mar 18

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

Introduction Google Threat Intelligence Group (GTIG) has identified a new iOS full-chain exploit that leveraged multiple zero-day vulnerabilities to fully co...

Mandiant Blog →

Schneier on Security General Google Mar 18

Meta’s AI Glasses and Privacy

Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here.

Schneier on Security →

Infosecurity Magazine General Google Mar 17

Android OS-Level Attack Bypasses Mobile Payment Security

Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass

Infosecurity Magazine →

The Hacker News Data Breach Google Amazon Mar 16

⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More

Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now” feeling.

The Hacker News →

Kaspersky Securelist Malware Google Mar 16

Free real estate: GoPix, the banking Trojan living off your memory

Kaspersky GReAT experts describe the unprecedentedly complex Brazilian banking Trojan GoPix that employs memory-only implants, Proxy AutoConfig (PAC) files f...

T1557 T1189

Kaspersky Securelist →

CISA Advisories CVE Google Mar 13

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-3909 Google S...

2 IOCs

CISA Advisories →

Infosecurity Magazine Malware Google Mar 12

PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time

PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse

Infosecurity Magazine →

Infosecurity Magazine General Google Amazon Mar 11

Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio

LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Google Mar 10

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds

Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell

Infosecurity Magazine →

Kaspersky Securelist Malware Google Mar 10

BeatBanker: A dual‑mode Android Trojan

Kaspersky researchers identified a new Android Trojan dubbed BeatBanker targeting Brazil, posing as government apps and Google Play Store, and capable of bot...

Kaspersky Securelist →

Infosecurity Magazine General Google Mar 6

Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns

Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances

Infosecurity Magazine →

Mandiant Blog Zero-Day Google Intel Mar 5

Look What You Made Us Patch: 2025 Zero-Days in Review

Written by: Casey Charrier, James Sadowski, Zander Work, Clement Lecigne, Benoît Sevens, Fred Plan Executive Summary Google Threat Intelligence Group (GTIG) ...

Mandiant Blog →

Kaspersky Securelist Malware Google Mar 4

Mobile malware evolution in 2025

Statistics on Android malware and the most notable mobile threats of 2025: preinstalled backdoors Keenadu and Triada, spyware Trojans, the Kimwolf IoT botnet...

Kaspersky Securelist →

Mandiant Blog Vulnerability Disclosure Google Apple Intel Mar 3

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Introduction Google Threat Intelligence Group (GTIG) has identified a new and powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (re...

T1588

Mandiant Blog →

Infosecurity Magazine General Google Mar 2

Chrome Unveils Plan For Quantum-Safe HTTPS Certificates

Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS

Infosecurity Magazine →

Infosecurity Magazine Ransomware Google Intel Mar 2

Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel

John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist ca...

Infosecurity Magazine →

Unit 42 CVE Google Mar 2

Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

A high-severity CVE-2026-0628 in Chrome's Gemini allowed local file access and privacy invasion. Google quickly patched the flaw.

1 IOC

Unit 42 →

« Prev 1 ... 3 4 5 6 7 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA