FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Microsoft

20 articles

GBHackers General Microsoft 15h ago

LinkedIn Hidden Code Secretly Scans Users’ Computers for Installed Software

A new investigation by Fairlinked e.V.

GBHackers →

BleepingComputer General Microsoft Google Oracle 1d ago

LinkedIn secretely scans for 6,000+ Chrome extensions, collects data

A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed ...

BleepingComputer →

BleepingComputer General Microsoft Google Oracle 1d ago

LinkedIn secretly scans for 6,000+ Chrome extensions, collects data

A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed ...

BleepingComputer →

SC Media Campaigns Microsoft GitHub 1d ago

Malicious LNK files, GitHub leveraged in South Korea-targeted malware campaign

Infosecurity Magazine reports that Windows users across South Korea have been subjected to attacks involving illicit LNK files that trigger multi-stage compr...

SC Media →

The Hacker News Vulnerability Disclosure Microsoft Linux 1d ago

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, accord...

T1190

The Hacker News →

GBHackers General Microsoft 1d ago

Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2

Microsoft has officially initiated an automated, machine-learning-based rollout for Windows 11, version 25H2, targeting unmanaged systems. As part of its ong...

GBHackers →

GBHackers General Microsoft 1d ago

Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer

Daniel Rhyne, a 59-year-old former core infrastructure engineer, pleaded guilty on April 1, 2026, to federal hacking and extortion charges. He admitted to lo...

GBHackers →

Help Net Security General Microsoft 1d ago

Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches

Microsoft’s Secure Boot certificates, issued in 2011, are approaching expiration in 2026. To help IT administrators track whether devices have received repla...

Help Net Security →

BleepingComputer General Microsoft Apple 1d ago

Microsoft still working to fix Exchange Online mailbox access issues

Microsoft is investigating and working to resolve Exchange Online mailbox access issues that have intermittently affected Outlook mobile and macOS users for ...

BleepingComputer →

GBHackers Campaigns Microsoft 1d ago

Kimsuky Uses Malicious LNK Files to Drop Python Backdoor

Kimsuky is using multi-stage malicious LNK files to deploy a Python-based backdoor, adding new intermediate scripts while keeping the final payload logic lar...

GBHackers →

BleepingComputer General Microsoft 1d ago

Man admits to locking thousands of Windows devices in extortion plot

A former core infrastructure engineer has pleaded guilty to locking Windows admins out of 254 servers as part of a failed extortion plot targeting his employ...

BleepingComputer →

BleepingComputer General Microsoft 1d ago

Microsoft now force upgrades unmanaged Windows 11 24H2 PCs

Starting this week, Microsoft has begun force-upgrading unmanaged devices running Windows 11 24H2 Home and Pro editions to Windows 11 25H2. [.

BleepingComputer →

Help Net Security General Microsoft 1d ago

Microsoft releases open-source toolkit to govern autonomous AI agents

AI agents can book travel, execute financial transactions, write and run code, and manage infrastructure without human intervention at each step. Frameworks ...

Help Net Security →

GBHackers TTPs Microsoft GitHub 1d ago

North Korea Uses GitHub as C2 in New LNK Phishing Campaign

A new phishing campaign that uses malicious Windows shortcut (LNK) files to target users in South Korea, while abusing GitHub as Command and Control (C2) inf...

T1566 T1071

GBHackers →

GBHackers General Microsoft Google 1d ago

Top 10 Best SaaS Security Posture Management (SSPM) Tools 2026

The rapid and relentless adoption of Software-as-a-Service (SaaS) applications has fundamentally transformed how businesses operate in 2026. From critical pr...

GBHackers →

SC Media Phishing Microsoft 1d ago

Global Microsoft device code phishing facilitated by novel EvilTokens kit

BleepingComputer reports that organizations around the world, particularly in the U.S.

T1566

SC Media →

Microsoft Security Blog Campaigns Microsoft 2d ago

Threat actor abuse of AI accelerates from tool to cyberattack surface

Generative AI is upgrading cyberattacks, from 450% higher phishing click‑through rates to industrialized MFA bypass. The post Threat actor abuse of AI accele...

T1566 T1556

Microsoft Security Blog →

Microsoft Security Blog General Microsoft Linux 2d ago

Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments

Cookie-gated PHP webshells use obfuscation, php-fpm execution, and cron-based persistence to evade detection in Linux hosting environments. This post examine...

T1190 T1027

Microsoft Security Blog →

HackRead Malware Microsoft SAP 2d ago

Microsoft Warns of WhatsApp Attachments Spreading Backdoor on Windows PCs

Microsoft warns of a WhatsApp attachments spreading VBS malware that installs backdoors on Windows PCs, giving hackers remote access and control systems.

HackRead →

GBHackers Ransomware Microsoft 2d ago

Akira-Style Ransomware Campaign Hits Windows Users Across South America

A newly identified ransomware campaign is targeting Windows users across South America, leveraging tactics that closely mimic the notorious Akira ransomware ...

GBHackers →

1 2 3 ... 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA