FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Microsoft

20 articles

SC Media Vulnerability Disclosure Microsoft Mar 26

Intruder's Chris Wallis on confidence, AI and the future of exposure management

Chris Wallis explores whether AI can bridge the divide between finding vulnerabilities and understanding real-world attack context as exploit windows continu...

SC Media →

GBHackers Malware Microsoft Apple Mar 26

New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware

Threat actors are standardizing a powerful ClickFix-based attack that abuses the Windows Run dialog box and macOS Terminal to deliver malware while sidestepp...

1 IOC

GBHackers →

SC Media Phishing Microsoft Mar 26

Microsoft credential phishing weaponizes Bubble AI app builder

Microsoft credential phishing weaponizes Bubble AI app builder AI-powered no-code app-building platform Bubble has been exploited to create illicit web apps ...

T1566 T1598

SC Media →

GBHackers CVE Microsoft Mar 26

IDrive for Windows Vulnerability Allows Attackers to Escalate Privileges and Gain Unauthorized Access

A critical security flaw has been identified in the IDrive Cloud Backup Client for Windows, exposing users to local privilege escalation attacks. Tracked as ...

T1548 T1068 1 IOC

GBHackers →

GBHackers CVE Microsoft Mar 26

Microsoft Unveils New Guidance to Detect and Defend Against Trivy Supply Chain Attack

Aqua Security’s vulnerability scanner, Trivy, suffered a sophisticated CI/CD supply chain compromise. The threat actor, identified as TeamPCP, leveraged prio...

T1195 1 IOC

GBHackers →

BleepingComputer Phishing Microsoft Mar 25

Bubble AI app builder abused to steal Microsoft account credentials

Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and ho...

T1566

BleepingComputer →

Microsoft Security Blog General Microsoft Mar 25

Identity security is the new pressure point for modern cyberattacks

Read the latest Microsoft Secure Access report for insights into why a unified identity and access strategy offers strong modern protection. The post Identit...

Microsoft Security Blog →

The Hacker News Campaigns Microsoft Mar 25

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Cybersecurity researchers are calling attention to an active device code phishing campaign that's targeting Microsoft 365 identities across more than 340 org...

T1566

The Hacker News →

GBHackers Ransomware Microsoft VMware Linux Mar 25

Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts, and Cloud Workloads

Linux-focused ransomware Pay2Key is actively targeting enterprise servers, VMware ESXi virtualization hosts, and cloud workloads, underscoring how far Linux ...

T1588

GBHackers →

Help Net Security General Microsoft Apple Mar 25

Microsoft hands Entra ID users new option for MFA

Organizations rely on MFA to enforce identity checks before granting access to systems and services. Microsoft has made external MFA generally available in M...

Help Net Security →

Help Net Security General Microsoft Google Mar 25

Google’s TurboQuant cuts AI memory use without losing accuracy

Large language models carry a persistent scaling problem. As context windows grow, the memory required to store key-value (KV) caches expands proportionally,...

Help Net Security →

Microsoft Security Blog TTPs Microsoft Mar 25

Guidance for detecting, investigating, and defending against the Trivy supply chain compromise

Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide. This analysis walks through th...

T1195

Microsoft Security Blog →

Recorded Future Vulnerability Disclosure Microsoft Apple Mar 25

ClickFix Campaigns Targeting Windows and macOS

Insikt Group reveals five ClickFix social engineering clusters (QuickBooks, Booking.com, Birdeye) targeting Windows and macOS.

T1204 1 IOC

Recorded Future →

Microsoft Security Blog General Microsoft Mar 24

Governing AI agent behavior: Aligning user, developer, role, and organizational intent

This research report explores the layers of agent intent and how to align them for secure enterprise AI adoption. The post Governing AI agent behavior: Align...

Microsoft Security Blog →

HackRead General Microsoft SAP Mar 24

FBI Warns of Iran’s Handala Hack Group Using Fake Apps to Spy on Windows Users

The FBI has issued a warning about Iran-linked Handala Hack Group, targeting Windows users through fake versions of WhatsApp and Telegram.

HackRead →

BleepingComputer General Microsoft Mar 24

Microsoft fixes bug causing Classic Outlook sync issues with Gmail

​Microsoft has fixed a known issue causing Gmail and Yahoo email synchronization and connection problems for classic Outlook users. [.

BleepingComputer →

CSO Online General Microsoft Mar 24

HP launches TPM Guard to help defeat physical TPM attacks

The Trusted Platform Module (TPM), developed by the Trusted Computing Group (TCG), is a mandatory security component in any computer running Windows 11. It s...

CSO Online →

CSO Online General Microsoft Apple Mar 24

Autonomous AI adoption is on the rise, but it’s risky

Two AI releases early this year are prompting users to give up control and let autonomous agentic tools complete tasks on their behalf. IT leaders should be ...

CSO Online →

Security Affairs Campaigns Microsoft Mar 24

North Korea-linked threat actors abuse VS Code auto-run to spread StoatWaffle malware

North Korea-linked threat actors use VS Code auto-run tasks to spread StoatWaffle malware via malicious projects that execute on folder open. North Korea-lin...

Security Affairs →

Zero Day Initiative Vulnerability Disclosure Microsoft Mar 24

ZDI-26-226: (0Day) Microsoft Azure MCP AzureCliService Command Injection Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Azure. Authentication is not required to exploit ...

T1190 T1059

Zero Day Initiative →

« Prev 1 ... 3 4 5 6 7 ... 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA