FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Microsoft

20 articles

Infosecurity Magazine TTPs Microsoft Feb 18

AI Assistants Used as Covert Command-and-Control Relays

AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication

Infosecurity Magazine →

Google Project Zero General Microsoft Feb 12

Bypassing Administrator Protection by Abusing UI Access

In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to create a secure boundary for UAC where one didn’t exi...

Google Project Zero →

Zero Day Initiative CVE Microsoft Feb 12

ZDI-26-083: Microsoft Windows searchConnector-ms NTLM Response Information Disclosure Vulnerability

This vulnerability allows remote attackers to disclose NTLM responses on affected installations of Microsoft Windows. User interaction is required to exploit...

1 IOC

Zero Day Initiative →

Zero Day Initiative CVE Microsoft Feb 12

ZDI-26-082: Microsoft Exchange InterceptorSmtpAgent Reliance on Untrusted Inputs Security Feature Bypass Vulnerability

This vulnerability allows remote attackers to bypass a security feature on affected installations of Microsoft Exchange. Authentication is not required to ex...

1 IOC

Zero Day Initiative →

Zero Day Initiative CVE Microsoft Feb 12

ZDI-26-081: Microsoft Windows win32kfull Use-After-Free Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to...

T1548 T1068 1 IOC

Zero Day Initiative →

Infosecurity Magazine Zero-Day Microsoft Feb 11

Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday

Six actively exploited zero-day bug have been patched by Microsoft

Infosecurity Magazine →

Elastic Security Labs TTPs Microsoft Feb 11

BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign

In November 2025, Elastic Security Labs observed an intrusion affecting a multinational organization based in Southeast Asia. During the analysis of this act...

Elastic Security Labs →

Exploit Database Vulnerability Disclosure Microsoft Feb 11

[remote] Windows 10.0.17763.7009 - spoofing vulnerability

Windows 10.0.

Exploit Database →

Krebs on Security Zero-Day Microsoft Feb 10

Patch Tuesday, February 2026 Edition

Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six...

Krebs on Security →

Infosecurity Magazine Ransomware Microsoft Feb 10

Phorpiex Phishing Delivers Low-Noise Global Group Ransomware

High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files

T1566

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Microsoft Check Point Feb 5

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation

Infosecurity Magazine →

Zero Day Initiative CVE Microsoft Docker Feb 5

ZDI-26-068: Docker Desktop for Windows Incorrect Permission Assignment Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop for Windows. User interaction on the part of an ...

T1548 1 IOC

Zero Day Initiative →

Zero Day Initiative CVE Microsoft Docker Feb 5

ZDI-26-067: Docker Desktop for Windows Incorrect Permission Assignment Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop for Windows. User interaction on the part of an ...

T1548 1 IOC

Zero Day Initiative →

Exploit Database General Microsoft Feb 4

[remote] windows 10/11 - NTLM Hash Disclosure Spoofing

windows 10/11 - NTLM Hash Disclosure Spoofing

Exploit Database →

Infosecurity Magazine Vulnerability Disclosure Microsoft Feb 2

Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks

Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says

Infosecurity Magazine →

AWS Security Blog General Microsoft Amazon Jan 30

Explore scaling options for AWS Directory Service for Microsoft Active Directory

You can use AWS Directory Service for Microsoft Active Directory as your primary Active Directory Forest for hosting your users’ identities. Your IT teams ca...

AWS Security Blog →

Mandiant Blog CVE Microsoft Google Intel Jan 27

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Introduction The Google Threat Intelligence Group (GTIG) has identified widespread, active exploitation of the critical vulnerability CVE-2025-8088 in WinRAR...

1 IOC

Mandiant Blog →

Infosecurity Magazine Zero-Day Microsoft Jan 27

Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation

Microsoft urged customers running Microsoft Office 2016 and 2019 to apply the patch to be protected

Infosecurity Magazine →

Google Project Zero General Microsoft Jan 26

Bypassing Windows Administrator Protection

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

Google Project Zero →

Infosecurity Magazine General Microsoft Jan 20

Cyber Risks Among CEOs’ Top Worries Amid Weak Short Term Growth Outlook

PwC’s 29th Global CEO Survey shows cyber risk rising to the top of CEO concerns as confidence in short term business growth weakens

Infosecurity Magazine →

« Prev 1 ... 6 7 8 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA