FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Campaigns

20 articles

Infosecurity Magazine Campaigns Mar 16

FBI Calls for Help to Track Steam Malware Campaign

The FBI wants to hear from gamers who have downloaded Steam titles containing malware

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 13

Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning

Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide

Infosecurity Magazine →

Unit 42 Campaigns Mar 12

Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia

An espionage operation demonstrated strategic operational patience against targets in Southeast Asia, deploying custom backdoors. The post Suspected China-Ba...

Unit 42 →

Check Point Research Campaigns Check Point Mar 12

“Handala Hack” – Unveiling Group’s Modus Operandi

Key Findings Introduction Handala Hack, also tracked by Check Point Research as Void Manticore, is an Iranian threat actor that is known for multiple destruc...

Check Point Research →

Tenable Blog Campaigns Tenable Intel Mar 11

Cyber Retaliation: Analyzing Iranian Cyber Activity Following Operation Epic Fury

In the wake of Operation Epic Fury, digital attacks have shifted from quiet espionage to a loud, coordinated campaign of economic and physical retaliation. I...

Tenable Blog →

Infosecurity Magazine Campaigns Rapid7 WordPress Mar 11

Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign

Over 250 legitimate websites, including news outlets and a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, war...

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 11

BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign

BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data

Infosecurity Magazine →

Rapid7 Blog Campaigns Microsoft Cloudflare Rapid7 WordPress Mar 10

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Overview Rapid7 Labs has identified and analyzed an ongoing, widespread compromise of legitimate, potentially highly trusted WordPress websites, misused by a...

T1078 T1041

Rapid7 Blog →

Infosecurity Magazine Campaigns Salesforce Mar 10

ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign

Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks

Infosecurity Magazine →

WeLiveSecurity Campaigns Mar 10

Sednit reloaded: Back in the trenches

The resurgence of one of Russia’s most notorious APT groups

WeLiveSecurity →

Infosecurity Magazine Campaigns Amazon Mar 9

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub

Infosecurity Magazine →

Graham Cluley Campaigns Mar 6

How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down

In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners, Tycoon 2FA - one of the world's most prolifi...

T1566

Graham Cluley →

Infosecurity Magazine Campaigns Mar 6

Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor

A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 4

Multi-Stage "BadPaw" Malware Campaign Targets Ukraine

Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 3

Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS

Infosecurity Magazine →

Check Point Research Campaigns Check Point Mar 3

Silver Dragon Targets Organizations in Southeast Asia and Europe

Key Findings Introduction In recent months, Check Point Research (CPR) has been tracking a sophisticated, Chinese-aligned threat group whose activity demonst...

Check Point Research →

Infosecurity Magazine Campaigns Zscaler Mar 3

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Feb 26

Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign

UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation

Infosecurity Magazine →

Mandiant Blog Campaigns Google Intel Feb 25

Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Introduction Last week, Google Threat Intelligence Group (GTIG), Mandiant, and partners took action to disrupt a global espionage campaign targeting telecomm...

Mandiant Blog →

Recorded Future Campaigns Feb 24

Preparing for Russia’s New Generation Warfare in Europe

Russia is escalating its hybrid warfare against NATO into a coordinated, full-scale campaign blending cyber attacks, sabotage, and influence operations. Read...

Recorded Future →

« Prev 1 ... 5 6 7 8 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA