FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Campaigns

20 articles

Infosecurity Magazine Campaigns Fortinet Feb 23

Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances

Infosecurity Magazine →

AWS Security Blog Campaigns Amazon Fortinet Intel Feb 20

AI-augmented threat actor accesses FortiGate devices at scale

Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale—a trend Amazon Threat Intelligence has been tracking ...

AWS Security Blog →

Infosecurity Magazine Campaigns Feb 19

Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia

Fraud campaign exploiting Indonesia’s Coretax resulted in $1.

Infosecurity Magazine →

Recorded Future Campaigns WordPress Feb 18

GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack

GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures t...

Recorded Future →

Elastic Security Labs Campaigns Feb 18

Speeding APT Attack Confirmation with Attack Discovery, Workflows, and Agent Builder

This article walks through how Elastic Security's Attack Discovery, combined with Workflows and Agent Builder, can automatically detect, correlate, and confi...

Elastic Security Labs →

Infosecurity Magazine Campaigns Feb 16

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft

New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo

T1566 T1078

Infosecurity Magazine →

Mandiant Blog Campaigns Google Intel Feb 12

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use

Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (A...

T1204 T1592

Mandiant Blog →

Infosecurity Magazine Campaigns Google Feb 12

Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds

Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle

Infosecurity Magazine →

Infosecurity Magazine Campaigns Zoom Feb 11

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware

Infosecurity Magazine →

Infosecurity Magazine Campaigns Feb 10

Singapore Takes Down Chinese Hackers Targeting Telco Networks

Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation

Infosecurity Magazine →

Mandiant Blog Campaigns Feb 9

UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering

Written by: Ross Inman, Adrian Hernandez Introduction North Korean threat actors continue to evolve their tradecraft to target the cryptocurrency and decentr...

T1204

Mandiant Blog →

Recorded Future Campaigns Feb 4

Rublevka Team: Anatomy of a Russian Crypto Drainer Operation

Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.

Recorded Future →

Infosecurity Magazine Campaigns Feb 3

New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials

Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF

T1566

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Feb 2

Android RAT Uses Hugging Face to Host Malware

Bitdefender has discovered a new Android malware campaign that uses Hugging Face

Infosecurity Magazine →

Infosecurity Magazine Campaigns CrowdStrike Jan 30

Labyrinth Chollima Evolves into Three North Korean Hacking Groups

CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 30

New AI-Developed Malware Campaign Targets Iranian Protests

The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 29

Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity

The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 28

Emojis in PureRAT’s Code Point to AI-Generated Malware Campaign

Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media.

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 26

Researchers Uncover “Haxor” SEO Poisoning Marketplace

Fortra researchers have discovered a new SEO poisoning operation known as “HaxorSEO”

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 26

Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm

A destructive cyber attack targeting Poland’s energy sector has been linked to Russian APT group Sandworm

T1529

Infosecurity Magazine →

« Prev 1 ... 6 7 8 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA