FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

TTPs

20 articles

CSO Online TTPs 20h ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

When Daniel Rhyne pleaded guilty on April 1 to having launched an insider extortion attack against his then-employer, authorities enumerated the techniques h...

CSO Online →

Security Affairs TTPs 1d ago

Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies

Iran-linked hackers claim to have breached Israeli air defence contractor PSK Wind, which develops command and control systems. Pro-Iran Handala group announ...

T1071

Security Affairs →

GBHackers TTPs Microsoft GitHub 1d ago

North Korea Uses GitHub as C2 in New LNK Phishing Campaign

A new phishing campaign that uses malicious Windows shortcut (LNK) files to target users in South Korea, while abusing GitHub as Command and Control (C2) inf...

T1566 T1071

GBHackers →

SC Media TTPs SAP 1d ago

Phishing campaign delivers Casbaneiro and Horabot banking trojans

The threat actor, identified as Brazilian cybercrime group Augmented Marauder and Water Saci, employs a unique delivery mechanism involving WhatsApp, ClickFi...

T1566

SC Media →

Infosecurity Magazine TTPs GitHub 2d ago

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration

T1572 T1041

Infosecurity Magazine →

Rapid7 Blog TTPs Rapid7 Linux 2d ago

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Executive Overview Advanced persistent threats (APTs) are constantly and consistently changing tactics as network defenders plug holes in defenses. Static in...

Rapid7 Blog →

Rapid7 Blog TTPs Rapid7 Linux 2d ago

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Executive Overview Advanced persistent threats (APTs) are constantly and consistently changing tactics as network defenders plug holes in defenses. Static in...

Rapid7 Blog →

Microsoft Security Blog TTPs Microsoft Apple Oracle Intel SAP 2d ago

Mitigating the Axios npm supply chain compromise

On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages for version updates (1.14.

T1071 T1195

Microsoft Security Blog →

CSO Online TTPs 2d ago

5 essential steps to bulletproof your endpoint security (and avoid the biggest mistakes)

Business resilience starts at the endpoint. Between March and December 2025, the N-able SOC processed over 900,000 alerts—and a staggering 18% originated fro...

CSO Online →

GBHackers TTPs 3d ago

Ethereum-Based EtherRAT, EtherHiding Power Stealthy Malware Campaigns

Hackers are abusing the Ethereum blockchain to hide and control a new Node.js backdoor called EtherRAT, using a stealthy technique known as EtherHiding to ma...

GBHackers →

GBHackers TTPs 3d ago

XLoader malware Sharpens Obfuscation, Masks C2 Traffic via Decoy Servers

XLoader’s developers have released new versions that significantly harden the malware’s code and hide its command‑and‑control (C2) traffic behind layers of e...

T1027

GBHackers →

SC Media TTPs 3d ago

AI powers clandestine DeepLoad credential-stealing campaign

Enterprise business IT environments have been subjected to the DeepLoad credential-stealing malware campaign that ensured stealth via AI abuse and ClickFix a...

SC Media →

SC Media TTPs 3d ago

China-linked groups conduct sophisticated cyber espionage against Southeast Asian government

Security Affairs reports that multiple China-linked threat groups executed a complex cyber campaign against a Southeast Asian government in 2025, employing a...

T1041

SC Media →

SecurityWeek TTPs Amazon 4d ago

TeamPCP Moves From OSS to AWS Environments

After validating stolen credentials using TruffleHog, the hacking group started AWS services enumeration and lateral movement activities. The post TeamPCP Mo...

T1078 T1021

SecurityWeek →

GBHackers TTPs Microsoft 4d ago

Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence

Hackers are deploying a new Windows malware called ResokerRAT, a Telegram‑based Remote Access Trojan (RAT) that gives attackers stealthy remote control over ...

T1041

GBHackers →

GBHackers TTPs Microsoft 5d ago

CrySome RAT: Stealthy .NET Malware Adds AV Killer, HVNC Features

CrySome RAT is a newly observed, advanced .NET remote access trojan that combines full‑featured post‑exploitation tooling with unusually hardened persistence...

GBHackers →

GBHackers TTPs 5d ago

New Homoglyph Tricks Let Cybercriminals Mimic Trusted Domains

New homoglyph attack techniques are turning tiny visual differences in text into a reliable way to spoof trusted domains, steal credentials, and bypass weak ...

GBHackers →

CSO Online TTPs Docker Kubernetes 5d ago

Why Kubernetes controllers are the perfect backdoor

In my years securing cloud-native environments, I’ve noticed a recurring blind spot. We obsess over the “front doors” such as exposed dashboards, misconfigur...

CSO Online →

GBHackers TTPs 5d ago

10 Best Data Loss Prevention Software in 2026

Data loss prevention (DLP) refers to technology and techniques for detecting and preventing unauthorized access, use, disclosure, or destruction of sensitive...

GBHackers →

Security Affairs TTPs Google Docker 6d ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 90

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape New Malware Targets Use...

T1195

Security Affairs →

1 2 3 4 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA