FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

TTPs

20 articles

Microsoft Security Blog TTPs Microsoft Apple Mar 27

How Microsoft Defender protects high-value assets in real-world attack scenarios

High-value assets including domain controllers, web servers, and identity infrastructure are frequent targets in sophisticated attacks. Microsoft Defender ap...

Microsoft Security Blog →

Security Affairs TTPs Google Mar 27

New AITM phishing wave hijacks TikTok Business accounts

A new AITM phishing campaign targets TikTok Business accounts to hijack them for malvertising, continuing tactics seen in earlier Google-themed scams. Push S...

T1566 T1557 T1189

Security Affairs →

GBHackers TTPs Mar 27

Hackers Deploy USB Malware, RATs, and Stealers in Southeast Asian Government Attacks

A multi-cluster cyberespionage operation in which attackers used USB-propagated malware, multiple RATs, loaders, and a custom stealer to target a Southeast A...

T1021

GBHackers →

Infosecurity Magazine TTPs Mar 26

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

EtherRAT hides C2 in Ethereum smart contracts via EtherHiding, steals wallets and credentials

Infosecurity Magazine →

GBHackers TTPs Cloudflare Mar 26

Torg Grabber Malware Shifts from Telegram Exfiltration to Encrypted REST API for C2

A fast-evolving information‑stealing malware dubbed “Torg Grabber” that has shifted from simple Telegram‑based exfiltration to a hardened, encrypted REST API...

T1041

GBHackers →

GBHackers TTPs Mar 26

Kiss Loader Malware Targets with Early Bird APC Injection in New Attack Campaign

A newly identified malware loader dubbed “Kiss Loader” is emerging as a potential threat, leveraging advanced process injection techniques and dynamic delive...

GBHackers →

GBHackers TTPs Intel Mar 25

China-Backed Hackers Target Southeast Asian Military Systems in Ongoing Spy Campaign

China-linked threat actors have been identified targeting Southeast Asian military networks in a long-running cyber espionage campaign focused on intelligenc...

T1041

GBHackers →

GBHackers TTPs Mar 25

Mirai Botnets Evolve Into Major DDoS and Proxy Abuse Threats

Mirai-based botnets have evolved from simple IoT malware into large-scale DDoS and proxy abuse platforms that now underpin record-breaking attacks and stealt...

T1071

GBHackers →

GBHackers TTPs Mar 25

Five Malicious npm Packages Target Crypto Developers, Steal Wallet Keys via Telegram

Five malicious npm packages impersonating popular crypto libraries are stealing wallet keys from Solana and Ethereum developers and exfiltrating them directl...

T1041

GBHackers →

Microsoft Security Blog TTPs Microsoft Mar 25

Guidance for detecting, investigating, and defending against the Trivy supply chain compromise

Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide. This analysis walks through th...

T1195

Microsoft Security Blog →

The Hacker News TTPs Kubernetes Mar 24

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious ...

T1021

The Hacker News →

Infosecurity Magazine TTPs Mar 23

Tycoon2FA Phishing Service Resumes Activity Post-Takedown

Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA

T1566 T1557

Infosecurity Magazine →

Cyberscoop TTPs Mar 23

The phone call is the new phishing email

Voice-based phishing was at the root of multiple attack sprees Mandiant responded to last year, reflecting a concerning shift in tactics. The post The phone ...

T1566

Cyberscoop →

Mandiant Blog TTPs Mar 23

M-Trends 2026: Data, Insights, and Strategies From the Frontlines

Every year, the cyber threat landscape forces defenders to adapt to evolving adversary tactics, techniques, and procedures (TTPs). In 2025, Mandiant observed...

Mandiant Blog →

CSO Online TTPs Google Mar 23

Chrome ABE bypass discovered: New VoidStealer malware steals passwords and cookies

A new infostealer is bypassing Chrome’s Application-Bound Encryption (ABE), using a debugger-based technique researchers say hasn’t been seen in the wild bef...

CSO Online →

The Hacker News TTPs Mar 20

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

The U.S.

T1498

The Hacker News →

Kaspersky Securelist TTPs Mar 6

Exploits and vulnerabilities in Q4 2025

This report provides statistical data on published vulnerabilities and exploits we researched during Q4 2025. It also includes summary data on the use of C2 ...

Kaspersky Securelist →

Elastic Security Labs TTPs Linux Mar 5

Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft

In this first part of a two-part series, we explore Linux rootkit taxonomy, trace their evolution from userland shared object hijacking and kernel-space load...

Elastic Security Labs →

Infosecurity Magazine TTPs Feb 26

Aeternum Botnet Shifts Command Control to Polygon Blockchain

New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

Infosecurity Magazine →

Trail of Bits TTPs Feb 20

Using threat modeling and prompt injection to audit Comet

Before launching their Comet browser, Perplexity hired us to test the security of their AI-powered browsing features. Using adversarial testing guided by our...

Trail of Bits →

« Prev 1 2 3 4 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA