FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

TTPs

20 articles

Elastic Security Labs TTPs Feb 20

MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites

Elastic Security Labs uncovered a ClickFix campaign using compromised legitimate sites to deliver a five-stage chain ending in MIMICRAT, a custom native C RA...

Elastic Security Labs →

Infosecurity Magazine TTPs Microsoft Feb 19

Remcos RAT Expands Real-Time Surveillance Capabilities

New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows

Infosecurity Magazine →

Infosecurity Magazine TTPs Feb 18

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics

Infosecurity Magazine →

Infosecurity Magazine TTPs Microsoft Feb 18

AI Assistants Used as Covert Command-and-Control Relays

AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication

Infosecurity Magazine →

Check Point Research TTPs Feb 17

AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

Key Points Introduction AI is rapidly becoming embedded in day-to-day enterprise workflows, inside browsers, collaboration suites, and developer tooling. As ...

T1598

Check Point Research →

Infosecurity Magazine TTPs Feb 17

Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks

Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics

Infosecurity Magazine →

Infosecurity Magazine TTPs Feb 16

OysterLoader Evolves With New C2 Infrastructure and Obfuscation

OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages

T1027 T1583

Infosecurity Magazine →

Elastic Security Labs TTPs Microsoft Feb 11

BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign

In November 2025, Elastic Security Labs observed an intrusion affecting a multinational organization based in Southeast Asia. During the analysis of this act...

Elastic Security Labs →

Infosecurity Magazine TTPs Linux Feb 9

VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code

VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds

T1078 T1041

Infosecurity Magazine →

PortSwigger Research TTPs Feb 5

Top 10 web hacking techniques of 2025

Welcome to the Top 10 Web Hacking Techniques of 2025, the 19th edition of our annual community-powered effort to identify the most innovative must-read web s...

PortSwigger Research →

Mandiant Blog TTPs Jan 30

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Introduction Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-...

T1566 T1041

Mandiant Blog →

WeLiveSecurity TTPs Google Jan 28

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation

WeLiveSecurity →

Infosecurity Magazine TTPs Jan 19

Researchers Uncover PDFSIDER Malware Built for Long-Term, Covert System Access

New malware PDFSIDER enables covert, long-term access to compromised systems via advanced techniques

Infosecurity Magazine →

PortSwigger Research TTPs Jan 6

Top 10 web hacking techniques of 2025: call for nominations

Update: nominations are now closed, and voting is live!

PortSwigger Research →

Recorded Future TTPs Dec 17

BlueDelta’s Persistent Campaign Against UKR.NET

Discover how Russia’s BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.

T1566 1 IOC

Recorded Future →

Google Project Zero TTPs Dec 16

Welcome to the new Project Zero Blog

While on Project Zero, we aim for our research to be leading-edge, our blog design was … not so much. We welcome readers to our shiny new blog!

Google Project Zero →

Recorded Future TTPs Dec 11

Palestine Action: Operations and Global Network

Explores Palestine Action’s post-designation global network, tactics, and targets, and evaluates key physical risks and mitigations for organizations.

Recorded Future →

WeLiveSecurity TTPs Dec 10

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.

WeLiveSecurity →

WeLiveSecurity TTPs Dec 2

MuddyWater: Snakes by the riverbank

MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook

WeLiveSecurity →

Google Security Blog TTPs Google May 8

Using AI to stop tech support scams in Chrome

Posted by Jasika Bawa, Andy Lim, and Xinghui Lu, Google Chrome Security Tech support scams are an increasingly prevalent form of cybercrime, characterized by...

Google Security Blog →

« Prev 1 2 3 4 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA