FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Financial

20 articles

SC Media General 17h ago

Breaking the trade-off: Full email security without deployment friction

How API-based security is redefining email protection in the face of escalating human risk.

SC Media →

SC Media Campaigns 19h ago

Bogus installers facilitate RAT, cryptominer spread in long-running operation

Threat operation REF1695 has been harnessing counterfeit installers to facilitate multiple attack campaigns delivering remote access trojans and cryptocurren...

SC Media →

The Record General 19h ago

FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic

Voxbeam’s actions allegedly led to “financial impersonation robocalls” that were made to American consumers “ using “non-compliant and long dormant accounts,...

The Record →

SC Media Malware Google 19h ago

Storm infostealer bypasses Chrome encryption, targets crypto wallets

Discovered by Varonis Threat Labs, Storm infostealer operates as a malicious subscription service, targeting multiple browsers like Chrome, Edge, Firefox, an...

SC Media →

SC Media General 21h ago

Zero trust everywhere: Redefining secure network access in a post-VPN world

ThreatLocker's reinvention of zero-trust network access shifts access control from credential verification to the endpoint itself.

SC Media →

Security Affairs General 1d ago

North Korea–linked hackers drain $285M from Drift in sophisticated attack

Drift lost $285M in a sophisticated attack, likely by North Korea, who used nonce-based tricks to gain control and quickly drain funds Drift suffered a $285 ...

Security Affairs →

GBHackers Campaigns 1d ago

Trusted Platforms Exploited to Steal Philippine Banking Credentials

Hackers are increasingly exploiting trusted online platforms to launch sophisticated phishing campaigns targeting bank users in the Philippines. Despite ongo...

T1566

GBHackers →

The Hacker News Malware Google Apple 1d ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the troj...

The Hacker News →

GBHackers Ransomware 1d ago

Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks

Hackers are abusing the long-running Phorpiex (Trik) botnet to run large-scale ransomware, sextortion, and crypto-clipping operations, turning one infrastruc...

GBHackers →

Help Net Security General Microsoft 1d ago

Microsoft releases open-source toolkit to govern autonomous AI agents

AI agents can book travel, execute financial transactions, write and run code, and manage infrastructure without human intervention at each step. Frameworks ...

Help Net Security →

Help Net Security General Google 1d ago

Which messaging app takes the most limited approach to permissions on Android?

Messaging apps handle sensitive conversations, contacts, and media, and their behavior on a device varies in ways that affect privacy. An analysis of Android...

Help Net Security →

SC Media General 1d ago

Drift Protocol estimated to have lost $285M in crypto heist

Solana-based decentralized finance exchange Drift Protocol was assessed by PeckShield to have had up to $285 million stolen in an Apr. 1 crypto heist believe...

SC Media →

SC Media TTPs SAP 1d ago

Phishing campaign delivers Casbaneiro and Horabot banking trojans

The threat actor, identified as Brazilian cybercrime group Augmented Marauder and Water Saci, employs a unique delivery mechanism involving WhatsApp, ClickFi...

T1566

SC Media →

The Record General 1d ago

Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea

The platform released a post-mortem on Wednesday night explaining that malicious actors gained access to Drift systems through a “novel attack” that involved...

The Record →

Cyberscoop Ransomware 1d ago

Akira ransomware group can achieve initial access to data encryption in less than an hour

A new report from Halcyon finds that the group also puts more effort than usual into developing working decryptors, likely to incentivize businesses to pay u...

Cyberscoop →

Cyberscoop General 1d ago

Lawmakers renew push for Labor Department-backed cyber apprenticeship grants

The bipartisan, bicameral Cyber Ready Workforce Act aims to cut into the country’s deficit of cybersecurity professionals. The post Lawmakers renew push for ...

Cyberscoop →

Help Net Security Ransomware Google Apple 2d ago

Software supply chain hacks trigger wave of intrusions, data theft

After linking the Axios npm supply chain attack to North Korean hackers, Google researchers warned that “hundreds of thousands of stolen secrets could potent...

T1041 T1195

Help Net Security →

The Hacker News Campaigns 2d ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency mi...

The Hacker News →

GBHackers Campaigns 2d ago

Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign

Hackers have launched a targeted phishing campaign by cloning Ukraine’s official CERT-UA website and distributing malicious software disguised as a security ...

T1566

GBHackers →

The Record General 2d ago

Crypto platform Drift suspends services after millions stolen in security incident

Security experts believe hundreds of millions of dollars worth of cryptocurrency were stolen from decentralized finance platform Drift on Wednesday after the...

The Record →

1 2 3 ... 11 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA