Skip to main content
FreeIntelHub
Feed Threat Feed Search Trending
Intelligence CVE Priority Vulnerability IOC Lookup IOC Feed YARA Rules Phishing Lookup Exploit Lookup Pastes Dark Web
Adversaries Threat Groups Software Campaigns
Explore Dashboard Geo Map Heatmap MITRE ATT&CK
Browse Sources Vendors Categories Sectors
RSS API
FreeIntelHub
/
Sign In

Financial

20 articles

GBHackers Campaigns Google 1d ago

Hackers Use SEO Poisoning to Fake Gemini CLI, Claude Installers

Financially motivated threat actors are running an active campaign that impersonates Google’s Gemini CLI and Anthropic’s Claude Code, using SEO poisoning to ...

GBHackers →

CSO Online Vulnerability Disclosure Microsoft Google Oracle 1d ago

Google leaks details for Chromium bug that can turn browsers into bots

Chromium — the open-source browser that underpins Google Chrome, Microsoft Edge, and Opera, among others — contains an unpatched vulnerability that attackers...

CSO Online →

SC Media General 2d ago

Dutch authorities arrest two in connection with sanctioned web hosting company

The Dutch financial crime investigators (FIOD) arrested a 57-year-old company director and a 39-year-old who headed a separate firm providing internet connec...

SC Media →

SC Media General 2d ago

Trump Mobile confirms exposure of customer data

Chris Walker, a spokesperson for Trump Mobile, stated that the company is investigating the exposure and has not found evidence of financial information bein...

SC Media →

Rapid7 Blog CVE Cisco Rapid7 2d ago

Metasploit Wrap Up 05/22/2026

Another week, another authentication bypass Our humble Metasploit weekly(ish) blog has been blessed with a new network component vulnerability. The dynamic d...

T1556 1 IOC

Rapid7 Blog →

BleepingComputer General 2d ago

Netherlands seizes 800 servers of hosting firm enabling cyberattacks

Financial crime investigators in the Netherlands (FIOD) arrested two men and seized 800 servers linked to a web hosting company that enabled cyberattacks, in...

BleepingComputer →

Infosecurity Magazine Campaigns 2d ago

Fake Gemini and Claude Code Sites Spread Infostealers Through SEO Poisoning

The infostealer payload in this campaign collect a vast amount of data, from collaboration authentication keys to cryptocurrency wallets

Infosecurity Magazine →

Help Net Security General 2d ago

Versa extends zero trust principles to AI agents and MCP workflows

Versa has introduced a patent-pending zero trust architecture for the Model Context Protocol (MCP), applying zero trust principles to AI execution. The compa...

Help Net Security →

GBHackers Campaigns 2d ago

Hackers Use Six-Layer Persistence on FreePBX Systems

Hackers are actively exploiting FreePBX systems using a highly resilient six-layer persistence mechanism. The campaign has been attributed with high confiden...

T1190

GBHackers →

GBHackers Campaigns 2d ago

Hackers Weaponize NF-e Invoice Lures to Deploy Banana RAT

Hackers are actively using Brazil’s electronic invoice system (NF-e) as a lure to distribute a sophisticated banking trojan known as Banana RAT. The campaign...

T1598

GBHackers →

GBHackers General Linux 2d ago

Flipper Introduces Flipper One as a Modular Linux-Based Cyberdeck

Flipper Devices has officially unveiled Flipper One, a modular, Linux-based cyberdeck designed to push the boundaries of open hardware and portable network a...

GBHackers →

Help Net Security General 2d ago

The new economics of fraud: Cheaper, faster, more convincing

Scams have become one of the fastest-growing consumer risks, driven by AI-enabled impersonation, social engineering, and sophisticated attack methods, accord...

T1204 T1598

Help Net Security →

SC Media Campaigns 3d ago

'First VPN' service used by cybercriminals dismantled in international operation

First VPN marketed itself on Russian-speaking cybercrime forums as a reliable tool for anonymity, offering features like anonymous payments and concealed inf...

SC Media →

BleepingComputer Phishing 3d ago

Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet

Modern crypto drainers don't hack wallets. They trick users into approving malicious transactions.

T1566

BleepingComputer →

GBHackers Phishing 3d ago

Indian Student Data Weaponized in Phishing and Financial Fraud Campaigns

A growing trend in India where student data is increasingly being exploited for cybercrime activities, including phishing, impersonation, social engineering,...

T1566 T1204

GBHackers →

Help Net Security General 3d ago

Why AI changed the threat model for travel technology

In this Help Net Security interview, Devon Bryan, SVP, Global CSO at Booking Holdings, reflects on his path from Air Force network security engineer to globa...

Help Net Security →

GBHackers General Microsoft 3d ago

New GhostTree Attack Causes EDR Tools to Hang, Leaving Files Unscanned

A newly disclosed attack technique dubbed “GhostTree” is raising concerns among defenders after researchers demonstrated how it can disrupt endpoint detectio...

GBHackers →

SC Media General Apple 4d ago

FBI warns of surge in crypto ATM scam losses, exceeding $388 million

Cybercriminals are reportedly instructing victims to withdraw cash and deposit it into crypto kiosks, which then transfer the funds to attacker-controlled wa...

SC Media →

SC Media General 4d ago

Darwinium updates mobile SDKs to detect in-session fraud and account farming

The updated SDKs are designed for banks, payment providers, and digital businesses facing sophisticated fraud that occurs after initial authentication.

SC Media →

The Record General Apple 4d ago

Texas, Florida top list of states reporting millions of dollars lost through crypto ATMs

In most complaints, victims said they were given detailed information by fraudsters on how to take money from their bank account, where to find a cryptocurre...

The Record →

1 2 3 ... 11 Next page»
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA