FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Financial

20 articles

Infosecurity Magazine Ransomware Feb 9

BridgePay Confirms Ransomware Attack, No Card Data Compromised

The services of Florida-based payments platform BridgePay are offline due to a ransomware attack

Infosecurity Magazine →

Recorded Future Campaigns Feb 4

Rublevka Team: Anatomy of a Russian Crypto Drainer Operation

Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.

Recorded Future →

Infosecurity Magazine General Feb 3

Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw

A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project

Infosecurity Magazine →

Krebs on Security General Feb 2

Please Don’t Feed the Scattered Lapsus ShinyHunters

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim fir...

Krebs on Security →

Trail of Bits General Jan 30

Celebrating our 2025 open-source contributions

Last year, our engineers submitted over 375 pull requests that were merged into non–Trail of Bits repositories, touching more than 90 projects from cryptogra...

Trail of Bits →

Trail of Bits General Docker Jan 29

Building cryptographic agility into Sigstore

Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic ...

T1598

Trail of Bits →

Google Security Blog General Google Jan 27

New Android Theft Protection Feature Updates: Smarter, Stronger

Posted by Nataliya Stanetsky, Fabricio Ferracioli, Elliot Sisteron, Irene Ang of the Android Security Team Phone theft is more than just losing a device; it'...

Google Security Blog →

Mandiant Blog CVE Microsoft Google Intel Jan 27

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Introduction The Google Threat Intelligence Group (GTIG) has identified widespread, active exploitation of the critical vulnerability CVE-2025-8088 in WinRAR...

1 IOC

Mandiant Blog →

Infosecurity Magazine General Jan 26

CISA Releases List of Post-Quantum Cryptography Product Categories

CISA released initial list of PQC-capable hardware and software to guide companies amid quantum threats

Infosecurity Magazine →

Infosecurity Magazine Data Breach Jan 23

Under Armour Investigates Data Breach After 72 Million Records Allegedly Exposed

Under Armour said there is no evidence at this point to suggest the incident affected systems used to process payments or store customer passwords

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 21

Peruvian Loan Scam Harvests Cards and PINs via Fake Applications

Loan phishing operation in Peru is stealing card info by impersonating financial institutions

T1566

Infosecurity Magazine →

Recorded Future General Intel Adobe Jan 9

Practitioners Reveal What Makes Threat Intelligence Programs Mature

Threat intelligence practitioners from Global Payments, Adobe, and Superhuman reveal how mature CTI programs transform data overload into strategic business ...

Recorded Future →

Google Security Blog General Google Dec 3

Android expands pilot for in-call scam protection for financial apps

Posted by Aden Haussmann, Associate Product Manager and Sumeet Sharma, Play Partnerships Trust & Safety Lead Android uses the best of Google AI and our advan...

Google Security Blog →

Trail of Bits General Dec 2

Introducing constant-time support for LLVM to protect cryptographic code

Trail of Bits has developed constant-time coding support for LLVM, providing developers with compiler-level guarantees that their cryptographic implementatio...

Trail of Bits →

WeLiveSecurity TTPs Dec 2

MuddyWater: Snakes by the riverbank

MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook

WeLiveSecurity →

Trail of Bits Vulnerability Disclosure Oracle Nov 18

We found cryptography bugs in the elliptic library using Wycheproof

Trail of Bits is publicly disclosing two vulnerabilities in elliptic, a widely used JavaScript library for elliptic curve cryptography that is downloaded ove...

Trail of Bits →

Trail of Bits General Nov 14

How we avoided side-channels in our new post-quantum Go cryptography libraries

The Trail of Bits cryptography team is releasing our open-source pure Go implementations of ML-DSA (FIPS-204) and SLH-DSA (FIPS-205), two NIST-standardized p...

Trail of Bits →

Trail of Bits General Nov 7

Balancer hack analysis and guidance for the DeFi ecosystem

.content img { border: 1px solid black; } TL;DR The root cause of the hack was a rounding direction issue that had been present in the code for many years.

T1598

Trail of Bits →

WeLiveSecurity General SAP Nov 5

Sharing is scaring: The WhatsApp scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data

WeLiveSecurity →

WeLiveSecurity Malware Sep 25

DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception

Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers

WeLiveSecurity →

« Prev 1 ... 8 9 10 11 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA