FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Financial

20 articles

Tenable Blog Campaigns Google Apple Intel 2d ago

Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069

A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of d...

T1195

Tenable Blog →

CSO Online General 2d ago

6 metrics IT leaders can’t afford to ignore for business resilience

If you’re in IT, you know: what we don’t measure puts business resilience at risk. In the face of rising threat volumes, scaling complexity, and board-level ...

CSO Online →

The Record General Amazon 3d ago

Cambodia extradites alleged cyber scam linchpin to China as crackdown intensifies

Li Xiong was the head of Huione Group, whose branded entities at one time included an online banking arm, cryptocurrency exchange and online marketplace whic...

The Record →

SC Media General Google 3d ago

Google paper reveals quantum computing threat to cryptocurrency

A paper published by Google indicates that a quantum computer with 500,000 qubits could be used to steal cryptocurrency, a significantly lower threshold than...

SC Media →

Help Net Security Supply Chain Apple 3d ago

North Korean hackers linked to Axios npm supply chain compromise

The software supply chain attack that resulted in the compromise of npm packages of Axios, an extremely popular HTTP client library, is believed to be the wo...

T1195

Help Net Security →

Security Affairs Campaigns Google Apple 3d ago

Google links Axios npm supply chain attack to North Korea-linked APT UNC1069

Google links the Axios npm supply chain attack to North Korean threat group UNC1069, targeting financial gain. Google has attributed the recent Axios npm sup...

T1195

Security Affairs →

SecurityWeek General 3d ago

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta exploited smart contract vulnerabilities to steal approximately $55 million in cryptocurrency and cause Uranium to shut down. The post US ...

SecurityWeek →

Infosecurity Magazine Malware 3d ago

New Venom Stealer MaaS Platform Automates Continuous Data Theft

Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration

T1204 T1041 T1588

Infosecurity Magazine →

The Hacker News Campaigns Microsoft Trend Micro 3d ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans lik...

T1566

The Hacker News →

SC Media General 3d ago

Venom Stealer MaaS handles attacks from ClickFix to crypto theft

The stealer persists on the victim’s machine and immediately exfiltrates data with no local staging.

T1041

SC Media →

GBHackers Vulnerability Disclosure 3d ago

Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests

Hackers are increasingly targeting hotel booking workflows to trick travelers into handing over payment details, using a technique that blends real reservati...

T1204

GBHackers →

HackRead General 3d ago

Defending Encryption in the Post Quantum Era

Post-quantum cryptography explained, risks of quantum attacks, and steps to secure data, systems, and infrastructure for a quantum-resilient…

HackRead →

Infosecurity Magazine General 3d ago

Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year

Most UK manufacturers compromised last year suffered financial loss, says ESET

Infosecurity Magazine →

The Hacker News Campaigns Google Apple Intel 3d ago

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster t...

T1195

The Hacker News →

Help Net Security General 3d ago

Financial groups lay out a plan to fight AI identity attacks

Generative AI tools have brought the cost of deepfake production low enough that criminals and state-sponsored actors now use them routinely against financia...

Help Net Security →

Recorded Future General 3d ago

Industrialization of the Fraud Ecosystem Blog

Payment fraud has industrialized, and that's a defensive advantage. Learn how standardized attack infrastructure creates detectable patterns that financial i...

Recorded Future →

SC Media Campaigns 3d ago

New Ukrainian CERT-spoofing phishing campaign delivers RAT

Ukrainian government entities, healthcare providers, financial providers, security firms, educational institutions, and software development companies have b...

T1566

SC Media →

Help Net Security General Google 3d ago

Crypto industry may be running out of time to prepare for quantum attacks

Google’s latest research suggests the cryptocurrency industry may have less time than expected to prepare for quantum computing. In a whitepaper, Google exam...

Help Net Security →

The Record General 4d ago

US indicts Maryland man for 2021 theft of $54 million from Uranium Finance

U.S.

The Record →

SC Media General 4d ago

Maryland man charged in $53 million Uranium Finance crypto heist

Spalletta is accused of exploiting vulnerabilities in Uranium Finance's smart contracts on two separate occasions in April 2021.

SC Media →

« Prev 1 2 3 4 ... 11 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA