FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Financial

20 articles

Infosecurity Magazine General Amazon 4d ago

Maryland Man Charged Over $53m Uranium Finance Crypto Hack

Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds

Infosecurity Magazine →

SecurityWeek Malware 4d ago

Venom Stealer Raises Stakes With Continuous Credential Harvesting

Licensed malware with built-in persistence and automation enables attackers to continuously siphon credentials, session data, and cryptocurrency assets. The ...

SecurityWeek →

Mandiant Blog Campaigns Google Apple Oracle Intel 4d ago

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack

Written by: Austin Larsen, Dima Lenz, Adrian Hernandez, Tyler McLellan, Christopher Gardner, Ashley Zaya, Michael Rudden Introduction Google Threat Intellige...

T1195

Mandiant Blog →

Security Affairs General 4d ago

Nearly half a Million mobile customers of Lloyds Banking Group affected by security incident

Lloyds Banking Group data incident exposed transactions of ~450,000 mobile banking users due to a faulty update. A faulty software update at Lloyds Banking G...

Security Affairs →

Help Net Security General 4d ago

Hacker stripped more than $50 million from Uranium crypto exchange, spent it on trading cards

US prosecutors have charged a Maryland man in connection with two hacks of the Uranium Finance cryptocurrency exchange that led to losses exceeding $50 milli...

Help Net Security →

Help Net Security Supply Chain Apple Oracle GitHub 4d ago

Axios npm packages backdoored in supply chain attack

An unknown attacker has compromised the GitHub and npm accounts of the main developer of Axios, a widely used HTTP client library, and published npm packages...

T1195

Help Net Security →

SecurityWeek General Google 4d ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google researchers have shown that breaking the encryption of Bitcoin and Ethereum requires 20x fewer qubits. The post Google Slashes Quantum Resource Requir...

SecurityWeek →

The Hacker News Campaigns 4d ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undo...

The Hacker News →

Security Affairs General 4d ago

Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation

The Dutch Ministry of Finance took treasury banking portal offline after a cyberattack; core tax systems were not affected. The Dutch Ministry of Finance too...

Security Affairs →

The Hacker News General Intel 4d ago

The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a ...

T1598

The Hacker News →

Schneier on Security General 4d ago

Inventors of Quantum Cryptography Win Turing Award

Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this recognition.

Schneier on Security →

SecurityWeek General 4d ago

Lloyds Data Security Incident Impacts 450,000 Individuals

A faulty software update led to the exposure of mobile banking users’ transactions to other users of the application. The post Lloyds Data Security Incident ...

SecurityWeek →

BleepingComputer General 4d ago

Hacker charged with stealing $53 million from Uranium crypto exchange

U.S.

BleepingComputer →

CSO Online General 4d ago

The external pressures redefining cybersecurity risk

Over the last four years, I’ve watched organizations get blindsided by threats that originated in a third-party network. More than 35% of data breaches are c...

CSO Online →

CSO Online General Intel 4d ago

6 key takeaways from RSA Conference 2026

Writing a conference preview is an act of professional speculation. You read the agenda, map the schedule session density, and make your personal best call a...

CSO Online →

BleepingComputer Data Breach 4d ago

Dutch Finance Ministry takes treasury banking portal offline after breach

The Dutch Ministry of Finance took some of its systems offline, including the digital portal for treasury banking, while investigating a cyberattack detected...

BleepingComputer →

The Hacker News Supply Chain Apple 4d ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious depend...

T1195

The Hacker News →

Help Net Security General 4d ago

The art of making technical risk make sense to executives

In this Help Net Security video, Jay Miller, CISO at Paessler, explains how security leaders can communicate technical risk to executives and board members i...

Help Net Security →

HackRead General 4d ago

AI Agents Are Democratizing Finance but Also Redefining Risk

AI agents are transforming finance, enabling automated trading and payments, but introduce new risks around keys, data inputs and secure execution control.

HackRead →

Elastic Security Labs Campaigns 4d ago

Fake Installers to Monero: A Multi-Tool Mining Operation

Elastic Security Labs dissects a long-running operation deploying RATs, cryptominers, and CPA fraud through fake installer lures, tracking its evolution acro...

Elastic Security Labs →

« Prev 1 2 3 4 5 ... 11 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA