FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Financial

20 articles

Infosecurity Magazine General Google Mar 27

Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google

‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration

Infosecurity Magazine →

Infosecurity Magazine General Mar 27

UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs

The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”

Infosecurity Magazine →

GBHackers Campaigns Mar 27

Silver Fox Cyberattack Targets Japanese Businesses with Tax-Themed Phishing Scams

A threat actor known as Silver Fox is targeting Japanese organizations with a new wave of spearphishing attacks timed to coincide with the country’s busy tax...

T1566

GBHackers →

GBHackers Malware Mar 27

Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks

A South Asian financial institution has been hit by a custom malware toolkit combining a modular backdoor, dubbed BRUSHWORM, and a DLL side‑loaded keylogger ...

T1027

GBHackers →

GBHackers Phishing Mar 27

Phishing ZIP Files Used to Deploy PXA Stealer Targeting Financial Firms

A sharp rise in PXA Stealer campaigns targeting global financial institutions during the first quarter of 2026. The activity marks a notable shift in the inf...

T1566

GBHackers →

CSO Online General Mar 27

Was ist Social Engineering?

Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich schützen können.

T1204 1 IOC

CSO Online →

CSO Online General Google Mar 27

Google: The quantum apocalypse is coming sooner than we thought

Google isn’t just responsible for the encryption of a big chunk of the communications on the internet. It is also building its own quantum computers, so it’s...

CSO Online →

HackRead Campaigns Mar 27

New Ghost Campaign Uses Fake npm Progress Bars to Phish Sudo Passwords

ReversingLabs researchers identify a new Ghost campaign using fake npm install logs and progress bars to phish for sudo passwords and steal crypto wallets fr...

HackRead →

Help Net Security General Mar 26

Top product launches at RSAC 2026

RSAC 2026 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs in i...

Help Net Security →

AWS Security Blog General Mar 26

Preparing for agentic AI: A financial services approach

Deploying agentic AI in financial services requires additional security controls that address AI-specific risks. This post walks you through comprehensive ob...

AWS Security Blog →

SC Media General Mar 26

OneSpan's Ashish Jain on why passkeys are ready for prime time in modern banking

Ashish Jain explores why passkeys are ready for even the highest risk banking use cases.

SC Media →

BleepingComputer General Mar 26

UK sanctions Xinbi marketplace linked to Asian scam centers

The United Kingdom's Foreign, Commonwealth and Development Office (FCDO) has sanctioned Xinbi, a Chinese-language cryptocurrency-based online marketplace tha...

BleepingComputer →

The Record General Apple Mar 26

Apple rolls out age verification to UK iPhone users

The age filters will be turned on by default, meaning that all users — including adults — will have to prove their age via credit card and other payment meth...

The Record →

SC Media General Google Mar 26

Report: Mounting financial fraud threat driven by cloud phones

Infosecurity Magazine reports that threat actors have been increasingly exploiting cloud phones, or virtualized Android devices operating on remote servers, ...

SC Media →

HackRead Malware Mar 26

New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data

CyberProof researchers have detected a 10% surge in PXA Stealer attacks targeting financial institutions in Q1 2026.

T1041

HackRead →

The Record General Mar 26

UK sanctions Chinese crypto marketplace tied to scam compounds

The British government sanctioned Xinbi, a Chinese-language cryptocurrency marketplace accused of enabling large-scale online fraud and human exploitation, i...

The Record →

GBHackers Campaigns Intel Mar 26

Silver Fox Tax Audit Phishing Campaign Shifts from RATs to Python Stealers

Threat intelligence teams have tracked Silver Fox (also known as Void Arachne), a China-based intrusion set that sits at the intersection of financially moti...

T1566

GBHackers →

Security Affairs General Mar 26

Researchers uncover WebRTC skimmer bypassing traditional defenses

Researchers found a new skimmer using WebRTC to steal and send payment data, bypassing traditional security controls. Sansec researchers discovered a new pay...

T1041

Security Affairs →

Help Net Security General Google Mar 26

Google races to secure encryption before quantum threats arrive

Google is preparing for the quantum era, a turning point in digital security, with a 2029 timeline for post-quantum cryptography (PQC) migration. Security pr...

T1598

Help Net Security →

GBHackers Campaigns Amazon Mar 26

Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack

Fake screenshot links are being used to quietly deploy a multi‑stage backdoor against Web3 customer support teams, in a campaign assessed to be linked to the...

GBHackers →

« Prev 1 ... 3 4 5 6 7 ... 11 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA