FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Campaigns

20 articles

Infosecurity Magazine Campaigns Salesforce Mar 10

ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign

Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks

Infosecurity Magazine →

WeLiveSecurity Campaigns Mar 10

Sednit reloaded: Back in the trenches

The resurgence of one of Russia’s most notorious APT groups

WeLiveSecurity →

Infosecurity Magazine Campaigns Amazon Mar 9

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub

Infosecurity Magazine →

Graham Cluley Campaigns Mar 6

How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down

In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners, Tycoon 2FA - one of the world's most prolifi...

T1566

Graham Cluley →

Infosecurity Magazine Campaigns Mar 6

Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor

A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 4

Multi-Stage "BadPaw" Malware Campaign Targets Ukraine

Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks

Infosecurity Magazine →

Infosecurity Magazine Campaigns Mar 3

Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS

Infosecurity Magazine →

Check Point Research Campaigns Check Point Mar 3

Silver Dragon Targets Organizations in Southeast Asia and Europe

Key Findings Introduction In recent months, Check Point Research (CPR) has been tracking a sophisticated, Chinese-aligned threat group whose activity demonst...

Check Point Research →

Infosecurity Magazine Campaigns Zscaler Mar 3

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Feb 26

Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign

UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation

Infosecurity Magazine →

Mandiant Blog Campaigns Google Intel Feb 25

Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Introduction Last week, Google Threat Intelligence Group (GTIG), Mandiant, and partners took action to disrupt a global espionage campaign targeting telecomm...

Mandiant Blog →

Recorded Future Campaigns Feb 24

Preparing for Russia’s New Generation Warfare in Europe

Russia is escalating its hybrid warfare against NATO into a coordinated, full-scale campaign blending cyber attacks, sabotage, and influence operations. Read...

Recorded Future →

Infosecurity Magazine Campaigns Fortinet Feb 23

Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances

Infosecurity Magazine →

AWS Security Blog Campaigns Amazon Fortinet Intel Feb 20

AI-augmented threat actor accesses FortiGate devices at scale

Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale—a trend Amazon Threat Intelligence has been tracking ...

AWS Security Blog →

Infosecurity Magazine Campaigns Feb 19

Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia

Fraud campaign exploiting Indonesia’s Coretax resulted in $1.

Infosecurity Magazine →

Recorded Future Campaigns WordPress Feb 18

GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack

GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures t...

Recorded Future →

Elastic Security Labs Campaigns Feb 18

Speeding APT Attack Confirmation with Attack Discovery, Workflows, and Agent Builder

This article walks through how Elastic Security's Attack Discovery, combined with Workflows and Agent Builder, can automatically detect, correlate, and confi...

Elastic Security Labs →

Infosecurity Magazine Campaigns Feb 16

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft

New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo

T1566 T1078

Infosecurity Magazine →

Mandiant Blog Campaigns Google Intel Feb 12

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use

Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (A...

T1204 T1592

Mandiant Blog →

Infosecurity Magazine Campaigns Google Feb 12

Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds

Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle

Infosecurity Magazine →

« Prev 1 ... 9 10 11 12 13 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA