FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Cloudflare Check Point Oracle WordPress Rapid7 Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Campaigns

20 articles

Infosecurity Magazine Campaigns Feb 16

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft

New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo

T1566 T1078

Infosecurity Magazine →

Mandiant Blog Campaigns Google Intel Feb 12

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use

Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (A...

T1204 T1592

Mandiant Blog →

Infosecurity Magazine Campaigns Google Feb 12

Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds

Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle

Infosecurity Magazine →

Infosecurity Magazine Campaigns Zoom Feb 11

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware

Infosecurity Magazine →

Infosecurity Magazine Campaigns Feb 10

Singapore Takes Down Chinese Hackers Targeting Telco Networks

Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation

Infosecurity Magazine →

Mandiant Blog Campaigns Feb 9

UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering

Written by: Ross Inman, Adrian Hernandez Introduction North Korean threat actors continue to evolve their tradecraft to target the cryptocurrency and decentr...

T1204

Mandiant Blog →

Recorded Future Campaigns Feb 4

Rublevka Team: Anatomy of a Russian Crypto Drainer Operation

Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.

Recorded Future →

Infosecurity Magazine Campaigns Feb 3

New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials

Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF

T1566

Infosecurity Magazine →

Infosecurity Magazine Campaigns Google Feb 2

Android RAT Uses Hugging Face to Host Malware

Bitdefender has discovered a new Android malware campaign that uses Hugging Face

Infosecurity Magazine →

Infosecurity Magazine Campaigns CrowdStrike Jan 30

Labyrinth Chollima Evolves into Three North Korean Hacking Groups

CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 30

New AI-Developed Malware Campaign Targets Iranian Protests

The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 29

Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity

The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 28

Emojis in PureRAT’s Code Point to AI-Generated Malware Campaign

Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media.

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 26

Researchers Uncover “Haxor” SEO Poisoning Marketplace

Fortra researchers have discovered a new SEO poisoning operation known as “HaxorSEO”

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 26

Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm

A destructive cyber attack targeting Poland’s energy sector has been linked to Russian APT group Sandworm

T1529

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 22

LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords

Phoney email alerts suggest users need to backup their LastPass accounts within 24 hours.

T1566

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 21

Peruvian Loan Scam Harvests Cards and PINs via Fake Applications

Loan phishing operation in Peru is stealing card info by impersonating financial institutions

T1566

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 20

LinkedIn Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs

Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages

T1566

Infosecurity Magazine →

Infosecurity Magazine Campaigns Jan 16

TamperedChef Malvertising Campaign Drops Malware via Fake PDF Manuals

TamperedChef creates backdoors and steals user credentials – particularly in organizations reliant on technical equipment

T1189

Infosecurity Magazine →

WeLiveSecurity Campaigns Dec 18

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmenta...

WeLiveSecurity →

« Prev 1 ... 10 11 12 13 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA