FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Campaigns

20 articles

The Hacker News Campaigns Trend Micro 2d ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its all...

T1566

The Hacker News →

SecurityWeek Campaigns 2d ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The APT28 threat group exploited vulnerable TP-Link and MikroTik routers to conduct adversary-in-the-middle (AitM) attacks. The post US Disrupts Russian Espi...

T1557

SecurityWeek →

CSO Online Campaigns Microsoft Intel 2d ago

Forest Blizzard leverages router compromises to launch AiTM attacks, target Outlook sessions

Russian threat actor Forest Blizzard has been exploiting unsecured home and small-office internet equipment, such as routers, to redirect traffic through att...

T1557

CSO Online →

Infosecurity Magazine Campaigns 2d ago

US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers

The FBI deployed a method to unplug US-based routers compromised by APT28 from the threat actor’s malicious network

Infosecurity Magazine →

The Hacker News Campaigns 2d ago

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, an...

The Hacker News →

GBHackers Campaigns Intel 2d ago

FBI Takes Down Russian Campaign That Compromised Thousands of Routers

In a major counter-cyberespionage action dubbed “Operation Masquerade,” the U.S.

GBHackers →

GBHackers Campaigns Microsoft Intel 2d ago

Russian Threat Actors Abuse Home Routers in Expanding DNS Hijacking Wave

Russian military-linked hackers are actively compromising poorly secured home and small-office routers to hijack internet traffic and spy on organizations wo...

GBHackers →

Help Net Security Campaigns Intel 2d ago

Cybercriminals move deeper into networks, hiding in edge infrastructure

Attack activity is moving toward infrastructure outside endpoint visibility. Proxy networks support a wide range of operations, edge devices serve as initial...

Help Net Security →

Recorded Future Campaigns Microsoft Apple 2d ago

Understanding and Anticipating Venezuelan Government Actions

Explore an in-depth analysis of Venezuela’s political landscape following the January 2026 US operation to capture Nicolás Maduro. This executive summary exa...

Recorded Future →

Krebs on Security Campaigns Microsoft Amazon Intel 3d ago

Russia Hacked Routers to Steal Microsoft Office Tokens

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft O...

Krebs on Security →

The Hacker News Campaigns 3d ago

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link rout...

The Hacker News →

SecurityWeek Campaigns 3d ago

The New Rules of Engagement: Matching Agentic Attack Speed

The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural.

SecurityWeek →

Help Net Security Campaigns Intel 3d ago

Russian hackers hijack internet traffic using vulnerable routers

The Russian state cyber group APT28 has been compromising routers to hijack web traffic and spy on victims, the UK’s The National Cyber Security Centre (NCSC...

Help Net Security →

BleepingComputer Campaigns Microsoft 3d ago

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking loca...

BleepingComputer →

Infosecurity Magazine Campaigns 3d ago

Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns

Newly identified malicious campaigns are linked to virtual private servers modified by APT28 to operate as malicious DNS servers

Infosecurity Magazine →

SC Media Campaigns 3d ago

Charming Kitten: Iran-linked group increasingly employs social engineering in cyber espionage

Charming Kitten, associated with Iran's security apparatus, targets officials, researchers, and corporate employees by impersonating trusted contacts.

T1204

SC Media →

Microsoft Security Blog Campaigns Microsoft 3d ago

SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment lik...

T1557

Microsoft Security Blog →

The Hacker News Campaigns 3d ago

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptoc...

The Hacker News →

Help Net Security Campaigns Microsoft 3d ago

AI-enabled device code phishing campaign exploits OAuth flow for account takeover

A phishing campaign that bypasses the standard 15-minute expiration window through automation and dynamic code generation, leveraging the OAuth Device Code A...

T1566

Help Net Security →

GBHackers Campaigns Microsoft 3d ago

Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows

Hackers are using a deceptive technique known as “ClickFix” to deliver a sophisticated Node. js-based remote access Trojan (RAT) targeting Windows users.

GBHackers →

« Prev 1 2 3 4 5 ... 13 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA