FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Campaigns

20 articles

The Hacker News Campaigns Cloudflare Mar 27

AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a repo...

T1566 T1557 T1189

The Hacker News →

GBHackers Campaigns Mar 27

Silver Fox Cyberattack Targets Japanese Businesses with Tax-Themed Phishing Scams

A threat actor known as Silver Fox is targeting Japanese organizations with a new wave of spearphishing attacks timed to coincide with the country’s busy tax...

T1566

GBHackers →

GBHackers Campaigns Intel Mar 27

TeamPCP Hackers Focus on AI Developers, Planting Malicious Code to Disrupt Projects

The FBI Cyber Division has issued a critical alert following a massive supply chain attack orchestrated by the threat actor group TeamPCP. The hackers succes...

T1195

GBHackers →

Security Affairs Campaigns Rapid7 Mar 27

China-linked Red Menshen APT deploys stealthy BPFDoor implants in telecom networks

China-linked Red Menshen APT group used stealthy BPFDoor implants in telecom networks to spy on government targets. Rapid7 Labs uncovered a China-linked thre...

Security Affairs →

GBHackers Campaigns Rapid7 Linux Mar 27

Hackers Implant Stealthy BPFdoor Backdoors in Telecom Networks for Persistent Access

A China-nexus threat actor known as Red Menshen is planting stealthy backdoors deep inside global telecommunications networks. According to a recent investig...

GBHackers →

HackRead Campaigns Mar 27

New Ghost Campaign Uses Fake npm Progress Bars to Phish Sudo Passwords

ReversingLabs researchers identify a new Ghost campaign using fake npm install logs and progress bars to phish for sudo passwords and steal crypto wallets fr...

HackRead →

The Hacker News Campaigns Mar 26

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government net...

The Hacker News →

SANS ISC Campaigns Intel Mar 26

TeamPCP Supply Chain Campaign: Update 001 ? Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available, (Thu, Mar 26th)

This is the first update to the TeamPCP supply chain campaign threat intelligence report, “When the Security Scanner Became the Weapon” (v3.0, March 25, ...

T1598

SANS ISC →

HackRead Campaigns Mar 26

Quish Splash QR Code Phishing Campaign Hits 1.6 Million Users

7AI research reveals a massive QR code phishing attack that evaded SPF, DKIM, and DMARC. Find out how 1.

T1566

HackRead →

SC Media Campaigns Google Mar 26

Updated GlassWorm attack campaign uncovered

Threat actors have used a multi-stage framework deploying a remote access trojan and a fake information-stealing Google Docs Offline extension for Chrome in ...

SC Media →

BleepingComputer Campaigns Mar 26

TikTok for Business accounts targeted in new phishing campaign

Threat actors are targeting TikTok for Business accounts in a phishing campaign that prevents security bots from analyzing malicious pages. [.

T1566

BleepingComputer →

SecurityWeek Campaigns Linux Mar 26

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

The state-sponsored threat actor deployed kernel implants and passive backdoors enabling long-term, high-level espionage. The post Chinese Hackers Caught Dee...

SecurityWeek →

Rapid7 Blog Campaigns Rapid7 Mar 26

BPFdoor in Telecom Networks: Sleeper Cells in the backbone

Executive overview The strategic positioning of covert access within the world’s telecommunication networks A months-long investigation by Rapid7 Labs has un...

Rapid7 Blog →

HackRead Campaigns Mar 26

Suspected Hijacked Developer Accounts Spread npm Malware

Sonatype uncovers a sophisticated malware campaign using hijacked npm developer accounts to steal API keys and passwords. Is your dev environment at risk?

HackRead →

GBHackers Campaigns Intel Mar 26

Silver Fox Tax Audit Phishing Campaign Shifts from RATs to Python Stealers

Threat intelligence teams have tracked Silver Fox (also known as Void Arachne), a China-based intrusion set that sits at the intersection of financially moti...

T1566

GBHackers →

Graham Cluley Campaigns Mar 26

World Leaks data extortion: What you need to know

World Leaks is a cyber extortion operation that steals sensitive data from organizations and threatens to leak it via the dark web if a ransom is not paid. R...

Graham Cluley →

GBHackers Campaigns Amazon Mar 26

Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack

Fake screenshot links are being used to quietly deploy a multi‑stage backdoor against Web3 customer support teams, in a campaign assessed to be linked to the...

GBHackers →

GBHackers Campaigns Mar 26

Fake npm Install Messages Conceal RAT Malware in New Open Source Supply Chain Attack

Fake npm install messages are the latest social engineering trick in the open source supply chain, with attackers abusing npm post‑install scripts to silentl...

T1204 T1195

GBHackers →

GBHackers Campaigns Mar 26

LeakBase Forum Admin Arrested by Russian Authorities in Global Cybercrime Operation

Russian law enforcement agencies have successfully apprehended the suspected administrator of LeakBase, a prominent international cybercrime forum. The arres...

GBHackers →

GBHackers Campaigns GitHub Mar 26

Fake VS Code Security Alerts on GitHub Spread Malware in Massive Phishing Attack

A large-scale phishing campaign is actively targeting developers on GitHub by abusing the platform’s Discussions feature to distribute fake Visual Studio Cod...

T1566

GBHackers →

« Prev 1 ... 6 7 8 9 10 ... 13 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA