FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Malware

20 articles

Cloudflare Blog Malware 2d ago

From bytecode to bytes: automated magic packet generation

By applying symbolic execution and the Z3 theorem prover to BPF bytecode, we’ve automated the generation of malware trigger packets, cutting analysis time fr...

Cloudflare Blog →

SecurityWeek Malware 2d ago

Evasive Masjesu DDoS Botnet Targets IoT Devices

Focused on persistence, the botnet does not engage in widespread infection and avoids blacklisted IPs and critical infrastructure entities. The post Evasive ...

SecurityWeek →

GBHackers Malware 2d ago

Masjesu Botnet Targets Routers in Commercial DDoS Attacks

Hackers are abusing the Masjesu botnet to run high-volume DDoS-for-hire attacks against routers, gateways, and other exposed IoT infrastructure, turning ever...

T1498

GBHackers →

Help Net Security Malware Linux 2d ago

Chaos malware expands from routers to Linux cloud servers

Chaos, Go-based malware first documented by Lumen’s Black Lotus Labs, has historically targeted routers and edge devices. A new variant observed in March 202...

Help Net Security →

HackRead Malware Microsoft 2d ago

New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto

Netskope Threat Labs report a new ClickFix attack using fake CAPTCHAs to deploy Tor-backed NodeJS malware and drain crypto wallets on Windows.

HackRead →

GBHackers Malware 2d ago

ComfyUI Servers Hijacked for Cryptomining, Proxy Botnet Ops

Hackers are aggressively hijacking Internet-exposed ComfyUI servers and converting them into high‑value cryptomining rigs and proxy botnet nodes, abusing wea...

GBHackers →

SC Media Malware Microsoft 3d ago

Novel ResokerRAT malware exploits Telegram API to target Windows systems

Windows systems are being subjected to intrusions involving the newly emergent ResokerRAT malware, which leverages Telegram Bot API to facilitate remote trac...

SC Media →

SC Media Malware Google Palo Alto Networks 3d ago

Palo Alto weaponizes Vertex AI agents as double agents

Palo Alto Networks researchers demonstrated how AI agents built on Google Cloud's Vertex AI platform could be compromised and turned into double agents, enab...

T1041

SC Media →

SC Media Malware 3d ago

Spyware maker avoids jail time in landmark case

Bryan Fleming, the first convicted spyware maker in over a decade, has been sentenced to time served and a $5,000 fine, avoiding jail time after pleading gui...

SC Media →

GBHackers Malware Microsoft Intel 3d ago

New Microsoft Defender Update Issued for Windows 11, Windows 10, and Server Images

Microsoft has rolled out a fresh security intelligence update for Microsoft Defender Antivirus to help secure Windows 11, Windows 10, and Windows Server imag...

GBHackers →

SC Media Malware Google Apple 4d ago

SparkCat malware returns on app stores, targeting cryptocurrency users

The malware, identified by cybersecurity firm Kaspersky, has appeared in apps on both iOS and Android platforms, primarily targeting cryptocurrency users in ...

SC Media →

The Hacker News Malware Google Apple Fortinet 4d ago

⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

This week had real hits. The key software got tampered with.

T1598

The Hacker News →

GBHackers Malware 4d ago

North Korea’s Modular Malware Strategy Hides Attribution, Defies Takedowns

North Korea’s cyber program is shifting from monolithic “families” to a modular, portfolio-style malware ecosystem designed to survive exposure, frustrate at...

GBHackers →

GBHackers Malware Microsoft Apple Oracle Linux 4d ago

Poisoned Axios Package Spreads Cross-Platform Malware via Phantom Dependency

Hackers hijacked the npm account of Axios’s lead maintainer. They used it to push two malicious releases that silently installed a cross‑platform remote acce...

GBHackers →

Security Affairs Malware Apple 5d ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 91

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Infiniti Stealer: a new...

T1195

Security Affairs →

Security Affairs Malware 5d ago

Image or Malware? Read until the end and answer in comments :)

A malicious email delivered a .cmd malware that escalates privileges, bypasses antivirus, downloads payloads, sets persistence, and self-deletes.

Security Affairs →

HackRead Malware 6d ago

UNC1069 Targets Node.js Maintainers via Fake LinkedIn, Slack Profiles

North Korean group UNC1069 targets Node.js maintainers using fake LinkedIn and Slack profiles to spread malware and compromise open source packages.

HackRead →

SC Media Malware Apple Apr 3

Axios maintainer’s post mortem confirms social engineering by UNC1069

Jason Saayman says he installed a remote access trojan disguised as a Teams update.

T1204

SC Media →

SC Media Malware Google Apr 3

Storm infostealer bypasses Chrome encryption, targets crypto wallets

Discovered by Varonis Threat Labs, Storm infostealer operates as a malicious subscription service, targeting multiple browsers like Chrome, Edge, Firefox, an...

SC Media →

SC Media Malware Linux Apr 3

Chaos malware now targeting 64-bit Linux servers

Analysis of China-nexus groups also discovers double-pronged strategy, one on immediacy, the other around long dwell times.

SC Media →

« Prev 1 2 3 4 ... 9 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA