FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

TTPs

20 articles

SC Media TTPs NEW 1h ago

Advanced STX RAT sets sights on financial services industry

Advanced STX RAT sets sights on financial services industry Infosecurity Magazine reports that highly sophisticated tactics have been employed to covertly de...

SC Media →

SecurityWeek TTPs 12h ago

MITRE Releases Fight Fraud Framework

The document provides a behavior-based model of the tactics and techniques employed by fraudsters. The post MITRE Releases Fight Fraud Framework appeared fir...

SecurityWeek →

GBHackers TTPs Oracle 15h ago

MuddyWater Uses Russian MaaS in New ChainShell Attack

MuddyWater is now weaponizing a Russian malware-as-a-service (MaaS) platform to run a new operation dubbed “ChainShell”, blending Iranian state targeting wit...

T1588

GBHackers →

GBHackers TTPs Oracle 16h ago

DesckVB RAT Uses Fileless .NET Loader to Evade Detection

DesckVB RAT is emerging as a highly active and stealthy malware threat in 2026, leveraging layered obfuscation and fileless execution techniques to bypass tr...

T1027

GBHackers →

Infosecurity Magazine TTPs 1d ago

STX RAT Targets Finance Sector With Advanced Stealth Tactics

STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods

Infosecurity Magazine →

GBHackers TTPs 1d ago

STX RAT Hides Remote Desktop, Steals Data to Dodge Detection

A stealthy new remote access trojan, dubbed STX RAT, that blends hidden remote desktop control with powerful infostealer capabilities while using advanced ev...

GBHackers →

GBHackers TTPs Sophos 1d ago

RoningLoader Campaign Uses DLL Side-Loading, Code Injection to Slip Past Defenses

A sophisticated cyber-espionage group known as DragonBreath (APT-Q-27) has been linked to a new RoningLoader malware campaign that uses advanced evasion tech...

GBHackers →

Security Affairs TTPs 2d ago

Russia-linked APT28 uses PRISMEX to infiltrate Ukraine and allied infrastructure with advanced tactics

APT28 targets Ukraine and allies with PRISMEX malware, using stealthy techniques for espionage and command-and-control. Russia-linked group APT28 (aka UAC-00...

T1566

Security Affairs →

AWS Security Blog TTPs Amazon 2d ago

A framework for securely collecting forensic artifacts into S3 buckets

When customers experience a security incident, they need to acquire forensic artifacts to identify root cause, extract indicators of compromise (IoCs), and v...

AWS Security Blog →

GBHackers TTPs 2d ago

GreyNoise Launches C2 Detection for Exploited Edge Devices

GreyNoise has introduced a new capability, C2 Detection, to identify compromised edge devices such as firewalls, routers, and VPN systems assets that are inc...

GBHackers →

GBHackers TTPs 2d ago

Remus Infostealer Debuts With Stealthy New Credential-Theft Tactics

Hackers are rolling out a new 64‑bit infostealer dubbed Remus. The code strongly suggests it is a direct successor to the notorious Lumma Stealer, arriving j...

T1555

GBHackers →

GBHackers TTPs Microsoft Zoom 2d ago

Cybercriminals Use Fake Zoom, Teams Calls to Deliver Malware

Hackers are increasingly using fake Zoom and Microsoft Teams meetings to trick victims into infecting their own systems with malware. SEAL says it has blocke...

T1566

GBHackers →

Help Net Security TTPs 2d ago

6G network design puts AI at the center of spectrum, routing, and fault management

Wireless network operators are preparing for a generation of infrastructure where AI is built into the architecture from the start. Sixth-generation networks...

Help Net Security →

HackRead TTPs 3d ago

Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware

REF1695 hackers spread Monero mining malware via fake non-profit installers, using stealth tactics to evade detection and hijack systems for profit.

HackRead →

GBHackers TTPs Linux 3d ago

BPFDoor Variants Hide with Stateless C2 and ICMP Relay Tactics

Seven new BPFDoor variants that push Linux backdoor tradecraft deep into the kernel, making them harder to spot in large telecom networks. These implants use...

GBHackers →

Security Affairs TTPs GitHub 4d ago

Phishing LNK files and GitHub C2 power new DPRK cyber attacks

DPRK-linked hackers use GitHub C2s, starting attacks via phishing LNK files that drop a PDF and PowerShell script in South Korea. North Korea-linked threat a...

T1566 T1071

Security Affairs →

The Hacker News TTPs Microsoft Fortinet GitHub 4d ago

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

Threat actors likely associated with the Democratic People's Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastruct...

The Hacker News →

CSO Online TTPs Microsoft Fortinet GitHub 4d ago

North Korean hackers abuse LNKs and GitHub repos in ongoing campaign

DPRK-linked threat actors are preferring stealth over sophistication in targeting South Korean organizations, as researchers report the use of weaponized Win...

T1027

CSO Online →

HackRead TTPs 4d ago

North Korean Hackers Pose as Trading Firm to Steal $285M from Drift

North Korean hackers (UNC4736) posed as a trading firm for six months to infiltrate Drift Protocol, using social engineering tactics to steal $285M without s...

T1204

HackRead →

GBHackers TTPs Microsoft 4d ago

ResokerRAT Hijacks Telegram API to Command Infected Windows PCs

A newly identified Windows malware dubbed ResokerRAT abuses Telegram’s Bot API as its main command-and-control (C2) channel to remotely monitor and control i...

T1071 T1598

GBHackers →

1 2 3 4 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA