FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Defense

20 articles

Security Affairs TTPs 2d ago

Russia-linked APT28 uses PRISMEX to infiltrate Ukraine and allied infrastructure with advanced tactics

APT28 targets Ukraine and allies with PRISMEX malware, using stealthy techniques for espionage and command-and-control. Russia-linked group APT28 (aka UAC-00...

T1566

Security Affairs →

SC Media Advisory 2d ago

US: Iranian-linked actors are actively exploiting our critical infrastructure

Joint advisory says likely targets include the energy, water, and transportation sectors, as well as the defense industrial base.

SC Media →

The Record Campaigns Intel 2d ago

CIA director quietly elevated agency’s cyber espionage division

The Center for Cyber Intelligence, which had resided within the CIA's Directorate of Digital Innovation since 2015, was promoted to a full-fledged mission ce...

The Record →

The Hacker News Campaigns Trend Micro 2d ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its all...

T1566

The Hacker News →

SecurityWeek Campaigns 2d ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The APT28 threat group exploited vulnerable TP-Link and MikroTik routers to conduct adversary-in-the-middle (AitM) attacks. The post US Disrupts Russian Espi...

T1557

SecurityWeek →

GBHackers Campaigns Intel 2d ago

FBI Takes Down Russian Campaign That Compromised Thousands of Routers

In a major counter-cyberespionage action dubbed “Operation Masquerade,” the U.S.

GBHackers →

GBHackers Campaigns Microsoft Intel 2d ago

Russian Threat Actors Abuse Home Routers in Expanding DNS Hijacking Wave

Russian military-linked hackers are actively compromising poorly secured home and small-office routers to hijack internet traffic and spy on organizations wo...

GBHackers →

Cyberscoop General Microsoft 3d ago

Feds quash widespread Russia-backed espionage network spanning 18,000 devices

Forest Blizzard, a threat group attributed to Russia’s GRU, hijacked network traffic to steal credentials and tokens for Microsoft accounts and other service...

Cyberscoop →

SC Media General 3d ago

Cloud security risks shift to control plane, experts warn

Ahead of World Cloud Security Day, executives from Adactin, ClickHouse, and Fastly highlighted emerging cloud security risks beyond traditional perimeter def...

SC Media →

The Record Advisory 3d ago

FBI, Pentagon warn of Iran hacking groups targeting operational technology

The advisory said Iranian actors are targeting local municipal governments, water and wastewater systems and the energy sector.

The Record →

CSO Online Supply Chain 3d ago

5 steps to strengthen supply chain security and improve cyber resilience

Supply chain attacks have rapidly become one of the most damaging and difficult threats facing IT and security teams. When an adversary compromises a trusted...

T1195 T1598

CSO Online →

AWS Security Blog General Amazon Intel 3d ago

Building AI defenses at scale: Before the threats emerge

At AWS, we’ve spent decades developing processes and tools that enable us to defend millions of customers simultaneously, wherever they operate around the wo...

AWS Security Blog →

Krebs on Security Campaigns Microsoft Amazon Intel 3d ago

Russia Hacked Routers to Steal Microsoft Office Tokens

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft O...

Krebs on Security →

The Hacker News Campaigns 3d ago

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link rout...

The Hacker News →

SC Media General 3d ago

Acquisition reform is materializing, but the harder test still lies ahead

The Pentagon is finally getting serious about procurement reform, but the proof will be in the pudding.

SC Media →

Help Net Security Campaigns Intel 3d ago

Russian hackers hijack internet traffic using vulnerable routers

The Russian state cyber group APT28 has been compromising routers to hijack web traffic and spy on victims, the UK’s The National Cyber Security Centre (NCSC...

Help Net Security →

SC Media Campaigns 3d ago

Charming Kitten: Iran-linked group increasingly employs social engineering in cyber espionage

Charming Kitten, associated with Iran's security apparatus, targets officials, researchers, and corporate employees by impersonating trusted contacts.

T1204

SC Media →

Microsoft Security Blog Campaigns Microsoft 3d ago

SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment lik...

T1557

Microsoft Security Blog →

Cyberscoop General 3d ago

‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace

Noma Security researchers used indirect prompt injection to turn Grafana's own AI into an unwitting courier for sensitive corporate data. The post ‘GrafanaGh...

Cyberscoop →

CSO Online General 3d ago

The rise of proactive cyber: Why defense is no longer enough

For more than two decades, cybersecurity has been built on a reactive model: detect intrusions, patch vulnerabilities, respond to incidents, and repeat. That...

CSO Online →

« Prev 1 2 3 4 ... 8 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA