FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Financial

20 articles

Help Net Security General 1d ago

Asqav: Open-source SDK for AI agent governance

AI agents are executing consequential tasks autonomously, often across multiple systems and with little record of what they did or why. Asqav, a Python SDK r...

Help Net Security →

Graham Cluley General 2d ago

Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing

LinkedIn has been secretly scanning your browser for over 6,000 installed extensions — on every single click you make. It can tell if you're job hunting, wha...

Graham Cluley →

The Record General 2d ago

Cybercriminals target accountants to drain Russian firms’ bank accounts

Cybercriminals have stolen millions from Russian companies by hacking accountants’ computers and disguising transfers as salary payments, with the largest co...

The Record →

SC Media DDoS 2d ago

Russian state-run telco subjected to disruptive DDoS intrusion

Cybernews reports that major Russian state-run telecommunications firm Rostelecom has disclosed being subjected to a large-scale distributed denial-of-servic...

SC Media →

SC Media Campaigns 2d ago

Nascent extortion campaign underpinned by social engineering

Dozens of organizations across several industries have been extorted by the financially motivated hacking operation UNC6783, which is suspected to be linked ...

T1204

SC Media →

SC Media General 2d ago

Ex-security officials demand swift FISA 702 renewal

A coalition of about50 former national security leaders is pressing Congress to expedite a straightforward renewal of a critical surveillance authority just ...

SC Media →

AWS Security Blog TTPs Amazon 2d ago

A framework for securely collecting forensic artifacts into S3 buckets

When customers experience a security incident, they need to acquire forensic artifacts to identify root cause, extract indicators of compromise (IoCs), and v...

AWS Security Blog →

SC Media General Google 2d ago

Google accelerates post-quantum cryptography timeline to 2029

Google's decision to aim for a 2029 PQC deadline, ahead of the NSA's 2031 and the US government's 2035 goals, stems from new research indicating quantum comp...

SC Media →

SC Media Malware 2d ago

ComfyUI instances hijacked for cryptomining and proxy botnet

Threat actors are employing a custom Python scanner that continuously probes cloud IP ranges for vulnerable ComfyUI deployments.

SC Media →

Rapid7 Blog CVE Fortinet Rapid7 2d ago

FortiGate CVE-2025-59718 Exploitation: Incident Response Findings

Rapid7’s Incident Response (IR) team was engaged to investigate an incident involving exploitation of CVE-2025-59718 against a vulnerable FortiGate appliance...

1 IOC

Rapid7 Blog →

HackRead Malware Microsoft 2d ago

New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto

Netskope Threat Labs report a new ClickFix attack using fake CAPTCHAs to deploy Tor-backed NodeJS malware and drain crypto wallets on Windows.

HackRead →

Kaspersky Securelist Phishing Microsoft 2d ago

Financial cyberthreats in 2025 and the outlook for 2026

In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in phishing, PC mal...

T1566

Kaspersky Securelist →

Infosecurity Magazine General 2d ago

Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets

CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms

Infosecurity Magazine →

GBHackers TTPs Microsoft Zoom 2d ago

Cybercriminals Use Fake Zoom, Teams Calls to Deliver Malware

Hackers are increasingly using fake Zoom and Microsoft Teams meetings to trick victims into infecting their own systems with malware. SEAL says it has blocke...

T1566

GBHackers →

GBHackers Malware 2d ago

ComfyUI Servers Hijacked for Cryptomining, Proxy Botnet Ops

Hackers are aggressively hijacking Internet-exposed ComfyUI servers and converting them into high‑value cryptomining rigs and proxy botnet nodes, abusing wea...

GBHackers →

The Hacker News Operational Technology Intel 2d ago

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S.

The Hacker News →

Help Net Security General 3d ago

Cybercrime losses break the $20 billion mark

Online crime continues to generate rising financial losses, with totals reaching $20.877 billion in 2025.

Help Net Security →

Security Affairs General 3d ago

Major outage cripples Russian banking apps and metro payments nationwide

A major outage hit Russian banking apps and payments, blocking card use, cash withdrawals, and mobile access for hours. A widespread outage disrupted banking...

Security Affairs →

Security Affairs Data Breach Amazon 3d ago

Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa

China-based actor Storm-1175 runs fast ransomware attacks, exploiting new flaws to breach systems and quickly deploy Medusa ransomware. China-based actor Sto...

T1041

Security Affairs →

Help Net Security General Google Cloudflare 3d ago

Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day

Cloudflare announced it is targeting 2029 to complete post-quantum security across its entire product suite, including post-quantum authentication. The compa...

Help Net Security →

« Prev 1 2 3 4 5 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA