FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Financial

20 articles

CSO Online General 3d ago

Zero‑click Grafana AI attack can enable enterprise data exfiltration

Indirect prompt injection is possible on AI-powered dashboards, allowing exfiltration of sensitive enterprise data without user authentication. Security rese...

T1041

CSO Online →

The Hacker News Campaigns 3d ago

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptoc...

The Hacker News →

Infosecurity Magazine General 3d ago

Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI

Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI

Infosecurity Magazine →

GBHackers Campaigns 3d ago

Fake Installers Spread RATs, Monero Miners in Ongoing Malware Campaign

Fake software installers are being used in a long-running malware operation to drop remote access trojans (RATs), Monero cryptominers, and a new .NET implant...

GBHackers →

GBHackers Ransomware Microsoft 3d ago

Microsoft Warns Storm-1175 Exploiting Web-Facing Vulnerabilities to Deploy Medusa Ransomware

Microsoft is warning that a fast‑moving threat actor it tracks as Storm‑1175 is aggressively exploiting vulnerabilities in internet‑exposed systems to delive...

GBHackers →

GBHackers Campaigns Microsoft Apple 3d ago

Fake TradingView Premium Reddit Posts Spread Vidar and AMOS Stealers

A new malware campaign is abusing Reddit to distribute fake “cracked” builds of TradingView Premium that secretly install Vidar and AMOS information‑stealing...

GBHackers →

The Record DDoS 4d ago

Cyberattack on telecom giant Rostelecom disrupts internet services across Russia

A “large-scale” distributed denial-of-service (DDoS) attack targeted the network of Russian state-run telecom giant Rostelecom on Monday evening, temporarily...

The Record →

The Record General 4d ago

FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar

Cyber-enabled fraud was behind 85% of all losses reported to the FBI in 2025 and constituted 45% of the 1,008,597 complaints it's IC3 unit received overall.

The Record →

BleepingComputer Zero-Day Microsoft 4d ago

Microsoft links Medusa ransomware affiliate to zero-day attacks

Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-...

T1486

BleepingComputer →

BleepingComputer Campaigns 4d ago

Drift $280M crypto theft linked to 6-month in-person operation

The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "...

BleepingComputer →

Microsoft Security Blog Ransomware Microsoft 4d ago

Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations

The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize recently disclosed vulnerabilities...

T1041

Microsoft Security Blog →

SC Media Malware Google Apple 4d ago

SparkCat malware returns on app stores, targeting cryptocurrency users

The malware, identified by cybersecurity firm Kaspersky, has appeared in apps on both iOS and Android platforms, primarily targeting cryptocurrency users in ...

SC Media →

GBHackers General 4d ago

Drift Protocol Hit in $286M Suspected North Korea-Linked Crypto Heist

Hackers have stolen approximately $286 million from Drift Protocol, a leading decentralized perpetual futures exchange on the Solana blockchain, in what secu...

GBHackers →

The Record General 4d ago

Major outage hits Russian banking apps, metro payments across regions

The disruption on Friday affected apps from some of the country’s largest banks, including Sberbank, VTB, Alfa-Bank, T-Bank and Gazprombank.

The Record →

GBHackers Malware 4d ago

North Korea’s Modular Malware Strategy Hides Attribution, Defies Takedowns

North Korea’s cyber program is shifting from monolithic “families” to a modular, portfolio-style malware ecosystem designed to survive exposure, frustrate at...

GBHackers →

Schneier on Security General Google 4d ago

Google Wants to Transition to Post-Quantum Cryptography by 2029

Google says that it will fully transition to post-quantum cryptography by 2029. I think this is a good move, not because I think we will have a useful quantu...

T1598

Schneier on Security →

SC Media General 4d ago

Battling payment fraud with tokenization and executive interviews from RSAC 2026 - Brian Oh, Mickey Bresman, Ashish Jain, Thyaga Vasudevan, Jimmy White - ESW #453

SC Media →

GBHackers Campaigns Microsoft 4d ago

Threat Actors Weaponize Fake Microsoft Teams Domains to Target Users

Threat actors associated with North Korea are deploying fake Microsoft Teams domains to conduct social engineering attacks and distribute malware. The threat...

T1204

GBHackers →

BleepingComputer Phishing 5d ago

Traffic violation scams switch to QR codes in new phishing texts

Scammers are sending fake "Notice of Default" traffic violation text messages impersonating state courts across the U.S.

T1566

BleepingComputer →

Help Net Security Supply Chain Apple 5d ago

Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attack...

T1195

Help Net Security →

« Prev 1 2 3 4 5 6 ... 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA