CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  983 articles  ·  updated every 4 hours · grows forever

983Total
940Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence
Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

Threatpost Read →
◉ Threat Intelligence
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Threatpost Read →
◉ Threat Intelligence
Big Steelmaker Halts Operations After Cyber Incident - Dark Reading

Big Steelmaker Halts Operations After Cyber Incident Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

Threatpost Read →
◉ Threat Intelligence
Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.

Threatpost Read →
◉ Threat Intelligence
Hackers abuse malicious version of Salesforce tool for data theft, extortion - Cybersecurity Dive

Hackers abuse malicious version of Salesforce tool for data theft, extortion Cybersecurity Dive

Cybersecurity Dive Read →
◉ Threat Intelligence
Twitter Whistleblower Complaint: The TL;DR Version

Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.

Threatpost Read →
◉ Threat Intelligence
Dark Reading Confidential: The Day I Found an APT Group in the Most Unlikely Place - Dark Reading

Dark Reading Confidential: The Day I Found an APT Group in the Most Unlikely Place Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Firewall Bug Under Active Attack Triggers CISA Warning

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Threatpost Read →
◉ Threat Intelligence
Chinese APT Mustang Panda Debuts 4 New Attack Tools - Dark Reading

Chinese APT Mustang Panda Debuts 4 New Attack Tools Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Fake Reservation Links Prey on Weary Travelers

Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.

Threatpost Read →
◉ Threat Intelligence
iPhone Users Urged to Update to Patch 2 Zero-Days

Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.

Threatpost Read →
◉ Threat Intelligence
SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients - The Hacker News

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients The Hacker News

The Hacker News Read →
◉ Threat Intelligence
Google Patches Chrome’s Fifth Zero-Day of the Year

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

Threatpost Read →
◉ Threat Intelligence
Meet GI's Cybersecurity Champion: Angela Wu, Director, Threat Intelligence and Response, Connectivity Cybersecurity & Resilience Group, IMDA - GovInsider

Meet GI's Cybersecurity Champion: Angela Wu, Director, Threat Intelligence and Response, Connectivity Cybersecurity & Resilience Group, IMDA GovInsider

GovInsider Read →
◉ Threat Intelligence
2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025

Recorded Future's 2025 Identity Threat Landscape Report analyzes hundreds of millions of compromised credentials to reveal how infostealer malware is evolving, which systems attackers are targeting, a…

Recorded Future Read →
◉ Threat Intelligence
Three ways businesses can use threat intelligence to drive ROI - Raconteur

Three ways businesses can use threat intelligence to drive ROI Raconteur

Raconteur Read →
◉ Threat Intelligence
The Iran War: What You Need to Know

Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios.

Recorded Future Read →
◉ Threat Intelligence
Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks - The Hacker News

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks The Hacker News

The Hacker News Read →
◉ Threat Intelligence
February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January

February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate remediation, down from 23 in January 2026.

Recorded Future Read →
◉ Threat Intelligence
ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution - CybersecurityNews

ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution CybersecurityNews

CybersecurityNews Read →
◉ Threat Intelligence
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence

Latin America's threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overstretched security teams. Recorded Future pr…

Recorded Future Read →
◉ Threat Intelligence
Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA

Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on scam-linked bank accounts.

Recorded Future Read →
◉ Threat Intelligence
House of Commons hit by cyberattack from 'threat actor': internal email - CBC

House of Commons hit by cyberattack from 'threat actor': internal email CBC

CBC Read →
← Prev 31 / 41 Next →