Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: An international law enforcement operation has taken down AVCheck, a service used by cybercriminals to test whether their malware is detected by commercial antivirus software before deploying it in the wild. [...]
Source: BleepingComputer
May 30th, 2025 (38 minutes ago)
Description: This week, we discuss an exciting revamp of The Abstract, tech betrayals, and the "it's for cops" defense.
Source: 404 Media
May 30th, 2025 (39 minutes ago)
Description: Several Senate Democrats called on Homeland Security Secretary Kristi Noem to reestablish the Cyber Safety Review Board (CSRB) so it could continue looking into China-linked hacks.
Source: The Record
May 30th, 2025 (39 minutes ago)
Source: TheRegister
May 30th, 2025 (about 1 hour ago)
Description: United States
Source: Ransomware.live
May 30th, 2025 (about 1 hour ago)
Description: United States
Source: Ransomware.live
May 30th, 2025 (about 1 hour ago)
Description: United States
Source: Ransomware.live
May 30th, 2025 (about 1 hour ago)
Description: Welcome to M&H Electric Fabricators, where we've been sparking innovation and powering up the automotive electric industry since 1985. Our experience and commitment to excellence have helped us become the leading supplier of wiring harnesses to the automotive aftermarket. - 220gb of electric fabricators
Source: Ransomware.live
May 30th, 2025 (about 1 hour ago)
Description: All Star Flooring, Inc. is a leading provider of commercial flooring solutions with over 35 years of experience serving the Washington Metropolitan Area, including the District of Columbia, Maryland, and Virginia. The company's headquarters is located at 10742 Tucker Street, Beltsville, MD 20705. - Today, we disclose 140 GB of data.
Source: Ransomware.live
May 30th, 2025 (about 1 hour ago)
Description: Summary A security vulnerability has been identified in go-gh where an attacker-controlled GitHub Enterprise Server could result in executing arbitrary commands on a user's machine by replacing HTTP URLs provided by GitHub with local file paths for browsing. Details The GitHub CLI and CLI extensions allow users to transition from their terminal for a variety of use cases through the Browser capability in github.com/cli/go-gh/v2/pkg/browser: Using the -w, --web flag, GitHub CLI users can view GitHub repositories, issues, pull requests, and more using their web browser Using the gh codespace command set, GitHub CLI users can transition to Visual Studio Code to work with GitHub Codespaces This is done by using URLs provided through API responses from authenticated GitHub hosts when users execute gh commands. Prior to 2.12.1, Browser.Browse() would attempt to open the provided URL using a variety of OS-specific approaches regardless of the scheme. An attacker-controlled GitHub Enterprise Server could modify API responses to use a specially tailored local executable path instead of HTTP URLs to resources. This could allow the attacker to execute arbitrary executables on the user's machine. In 2.12.1, Browser.Browse() has been enhanced to allow and disallow a variety of scenarios to avoid opening or executing files on the filesystem without unduly impacting HTTP URLs: URLs with http://, https://, vscode://, vscode-insiders:// protocols are supported URLs with file:// prot...
Source: Github Advisory Database (Go)
May 30th, 2025 (about 1 hour ago)