CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: A new variant of Snake Keylogger, a credential-stealing malware, has been detected in over 280 million infection attempts, highlighting its widespread impact. The malware’s latest resurgence, which was observed by Fortinet, primarily impacts users in China, Turkey, Indonesia, Taiwan, and Spain. It uses phishing emails to infiltrate systems and steal credentials from browsers like Chrome, … The post New Snake Keylogger Variant Launches 280 Million Attacks appeared first on CyberInsider.
Source: CyberInsider
February 18th, 2025 (4 months ago)
Description: The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to be a subset within the APT41
Source: TheHackerNews
February 18th, 2025 (4 months ago)
Description: The China-sponsored state espionage group has exploited known, older bugs in Cisco gear for successful cyber intrusions on six continents in the past two months.
Source: Dark Reading
February 14th, 2025 (4 months ago)
Description: China's Salt Typhoon hackers are still actively targeting telecoms worldwide and have breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices. [...]
Source: BleepingComputer
February 14th, 2025 (4 months ago)
Source: TheRegister
February 13th, 2025 (4 months ago)
Description: A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware attack a toolset previously attributed to espionage actors. [...]
Source: BleepingComputer
February 13th, 2025 (4 months ago)
Description: A recent attack on a South Asian software and services company suggests that a China-linked cyberespionage actor may be engaging in ransomware operations. The attacker deployed a distinct toolset typically associated with Chinese state-sponsored espionage groups but used it in conjunction with RA World ransomware, raising questions about potential moonlighting or a shift in tactics. … The post Chinese Cyberespionage by Day, Ransomware Gang by Night appeared first on CyberInsider.
Source: CyberInsider
February 13th, 2025 (4 months ago)
Description: An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. "During the attack in late 2024, the attacker deployed a distinct toolset that had
Source: TheHackerNews
February 13th, 2025 (4 months ago)
Description: miyako Claims to be Selling Access to a Global Furniture Brand in China
Source: DarkWebInformer
February 12th, 2025 (4 months ago)

CVE-2025-25530

Description: Buffer overflow vulnerability in Digital China DCBI-Netlog-LAB Gateway 1.0 due to the lack of length verification, which is related to saving parental control configuration information. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (4 months ago)