Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Chalk up another win for global cooperation among law enforcement, this time targeting seven types of cyber fraud, including voice phishing and business email compromise.
Source: Dark Reading
December 2nd, 2024 (5 months ago)
Description: Russian authorities have sentenced the leader of the criminal group behind the now-closed dark web platform Hydra Market to life in prison. [...]
Source: BleepingComputer
December 2nd, 2024 (5 months ago)
Description: Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.
Source: Dark Reading
December 2nd, 2024 (5 months ago)
Description: The recently uncovered 'Bootkitty' UEFI bootkit, the first malware of its kind targeting Linux systems, exploits CVE-2023-40238, aka 'LogoFAIL,' to infect computers running on a vulnerable UEFI firmware. [...]
Source: BleepingComputer
December 2nd, 2024 (5 months ago)
Description: With cybersecurity talent hard to come by and companies increasingly looking for guidance and best practices, virtual and fractional chief information security officers can make a lot of sense.
Source: Dark Reading
December 2nd, 2024 (5 months ago)
Description: Alder Hey Children's Hospital got hit with a ransomware attack, while the nature of an incident at Wirral University Teaching Hospital remains undisclosed.
Source: Dark Reading
December 2nd, 2024 (5 months ago)
Description: Taiwanese entities in manufacturing, healthcare, and information technology sectors have become the target of a new campaign distributing the SmokeLoader malware. "SmokeLoader is well-known for its versatility and advanced evasion techniques, and its modular design allows it to perform a wide range of attacks," Fortinet FortiGuard Labs said in a report shared with The Hacker News. "While
Source: TheHackerNews
December 2nd, 2024 (5 months ago)
Description: Artificial Intelligence (AI) is no longer a far-off dream—it’s here, changing the way we live. From ordering coffee to diagnosing diseases, it’s everywhere. But while you’re creating the next big AI-powered app, hackers are already figuring out ways to break it. Every AI app is an opportunity—and a potential risk. The stakes are huge: data leaks, downtime, and even safety threats if security
Source: TheHackerNews
December 2nd, 2024 (5 months ago)
Description: The playbooks that accompany your incident response plan provide efficiency and consistency in responses, help reduce downtime and dwell time, and can be a cost-saving and reputational-saving measure for your organization.
Source: Dark Reading
December 2nd, 2024 (5 months ago)
Description: Mozilla is testing a fresh approach that could persuade more people to switch their default browser on Windows. [...]
Source: BleepingComputer
December 2nd, 2024 (5 months ago)