CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Globe Life Inc. has disclosed new details regarding a cybersecurity incident involving an extortion attempt and the unauthorized access of sensitive customer data. The insurance provider confirmed that an unknown threat actor gained access to the personally identifiable information (PII) of approximately 855,000 individuals and attempted to extort the company by threatening to release the … The post Globe Life Confirmed Data Breach Impacts 855,000 Customers appeared first on CyberInsider.
Source: CyberInsider
January 31st, 2025 (5 months ago)
Description: Community Health Center (CHC), a leading Connecticut healthcare provider, is notifying over 1 million patients that their personal and health information was stolen in an October breach. [...]
Source: BleepingComputer
January 31st, 2025 (5 months ago)
Description: ​Law enforcement authorities in the United States and the Netherlands have seized 39 domains and associated servers used by the HeartSender phishing gang operating out of Pakistan. [...]
Source: BleepingComputer
January 31st, 2025 (5 months ago)
Description: Google said it blocked over 2.36 million policy-violating Android apps from being published to the Google Play app marketplace in 2024 and banned more than 158,000 bad developer accounts that attempted to publish such harmful apps. The tech giant also noted it prevented 1.3 million apps from getting excessive or unnecessary access to sensitive user data during the time period by working with
Source: TheHackerNews
January 31st, 2025 (5 months ago)
Description: Italy's data protection watchdog has blocked Chinese artificial intelligence (AI) firm DeepSeek's service within the country, citing a lack of information on its use of users' personal data. The development comes days after the authority, the Garante, sent a series of questions to DeepSeek, asking about its data handling practices and where it obtained its training data. In particular, it wanted
Source: TheHackerNews
January 31st, 2025 (5 months ago)
Description: Social engineering has long been an effective tactic because of how it focuses on human vulnerabilities. There’s no brute-force ‘spray and pray’ password guessing. No scouring systems for unpatched software. Instead, it simply relies on manipulating emotions such as trust, fear, and respect for authority, usually with the goal of gaining access to sensitive information or protected systems.
Source: TheHackerNews
January 31st, 2025 (5 months ago)
Description: The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a backdoor embedded in the firmware of the Contec CMS8000, a patient monitor used in U.S. healthcare facilities. The Contec CMS8000 is manufactured by Contec Medical Systems, a China-based company supplying medical devices to hospitals and clinics worldwide, including the U.S. and the … The post Contec Monitors Used in U.S. Hospitals Carry Chinese Backdoor appeared first on CyberInsider.
Source: CyberInsider
January 31st, 2025 (5 months ago)
Description: AngelSense, a company specializing in GPS tracking and assistive technology for individuals with special needs, inadvertently exposed a vast amount of sensitive user data due to an unsecured Elasticsearch database. Researchers at UpGuard discovered the data exposure on January 17, 2025, and after multiple attempts to notify the company, the database was finally secured on … The post AngelSense Exposed GPS and Personal Data of Tracked Users appeared first on CyberInsider.
Source: CyberInsider
January 31st, 2025 (5 months ago)
Source: TheRegister
January 31st, 2025 (5 months ago)
Description: Nessus Plugin ID 214835 with High Severity Synopsis The remote Fedora host is missing one or more security updates. Description The remote Fedora 41 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2025-9f92cbc27f advisory. January CPU 2025Tenable has extracted the preceding description block directly from the Fedora security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected 1:java-21-openjdk package. Read more at https://www.tenable.com/plugins/nessus/214835
Source: Tenable Plugins
January 31st, 2025 (5 months ago)