CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: A Threat Actor is Selling A1project RaaS
Source: DarkWebInformer
January 29th, 2025 (5 months ago)
Description: Three vulnerabilities discovered in the open-source PHP package Voyager for managing Laravel applications could be used for remote code execution attacks. [...]
Source: BleepingComputer
January 29th, 2025 (5 months ago)
Description: Microsoft is investigating an ongoing outage preventing users and admins from accessing some Microsoft 365 services and the admin center. [...]
Source: BleepingComputer
January 29th, 2025 (5 months ago)
Description: A Threat Actor Claims to be Selling Multiple Bankruptcy Crypto Account Leads Data
Source: DarkWebInformer
January 29th, 2025 (5 months ago)
Description: Dario Amodei argues we must limit China’s access to AI chips so we can live under all powerful American-owned AI as opposed to all powerful Chinese-owned AI.
Source: 404 Media
January 29th, 2025 (5 months ago)
Description: Yet another spinoff of the infamous DDoS botnet is exploiting a known vulnerability in active attacks, while its threat actors are promoting it on Telegram for other attackers to use as well, in a DDoS-as-a-service model.
Source: Dark Reading
January 29th, 2025 (5 months ago)
Description: Cisco Talos’ Vulnerability Research team recently disclosed three vulnerabilities in Observium, three vulnerabilities in Offis, and four vulnerabilities in Whatsup Gold.   These vulnerabilities exist in Observium, a network observation and monitoring system; Offis DCMTK, a collection of libraries and applications implementing DICOM (Digital Imaging and Communications
Source: Cisco Talos Blog
January 29th, 2025 (5 months ago)
Description: A Threat is Selling Unidentified URL:Login Logs
Source: DarkWebInformer
January 29th, 2025 (5 months ago)
Description: A Threat Actor Claims to be Selling the Legion Ransomware Builder
Source: DarkWebInformer
January 29th, 2025 (5 months ago)
Description: The North Korean threat actor known as the Lazarus Group has been observed leveraging a "web-based administrative platform" to oversee its command-and-control (C2) infrastructure, giving the adversary the ability to centrally supervise all aspects of their campaigns. "Each C2 server hosted a web-based administrative platform, built with a React application and a Node.js API," SecurityScorecard's
Source: TheHackerNews
January 29th, 2025 (5 months ago)