CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Red Wolf Cyber Team Targeted the Website of Acted
Source: DarkWebInformer
February 3rd, 2025 (5 months ago)
Description: miyako is Allegedly Selling Access to a Server Hosting a Firewall for a U.S. Government Missile Defense Contractor
Source: DarkWebInformer
February 3rd, 2025 (5 months ago)
Description: Sythe Allegedly Leaked Drivers Licenses Data from Florida
Source: DarkWebInformer
February 3rd, 2025 (5 months ago)
Description: By integrating security into CI/CD, applying automated policies, and supporting developers with the right processes and tools, infosec teams can increase efficiency and build secure software.
Source: Dark Reading
February 3rd, 2025 (5 months ago)
Description: 1011 Claims to be Selling Access to BetFury
Source: DarkWebInformer
February 3rd, 2025 (5 months ago)
Description: The Air Force paid a company that is doing generative AI work for the government. The Air Force won't say what it did, though.
Source: 404 Media
February 3rd, 2025 (5 months ago)
Description: As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year. Describing 2024 as "another banner year for threat actors targeting the exploitation of vulnerabilities," VulnCheck said 23.6% of known exploited vulnerabilities (KEV) were known to be weaponized either on or before
Source: TheHackerNews
February 3rd, 2025 (5 months ago)
Description: The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers to archive a project as part of efforts to improve supply chain security. "Maintainers can now archive a project to let users know that the project is not expected to receive any more updates," Facundo Tuesca, senior engineer at Trail of Bits, said. In doing so, the idea is to
Source: TheHackerNews
February 3rd, 2025 (5 months ago)
Description: Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what’s exposed and where attackers are most likely to strike. With cloud adoption dramatically increasing the ease of exposing new systems and services to the internet, prioritizing threats and managing your attack surface from an attacker’s perspective has never been more important. In this
Source: TheHackerNews
February 3rd, 2025 (5 months ago)
Description: Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote. "Once deployed, the Coyote Banking Trojan can carry out various malicious activities, including keylogging, capturing screenshots, and displaying phishing overlays to steal sensitive credentials," Fortinet FortiGuard Labs researcher Cara Lin said in an analysis published last week. The
Source: TheHackerNews
February 3rd, 2025 (5 months ago)