CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Source: TheRegister
January 21st, 2025 (5 months ago)
Description: A Threat Actor Claims to have Leaked the Data of Profil Search
Source: DarkWebInformer
January 21st, 2025 (5 months ago)
Description: ​Microsoft has announced that Game Assist, its recently unveiled in-game browser, is now also available in preview for Microsoft Edge Stable users. [...]
Source: BleepingComputer
January 21st, 2025 (5 months ago)
Description: Two separate campaigns are targeting flaws in various IoT devices globally, with the goal of compromising them and propagating malware worldwide.
Source: Dark Reading
January 21st, 2025 (5 months ago)
Description: A Threat Actor is Selling a Rust Reverse Shell RAT for $30,000 USD
Source: DarkWebInformer
January 21st, 2025 (5 months ago)
Description: The TikTok ban and Donald Trump's rise to power show how fragile our social media accounts are. We must normalize and invest in decentralized social media.
Source: 404 Media
January 21st, 2025 (5 months ago)
Description: Different Types of Network Attacks
Source: DarkWebInformer
January 21st, 2025 (5 months ago)
Description: Bitbucket is investigating a massive outage affecting Atlassian Bitbucket Cloud customers worldwide, with the company saying its cloud services are "hard down." [...]
Source: BleepingComputer
January 21st, 2025 (5 months ago)
Description: Written by: Joshua Goddard The Rise of Crypto Heists and the Challenges in Preventing Them Cryptocurrency crime encompasses a wide range of illegal activities, from theft and hacking to fraud, money laundering, and even terrorist financing, all exploiting the unique characteristics of digital currencies. Cryptocurrency heists, specifically, refer to the large-scale theft of cryptocurrencies or digital assets through unauthorized access, exploitation, or deception. Cryptocurrency heists are on the rise due to the lucrative nature of their rewards, the challenges associated with attribution to malicious actors, and the opportunities presented by nascent familiarity with cryptocurrency and Web3 technologies among many organizations. Cofense highlighted that phishing activity targeting Web3 platforms increased by 482% in 2022, Chainalysis reported that $24.2 billion USD was received by illicit addresses in 2023, and Immunefi reported that in Q2 2024, compromises of Web3 organizations resulted in losses of approximately $572 million USD. When threat actors gain access to cryptocurrency organizations, the potential for rapid, high-value financial losses due to unauthorized access is significantly elevated. A single malicious command executed on a vulnerable system can lead to the theft of millions of dollars worth of assets. This starkly contrasts with traditional organizations, where achieving financial gain or extracting value from stolen data often requires prolonged social ...
Source: Google Threat Intelligence
January 21st, 2025 (5 months ago)
Description: A security investigation has revealed that Xiaohongshu, also known as RedNote, a social media platform similar to TikTok, transmits user data in plaintext, exposing users' viewing and search histories to potential eavesdroppers. The flaw, discovered by security researchers at Corrata, highlights ongoing concerns about data security on Chinese-owned digital platforms, particularly as American users seek … The post TikTok Alternative ‘RedNote’ Is Leaking User Data in Plaintext appeared first on CyberInsider.
Source: CyberInsider
January 21st, 2025 (5 months ago)