CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: “CDC’s website is being modified to comply with President Trump’s Executive Orders.“
Source: 404 Media
February 1st, 2025 (5 months ago)
Description: 0mid16B Claims to have Leaked the Data of Cardinal Health
Source: DarkWebInformer
February 1st, 2025 (5 months ago)
Description: A Threat Actor Claims to be Selling Data of Spanish Hospital in Mexico
Source: DarkWebInformer
February 1st, 2025 (5 months ago)
Description: A Threat Actor Claims to have Leaked the Data of Colis Express S.A.
Source: DarkWebInformer
February 1st, 2025 (5 months ago)
Description: A Threat Actor Claims to have Leaked Data of Telkomsel
Source: DarkWebInformer
February 1st, 2025 (5 months ago)
Description: Multiple state-sponsored groups are experimenting with the AI-powered Gemini assistant from Google to increase productivity and to conduct research on potential infrastructure for attacks or for reconnaissance on targets. [...]
Source: BleepingComputer
February 1st, 2025 (5 months ago)
Description: “It’s simply just a non-woke version, offering employers an alternative approach to diversity and inclusion.”
Source: 404 Media
February 1st, 2025 (5 months ago)
Description: Just how radioactive was that Saharan dust cloud that engulfed Europe in 2022?
Source: 404 Media
February 1st, 2025 (5 months ago)
Description: U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers as part of efforts to disrupt a network of online marketplaces originating from Pakistan. The action, which took place on January 29, 2025, has been codenamed Operation Heart Blocker. The vast array of sites in question peddled phishing toolkits and fraud-enabling tools and
Source: TheHackerNews
February 1st, 2025 (5 months ago)

CVE-2025-0638

Description: Nessus Plugin ID 214859 with High Severity Synopsis The remote Fedora host is missing one or more security updates. Description The remote Fedora 41 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2025-bbabead4d7 advisory. ## New * ASPA support is now always compiled in and available if `enable-aspa` is set. The `aspa` Cargo feature has been removed. ([#990]) * If merging mutliple ASPA objects for a single customer ASN results in more than 16,380 provider ASNs, the ASPA is dropped. (Note that ASPA objects with more than 16,380 provider ASNs are already rejected during parsing.) ([#996]) * New `archive-stats` command that shows some statistics of an RRDP archive. ([#982]) * Re-enabled the use of GZIP compression in HTTP request sent by the RRDP collector. Measures to deal with exploding data have been implemented in [rpki-rs#319]. ([#997]) ## Bug fixes * Fixed an issue with checking the file names in manifests that let to a crash when non-ASCII characters are used. ([rpki-rs#320], reported by Haya Schulmann and Niklas Vogel of Goethe University Frankfurt/ATHENE Center and assigned [CVE-2025-0638]) * The validation HTTP endpoints now accept prefixes with non-zero host bits. ([#987]) * Removed duplicate `rtr_client_reset_queries` in HTTP metrics. ([#992] by [@sleinen]) * Improved disk space consumption of the new RRDP archives by re-using empty spa...

EPSS Score: 0.04%

Source: Tenable Plugins
February 1st, 2025 (5 months ago)