CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: ​Microsoft is investigating a bug triggering security alerts on systems with a Trusted Platform Module (TPM) processor after enabling BitLocker. [...]
Source: BleepingComputer
January 15th, 2025 (6 months ago)
Description: Written by: Steven Karschnia, Truman Brown, Jacob Paullus, Daniel McNamara Executive Summary Due to their client-side nature, single-page applications (SPAs) will typically have multiple access control vulnerabilities By implementing a robust access control policy on supporting APIs, the risks associated with client-side rendering can be largely mitigated Using server-side rendering within the SPA can prevent unauthorized users from modifying or even viewing pages and data that they are not authorized to see Introduction Single-page applications (SPAs) are popular due to their dynamic and user-friendly interfaces, but they can also introduce security risks. The client-side rendering frequently implemented in SPAs can make them vulnerable to unauthorized access and data manipulation. This blog post will explore the vulnerabilities inherent in SPAs, including routing manipulation, hidden element exposure, and JavaScript debugging, as well as provide recommendations on how to mitigate these risks. Single-Page Applications A SPA is a web application design framework in which the application returns a single document whose content is hidden, displayed, or otherwise modified by JavaScript. This differs from the flat file application framework traditionally implemented in PHP or strictly HTML sites and from the Model-View-Controller (MVC) architecture where data, views, and server controls are handled by different portions of the application. Dynamic data in SPAs is...
Source: Google Threat Intelligence
January 15th, 2025 (6 months ago)
Description: Ultimately, there is no replacement for an intuitive, security-focused developer working with the critical thinking required to drive down the risk of both AI and human error.
Source: Dark Reading
January 15th, 2025 (6 months ago)
Description: A Threat Actor is Allegedly Selling a Solana Drainer Tool
Source: DarkWebInformer
January 15th, 2025 (6 months ago)
Description: Cl0p Ransomware Releases a List of Companies Related to the Cleo Exploit
Source: DarkWebInformer
January 15th, 2025 (6 months ago)
Source: TheRegister
January 15th, 2025 (6 months ago)
Description: Employees inside Meta threatening to quit over the recent speech policy changes; thousands of apps hijacked to steal your location data; and lots of stories around the LA fires.
Source: 404 Media
January 15th, 2025 (6 months ago)
Description: Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared with The Hacker
Source: TheHackerNews
January 15th, 2025 (6 months ago)
Description: Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.  The Wavlink AC3000 wireless router is one of the
Source: Cisco Talos Blog
January 15th, 2025 (6 months ago)
Description: A service for creating AI-generated nude images of real people is running circles around Meta’s moderation efforts.
Source: 404 Media
January 15th, 2025 (6 months ago)