CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: The addition is an important hire for the No. 2 position at the cyber agency. The main director role remains unfilled post-Easterly, with Bridget Bean taking over acting duties for now.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: A cyber-espionage campaign is targeting Ukrainian government entities with a series of sophisticated spear-phishing attacks that exploit XSS vulnerabilities.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and combines them.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: Organizations that stay ahead of attacks won't be the most compliant ones — they'll be the ones most honest about what actually works.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other reputable organizations worldwide to redirect users to malicious sites.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: An employee inadvertently downloaded a malicious version of the legitimate RVTools utility, which launched an investigation into an attempted supply chain attack aimed at delivering the recently revived initial-access loader.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: Regeneron's planned acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: Tenable One now pulls in data from AWS, Microsoft, and competitors to provide a holistic security view of an organization's attack surface.
Source: Dark Reading
May 27th, 2025 (23 days ago)
Description: A hacker exploiting the security flaw in the mobile provider's network could have potentially located a call recipient with accuracy of up to 100 square meters.
Source: Dark Reading
May 27th, 2025 (23 days ago)