CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: GoSearch: A Powerful OSINT Tool for Tracking Digital Footprints and Leaked Passwords Across Social Networks
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: HIMARS DDOS Targeted the Website of GTO
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: Ddarknotevil Claims to have Leaked the Data of Huila Chamber of Commerce
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: State Child Protection Society Has Been Claimed a Victim to Funksec Ransomware
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: A Threat Actor Claims to be Selling the Data of ASISA
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: A Threat Actor Claims to have Leaked the Data of an Unidentified Maritime Industry Company in the US
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: A Threat Actor Claims to be Selling the Data of Carruth Compliance Consulting, Inc
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: IntelBroker and EnergyWeaponUser Allegedly Leaked the Source Code of Ministry of Environment
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: A Threat Actor is Allegedly Selling Access to an Unidentified Canadian Retail Corp
Source: DarkWebInformer
January 1st, 2025 (6 months ago)
Description: Threat hunters have disclosed a new "widespread timing-based vulnerability class" that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. "Instead of relying on a single click, it takes advantage of a double-click sequence," Yibelo said.
Source: TheHackerNews
January 1st, 2025 (6 months ago)