CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: The suspects allegedly parked cars with activated dash cams near military targets and left them to record for up to 12 hours.
Source: The Record
May 28th, 2025 (17 days ago)
Description: Ukraine's SSSCIP agency said Russia has been responsible for more than 200 incidents against media outlets since the start of the war, including wiper attacks, DDoS incidents and disinformation campaigns.
Source: The Record
May 28th, 2025 (17 days ago)
Description: A cyber-espionage campaign is targeting Ukrainian government entities with a series of sophisticated spear-phishing attacks that exploit XSS vulnerabilities.
Source: Dark Reading
May 27th, 2025 (18 days ago)
Description: The mission is to gather information that could help Russia in its war against Ukraine.
Source: Dark Reading
May 27th, 2025 (18 days ago)
Description: While Ukraine remains Russia's major target for cyberattacks, TAG-110 is part of a strategy to preserve "a post-Soviet sphere of influence" by embedding itself in other countries' infrastructures.
Source: Dark Reading
May 27th, 2025 (18 days ago)
Description: A Russian court sentenced a former hospital programmer to 14 years in a high-security penal colony for allegedly leaking personal data of Russian soldiers to Ukraine, authorities said.
Source: The Record
May 27th, 2025 (18 days ago)
Description: Earlier this month, Killnet claimed it had hacked Ukraine’s drone-tracking system after disappearing from public view in 2023.
Source: The Record
May 22nd, 2025 (23 days ago)
Description: A Russian state-sponsored cyberespionage campaign attributed to APT28 (Fancy Bear/Forest Blizzard) hackers has been targeting and compromising international organizations since 2022 to disrupt aid efforts to Ukraine. [...]
Source: BleepingComputer
May 21st, 2025 (24 days ago)
Description: Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The activity has been assessed to be orchestrated by APT28 (aka BlueDelta, Fancy Bear, or Forest Blizzard), which is linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, Military Unit 26165.
Source: TheHackerNews
May 21st, 2025 (24 days ago)