Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Car rental giant Hertz Corporation warns it suffered a data breach after customer data for its Hertz, Thrifty, and Dollar brands was stolen in the Cleo zero-day data theft attacks. [...]
Source: BleepingComputer
April 14th, 2025 (about 2 months ago)
Description: A vulnerability within the online application platform for insurance policies likely resulted in the breach of customer details.
Source: The Record
April 14th, 2025 (about 2 months ago)
Description: Alleged Data Breach of MN & Asociados S.A
Source: DarkWebInformer
April 14th, 2025 (about 2 months ago)
Description: Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we feature the first Exposure Management Academy FAQ. We’ll run these FAQs from time to time to share some of the most common questions we receive about exposure management. You can read the entire Exposure Management Academy series here.By Team TenableHere at the Exposure Management Academy, we get questions all the time. So we’re inaugurating an occasional FAQ series this week with an up-close look at exposure management itself, the role of AI in exposure management and how cyber exposure management and cloud security work together. In future FAQs, we’ll cover a range of topics. Stay tuned. What is exposure management?It’s the essential question that always comes first: Just what is exposure management? In our first Exposure Management Academy post we covered what exposure management is and why it matters in depth. But for this FAQ, we’ll keep it short. Exposure management gives teams visibility and context across the modern attack surface so they can separate the actual exposures that can have a material impact on the business from all the noise. This means that your team can minimize churn and help prevent breaches by closing the exposures (or toxic risk combinations) attackers exploit before attacks get underway.As the natural evolution of vulnerability management, exposure management ext...
Source: Tenable Blog
April 14th, 2025 (about 2 months ago)
Description: In March 2025, data from Samsung Germany was compromised in a data breach of their logistics provider, Spectos. Allegedly due to credentials being obtained by malware running on a Spectos employee's machine, the breach included 216k unique email addresses along with names, physical addresses, items purchased from Samsung Germany and related support tickets and shipping tracking numbers.
Source: HaveIBeenPwnedLatestBreaches
April 13th, 2025 (about 2 months ago)
Description: Alleged Data Breach of Services Industriels de Genève
Source: DarkWebInformer
April 11th, 2025 (about 2 months ago)
Description: The country's national social security agency said the cyberattack resulted in the leak of sensitive personal data reportedly belonging to millions of citizens.
Source: The Record
April 11th, 2025 (about 2 months ago)
Description: The most damaging attacks continue to be ransomware, but financial fraud claims are more numerous — and both are driven by increasing third-party breaches.
Source: Dark Reading
April 11th, 2025 (about 2 months ago)
Description: Western Sydney University (WSU) announced two security incidents that exposed personal information belonging to members of its community. [...]
Source: BleepingComputer
April 11th, 2025 (about 2 months ago)
Description: The breach affecting Laboratory Services Cooperative involves sensitive information about medical care, as well as bank account details.
Source: The Record
April 11th, 2025 (about 2 months ago)