CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Founded in 2007. Industrial Service Solutions is headquartered in Houston, Texas. Industrial Service Solutions processes equipment across a set of industrial markets and servicing and inspections.
Source: Ransomware.live
May 25th, 2025 (27 days ago)
Description: Our team at KKP stands for competent, creative and personal solutions. We are highly motivated, client-oriented and efficient. Our lawyers are specialists in their field of expertise and work independently and reliably with a high degree of busine
Source: Ransomware.live
May 25th, 2025 (27 days ago)
Description: The Bumblebee malware SEO poisoning campaign uncovered earlier this week aimpersonating RVTools is using more typosquatting domainsi mimicking other popular open-source projects to infect devices used by IT staff. [...]
Source: BleepingComputer
May 25th, 2025 (27 days ago)
Description: Glitch has announced it is ending app hosting and user profiles on July 8, 2025, responding to changing market dynamics and extensive abuse problems that have raised operational costs. [...]
Source: BleepingComputer
May 25th, 2025 (27 days ago)
Description: TBD
Source: Ransomware.live
May 25th, 2025 (27 days ago)
Description: SAVE THIS PGP MESSAGE
Source: Ransomware.live
May 25th, 2025 (27 days ago)
Description: For The Leadership Of D**a-C**e S*****s Inc We have compromised your main server D****v.org we also took copy of all […]
Source: Ransomware.live
May 25th, 2025 (27 days ago)
Description: Windows 2024.15 - Unauthenticated Desktop Screenshot Capture
Source: ExploitDB
May 25th, 2025 (27 days ago)
Description: Microsoft Windows Server 2016 - Win32k Elevation of Privilege
Source: ExploitDB
May 25th, 2025 (27 days ago)
Description: Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. "Catena uses embedded shellcode and configuration switching logic to stage
Source: TheHackerNews
May 25th, 2025 (27 days ago)