CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Source: TheRegister
May 22nd, 2025 (about 1 month ago)
Description: Court is in session! In this blog post, we examine the use of a legitimate Microsoft 365 application called “SigParser” identified during an identity compromise. How are OAuth apps used during identity intrusions? Find out here!
Source: Huntress Blog
May 22nd, 2025 (about 1 month ago)
Description: Police arrested 270 suspects following an international law enforcement action codenamed 'Operation RapTor' that targeted dark web vendors and customers from ten countries. [...]
Source: BleepingComputer
May 22nd, 2025 (about 1 month ago)
Description: Bronx Pro Group is a neighborhood-based firm that employs approxi mately 100 professional and support staff engaged in real estate development, construction, property management, and residential s ervices. We are going to upload about 269 GB of corporate data. Numerous e mployee personal documents (SSNs, passports, driver licenses, add resses medical documents), contracts and agreements, client infor mation, detailed financial data, etc.
Source: Ransomware.live
May 22nd, 2025 (about 1 month ago)
Description: Murphy Pearson Bradley & Feeney is an accomplished law firm specializing in trial practice, litigation and bus iness counseling. Here is the access to 182 GB of essential corporate dat a. A lot of detailed employees and clients personal inf ormation (birth/death certificates, passport, DLs and s o on), NDAs, confidentiality agreements, confidential c ourt records, financial data, etc. We have made the process of downloading company data as simple as possible for our users. All you need is any torrent client (like Vuze, Utorrent, qBittorrent or Tra nsmission to use magnet links). You will find the torre nt file above. Open uTorrent, or any another torrent client. Add torrent file or paste the magnet URL to upload the data safely. Archives have no password. MAGNET URL: magnet:?xt=urn:btih:B198F404A5B3E3B3C736A24BCD044FEFD2B DBEFC&dn=mpbf.com&tr=udp://tracker.openbittorrent.com:8 0/announce&tr=udp://tracker.opentrackr.org:1337/announc e
Source: Ransomware.live
May 22nd, 2025 (about 1 month ago)
Description: The radiological groups IMEF and RIM Maussins Nollet have joined forces to form a single medical structure that is completely independent of non-medical financial groups. Our values are those of a human radiology, based on coherent medical pr ...
Source: Ransomware.live
May 22nd, 2025 (about 1 month ago)
Description: Professional Testing Corporation (PTC) is an established global l eader in testing and assessment services. We are going to upload about 5 GB of corporate data. Employee per sonal documents, medical records, confidentiality agreements, con tracts, client information, detailed financial data, project data .
Source: Ransomware.live
May 22nd, 2025 (about 1 month ago)
Description: The Haymond Law Firm specializes in personal injury law, providin g expert legal representation for clients injured in accidents in cluding auto, motorcycle, medical malpractice, and slip and fall cases. Any many of their clients will be able to find their docum ents and photos in our blog soon. We are going to upload more than 20 GB of essential corporate doc uments such as: a lot of clients personal documents (passports, d river licenses, photos, documents with personal information inclu ding SSNs), court records, police reports, medical records, etc.
Source: Ransomware.live
May 22nd, 2025 (about 1 month ago)

CVE-2025-4575

Description: Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue.

EPSS Score: 0.03%

Source: CVE
May 22nd, 2025 (about 1 month ago)