CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: A Brazilian team used Discord’s API to scrape 10% of its open servers.
Source: 404 Media
May 21st, 2025 (about 1 month ago)
Description: The JDC Air & Sea Freight is part of the HEUEL LOGISTICS Group. A s an international freight forwarder, the company has its focus o n air and sea cargo, as well as contract logistics. We are going to upload about 20 GB of corporate data. Employee pe rsonal information, lots of agreements and contracts, client info rmation, detailed financial data.
Source: Ransomware.live
May 21st, 2025 (about 1 month ago)
Description: The European Union has imposed strict sanctions against web-hosting provider Stark Industries and the two individuals running it, CEO Iurie Neculiti and owner Ivan Neculiti, for enabling "destabilising activities" against the Union. [...]
Source: BleepingComputer
May 21st, 2025 (about 1 month ago)
Description: Today, CISA, the National Security Agency, the Federal Bureau of Investigation, and other U.S. and international partners released a joint Cybersecurity Advisory, Russian GRU Targeting Western Logistics Entities and Technology Companies.   This advisory details a Russian state-sponsored cyber espionage-oriented campaign targeting technology companies and logistics entities, including those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, military unit 26165 cyber actors are using a mix of previously disclosed tactics, techniques, and procedures (TTPs) and are likely connected to these actors’ widescale targeting of IP cameras in Ukraine and bordering NATO nations. Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of until 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise, and posture network defenses with a presumption of targeting. For more information on Russian state-sponsored threat actor activity, see CISA’s Russia Cyber Threat Overview and Advisories page. 
Source: All CISA Advisories
May 21st, 2025 (about 1 month ago)
Source: TheRegister
May 21st, 2025 (about 1 month ago)

CVE-2025-48416

Description: An OpenSSH daemon listens on TCP port 22. There is a hard-coded entry in the "/etc/shadow" file in the firmware image for the "root" user. However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.

EPSS Score: 0.06%

Source: CVE
May 21st, 2025 (about 1 month ago)
Description: Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to new findings from Kaspersky. "The campaign aimed at Russian business began back in March 2023, but in the first third of 2025 the number of attacks quadrupled compared to the same period in 2024," the cybersecurity vendor said. The attack chains, which have not been
Source: TheHackerNews
May 21st, 2025 (about 1 month ago)
Description: A consumer watchdog said Tuesday that one of the country’s largest grocery chains allegedly used data collected from loyalty shoppers to build often incorrect secret profiles of them and sell their information to other companies.
Source: The Record
May 21st, 2025 (about 1 month ago)
Description: How the Chicago Sun-Times printed an AI-generated summer guide; how schools were not prepared for ChatGPT; and those funny little guys from Star Wars.
Source: 404 Media
May 21st, 2025 (about 1 month ago)
Description: In this fourth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we turn our attention to securing cloud data, a complex endeavor as data grows exponentially and threats become more sophisticated. Check out five DSPM best practices to sharpen your cloud data security and compliance.As the volume of data stored and processed in your cloud environments grows, so does the complexity of protecting it from cyber thieves and of complying with strict regulations.While on-premises data centers offer a more controlled environment, data generated in the cloud can be less structured and is often stored in a more diverse array of repositories, increasing the risk that it will be improperly secured.As GigaOm Analyst Paul Stringfellow tells us, cloud repositories are often deployed outside of normal controls due to their ease of use and their perceived low cost.“Often, they are used for specific tasks and then discarded and forgotten by original project owners,” he writes. “This leads to shadow data repositories that exist outside of established data storage and security controls.”The solution? Data security posture management (DSPM) systems, which offer unified visibility of all your cloud data — even if your organization uses multiple cloud service providers (CSPs) — along with other data protection capabilities.“A key element of data resilience is understanding where sensitive data stores are located and what is inside them. You can't secure something you don't ...
Source: Tenable Blog
May 21st, 2025 (about 1 month ago)