CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Republican Senator Mike Lee introduced Interstate Obscenity Definition Act (again) last week, which would criminalize porn at the federal level.
Source: 404 Media
May 12th, 2025 (about 2 months ago)
Description: Following up on last year’s LOLDriver plugin, Tenable Research is releasing detection plugins for the top Remote Monitoring and Management (RMM) tools that attackers have been more frequently leveraging in victim environments.BackgroundIn August 2024, Tenable Research released a detection plugin for Nessus, Tenable Security Center and Tenable Vulnerability Management to help customers identify risky third-party Windows drivers utilized by attackers for privilege escalation on victim hosts. As part of our continued research into living off the land (LOTL) tooling utilized by attackers, we’re releasing new detection plugins for popular Remote Monitoring and Management (RMM) applications.Increased risk from RMM toolsIT operations and information security staff often need to remotely connect to machines dozens, perhaps even hundreds, of times per day to troubleshoot a problem or make a system function well. An administrator or support technician must reach a terminal on a server in a datacenter a continent away, or a user’s workstation in their home. As the role of the remote worker has dramatically expanded across organizations over the last 20 years, it has led to the introduction of RMM products in enterprise environments.The architecture of these products is fairly straightforward: a listener on the user’s machine, often referred to as an agent, host, or server, and an application to connect to, and control, the machine, often referred to as a viewer or client. In many cas...
Source: Tenable Blog
May 12th, 2025 (about 2 months ago)
Description: New research shows China is quickly catching up with the US in AI innovation. Experts weigh in on what it means for cyber defenders.
Source: Dark Reading
May 12th, 2025 (about 2 months ago)
Description: 99% of enterprise users have browser extensions but over half carry high-risk permissions. LayerX's 2025 report reveals how everyday extensions expose sensitive data, and what security teams must do now. [...]
Source: BleepingComputer
May 12th, 2025 (about 2 months ago)
Description: Agentic-native startups threaten to reduce the zero-day problem to just a zero-hour issue. Of course, AI agents will accelerate offensive attacks as well.
Source: Dark Reading
May 12th, 2025 (about 2 months ago)
Description: Republicans try to use the Budget Reconciliation bill to stop states from regulating AI entirely for 10 years.
Source: 404 Media
May 12th, 2025 (about 2 months ago)
Description: A new Coke ad proudly features a quote from a J.G. Ballard book, only he didn’t write the words and it’s not his book.
Source: 404 Media
May 12th, 2025 (about 2 months ago)
Description: An airline involved in deportation flights on behalf of the Trump administration confirmed reports of a cybersecurity incident with the SEC on Friday.
Source: The Record
May 12th, 2025 (about 2 months ago)
Description: Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, the second of two parts, we look closely at six ways exposure management can help you tame security tool sprawl. You can read part one here and the entire Exposure Management Academy series here.If you’re managing cyber risk, you know there’s one fundamental question you have to answer: Where are we most exposed? On the surface, that might seem like a simple ask. Are you at risk or not? Like many things, in practice it’s a bit tougher to answer — even though you installed all those security tools to keep your organization safe. But those tools might be a big part of the problem. Most enterprises now struggle with taming all the tools and corralling the data they produce. So getting a clear, consistent and comprehensive answer can be a real challenge. Enter exposure management, which gives you the processes and technologies you need to continuously assess the accessibility, exploitability and criticality of digital assets across all systems, applications, devices, resources and identities. As a result, it helps you tame security tool sprawl and works to bind all of that fragmented data together to provide a unified view. Rather than scrambling madly to find the right data when you get a question from your executive team or board, you’ll be able to answer them easily. Last week, we shared how ex...
Source: Tenable Blog
May 12th, 2025 (about 2 months ago)
Description: A 45-year-old man arrested in Moldova is charged with a string of cybercrimes against Dutch entities in 2021.
Source: The Record
May 12th, 2025 (about 2 months ago)