Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Around the world, governments are setting higher-bar regulations with clear corporate accountability for breaches on the belief organizations won't drive up security maturity for operational technology unless they're made to.
Source: Dark Reading
April 18th, 2025 (about 18 hours ago)
Description: TOPPAN NEXT empowers businesses with the confidence to safeguard high-risk digital and physical information & products. But fails ... We are ready to upload more than 12GB of essential corporate docu ments such as: personal information of employees, customers data, financial data (audits, payment details, reports, credit cards d etails), contracts and agreements, corporate NDA’s, etc.
Source: Ransomware.live
April 18th, 2025 (about 18 hours ago)
Description: Tänzer GmbH offers their customers an ever-growing range of repai r services since 1990. We are ready to upload more than 13 GB of corporate documents suc h as: information about employees and customers, a bit of persona l files, financial data, projects data,etc.
Source: Ransomware.live
April 18th, 2025 (about 18 hours ago)
Description: Monaghan Group is a company that operates in the Grocery Retail industry. It employs 250to499 people and has 100MMto250M of revenue. The company is headquartered in Monaghan, Ulster, Ireland.At Monaghan, we're driven by a passion for sharing ...
Source: Ransomware.live
April 18th, 2025 (about 18 hours ago)
Description: Farmacias Del Pueblo is a company that operates in the Drug Stores & Pharmacies industry. It employs 250to499 people and has 10Mto25M of revenue. The company is headquartered in Neuquen, Neuquen Province, Argentina.
Source: Ransomware.live
April 18th, 2025 (about 18 hours ago)
Description: Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike. [...]
Source: BleepingComputer
April 18th, 2025 (about 18 hours ago)
Description: Chinese-speaking IronHusky hackers are targeting Russian and Mongolian government organizations using upgraded MysterySnail remote access trojan (RAT) malware. [...]
Source: BleepingComputer
April 18th, 2025 (about 18 hours ago)

CVE-2024-46089

Description: 74cms <=3.33 is vulnerable to remote code execution (RCE) in the background interface apiadmin.
Source: CVE
April 18th, 2025 (about 18 hours ago)
Description: Judge says tower dumps violate the 4th amendment, but will let the cops do it this one time, as a treat.
Source: 404 Media
April 18th, 2025 (about 19 hours ago)
Description: Check out NIST’s effort to further mesh its privacy and cyber frameworks. Plus, learn why code-writing GenAI tools can put developers at risk of package-confusion attacks. Also, find out what Tenable webinar attendees said about identity security. And get the latest on the MITRE CVE program and on attacks against edge routers.Dive into five things that are top of mind for the week ending April 18.1 - NIST updates Privacy Framework, tailoring it to the Cybersecurity Framework and adding an AI sectionRecognizing the data protection and cyberattack prevention overlap and are deeply intertwined, the U.S. government is aligning two foundational privacy and cybersecurity frameworks.This week, the U.S. National Institute of Standards and Technology (NIST) released a draft update of its Privacy Framework (PFW) that more closely interconnects it with the popular Cybersecurity Framework (CSF), which was updated in 2024.Although the PFW can be used on its own, this updated version makes its use with the CSF “seamless” so that organizations can leverage the two frameworks “to manage the full spectrum of privacy and cybersecurity risks,” Julie Chua, Director of NIST’s Applied Cybersecurity Division, said in a statement.Both frameworks have a “Core” section, which outlines detailed activities and outcomes aimed at helping organizations discuss risk management. “The PFW 1.1 Public Draft Core is realigned with the CSF 2.0 Core in many places, making life easier on users,” NIST said in the...
Source: Tenable Blog
April 18th, 2025 (about 19 hours ago)