CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Spain’s Interior Ministry said the suspects were responsible for stealing and leaking personal data belonging to high-ranking political figures, including Prime Minister Pedro Sánchez, President of the Congress of Deputies Francina Armengol and Catalonia’s President Salvador Illa.
Source: The Record
July 2nd, 2025 (about 14 hours ago)
Description: More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wallet credentials and sensitive data. [...]
Source: BleepingComputer
July 2nd, 2025 (about 15 hours ago)
Description: By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them.
Source: Dark Reading
July 2nd, 2025 (about 15 hours ago)
Description: Qantas Airways has confirmed a cyber incident involving unauthorized access to a third-party customer servicing platform used in one of its contact centers, resulting in the exposure of sensitive customer information. While the airline’s core systems remain unaffected, the breach could potentially impact millions of customers. The breach was discovered on Monday, June 30, when … The post Qantas Confirms Cyberattack on Call Center Exposing Customer Data appeared first on CyberInsider.
Source: CyberInsider
July 2nd, 2025 (about 15 hours ago)
Description: There are various approaches to managing vulnerabilities on cloud workloads, and knowing which vulnerability scan method to use is critical to your success. However, there isn’t a universally correct choice. How can you identify the best approach for you?While network-based, agent-based, and agentless vulnerability scans all identify vulnerabilities, there are tradeoffs, and the ideal approach depends on your specific use case, requirements and constraints. This blog explores the different methods and discusses their application to virtual machines and containerized workloads.Cloud vulnerability management overview(Tenable Cloud Security: Vulnerability management dashboard widgets)Cloud vulnerability management focuses on scanning the base operating systems, such as Linux and Windows, and other software installed on cloud instances to identify vulnerabilities. Although vulnerability management has been done for decades, your public cloud workloads may benefit from a different approach.Traditional scan methods like network scans and agent installations, such as Tenable’s Nessus Agents, may be viable options for long-lived virtual machines in some public cloud environments. However, these methods are not ideal for short-lived virtual machines and containerized workloads. It all comes down to understanding the best approach for acquiring vulnerability data for a given use case.Scanning public cloud virtual machinesYou may have public-cloud virtual machines that closely resemb...
Source: Tenable Blog
July 2nd, 2025 (about 15 hours ago)
Description: Australian airline Qantas alerted customers and authorities about a data breach at a contact center. The industry remains on edge after cyberattacks on airlines elsewhere.
Source: The Record
July 2nd, 2025 (about 15 hours ago)
Description: AT&T has launched Wireless Account Lock, a new security feature that allows customers to block unauthorized changes to their wireless accounts directly from the myAT&T app. The new feature is designed to counter common attack methods such as SIM swapping and fraudulent device purchases, offering users a simple way to assert greater control over sensitive … The post AT&T Launches ‘Wireless Account Lock’ to Protect Users from SIM Swaps appeared first on CyberInsider.
Source: CyberInsider
July 2nd, 2025 (about 16 hours ago)
Description: Cybercriminals are extorting the German humanitarian aid group Welthungerhilfe (WHH) for 20 bitcoin. The charity said it will not pay.
Source: The Record
July 2nd, 2025 (about 16 hours ago)
Source: TheRegister
July 2nd, 2025 (about 16 hours ago)

CVE-2025-46647

Description: A vulnerability of plugin openid-connect in Apache APISIX. This vulnerability will only have an impact if all of the following conditions are met: 1. Use the openid-connect plugin with introspection mode 2. The auth service connected to openid-connect provides services to multiple issuers 3. Multiple issuers share the same private key and relies only on the issuer being different If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer. This issue affects Apache APISIX: until 3.12.0. Users are recommended to upgrade to version 3.12.0 or higher.

EPSS Score: 0.02%

Source: CVE
July 2nd, 2025 (about 16 hours ago)