CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: The creator of a viral "true crime" series where the murders were all invented by AI explains how he did it.
Source: 404 Media
February 13th, 2025 (5 months ago)
Description: With investment in cybersecurity capabilities and proactive measures to address emerging challenges, we can work together to navigate the complexities of combating cybercrime.
Source: Dark Reading
February 13th, 2025 (5 months ago)
Description: A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware attack a toolset previously attributed to espionage actors. [...]
Source: BleepingComputer
February 13th, 2025 (5 months ago)
Description: A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet
Source: TheHackerNews
February 13th, 2025 (5 months ago)
Description: The open-source LLM known as DeepSeek has attracted much attention in recent weeks with the release of DeepSeek V3 and DeepSeek R1, and in this blog, The Tenable Security Response Team answers some of the frequently asked questions (FAQ) about it.BackgroundThe Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding DeepSeek.FAQWhat is DeepSeek?DeepSeek typically refers to the large language model (LLM) produced by a Chinese company named DeepSeek, founded in 2023 by Liang Wenfeng.What is a large language model?A large language model, or LLM, is a machine-learning model that has been pre-trained on a large corpus of data, which enables it to respond to user inputs using natural, human-like responses.Why is there so much interest in the DeepSeek LLM?In January 2025, DeepSeek published two new LLMs: DeepSeek V3 and DeepSeek R1. The interest surrounding these models is two-fold: first, they are open-source, meaning anyone can download and run these LLMs on their local machines and, second, they were reportedly trained using less-powerful hardware, which was believed to be a breakthrough in this space as it revealed that such models could be developed at a lower cost.What are the differences between DeepSeek V3 and DeepSeek R1?DeepSeek V3 is an LLM that employs a technique called mixture-of-experts (MoE) which requires less compute power because it only loads the required “experts” to respond to a prompt. It also implemen...
Source: Tenable Blog
February 13th, 2025 (5 months ago)
Description: Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides together without sacrificing one for the other? We invite you to our upcoming webinar, "Opening the Fast Lane for Secure Deployments." This isn’t another tech talk full of buzzwords—it's a down-to-earth session that
Source: TheHackerNews
February 13th, 2025 (5 months ago)
Description: Zacks Investment Research has suffered a data breach exposing nearly 12 million user accounts, according to reports on a hacking forum. The breach, which allegedly occurred in June 2024, includes sensitive user information such as names, email addresses, physical addresses, phone numbers, usernames, IP addresses, and unsalted SHA-256 password hashes. This marks the second major … The post Zacks Investment Suffers Data Breach Impacting 12M Accounts appeared first on CyberInsider.
Source: CyberInsider
February 13th, 2025 (5 months ago)
Description: A recent attack on a South Asian software and services company suggests that a China-linked cyberespionage actor may be engaging in ransomware operations. The attacker deployed a distinct toolset typically associated with Chinese state-sponsored espionage groups but used it in conjunction with RA World ransomware, raising questions about potential moonlighting or a shift in tactics. … The post Chinese Cyberespionage by Day, Ransomware Gang by Night appeared first on CyberInsider.
Source: CyberInsider
February 13th, 2025 (5 months ago)
Description: AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security
Source: TheHackerNews
February 13th, 2025 (5 months ago)
Description: An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. "During the attack in late 2024, the attacker deployed a distinct toolset that had
Source: TheHackerNews
February 13th, 2025 (5 months ago)