CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: After claiming responsibility for the ransomware attack in 2024, the "Embargo" ransomware group posted 1.15 terabytes of stolen data to its public Tor site.
Source: Dark Reading
February 10th, 2025 (5 months ago)
Source: Dark Reading
February 10th, 2025 (5 months ago)
Description: LazaGrad Hack Defaced the Website of Wish Future Paths
Source: DarkWebInformer
February 10th, 2025 (5 months ago)
Description: Summary This vulnerability allows a user to bypass any predefined hardcoded URL path or security anti-Localhost mechanism and perform an arbitrary GET request to any Host, Port and URL using a Webfinger Request. Details The Webfinger endpoint takes a remote domain for checking accounts as a feature, however, as per the ActivityPub spec (https://www.w3.org/TR/activitypub/#security-considerations), on the security considerations section at B.3, access to Localhost services should be prevented while running in production. The library attempts to prevent Localhost access using the following mechanism (/src/config.rs): pub(crate) async fn verify_url_valid(&self, url: &Url) -> Result<(), Error> { match url.scheme() { "https" => {} "http" => { if !self.allow_http_urls { return Err(Error::UrlVerificationError( "Http urls are only allowed in debug mode", )); } } _ => return Err(Error::UrlVerificationError("Invalid url scheme")), }; // Urls which use our local domain are not a security risk, no further verification needed if self.is_local_url(url) { return Ok(()); } if url.domain().is_none() { return Err(Error::UrlVerificationError("Url must have a domain")); } if url.domain() == Some("localhost") && !self.debug { return Err(Error::UrlVerif...
Source: Github Advisory Database (Rust)
February 10th, 2025 (5 months ago)

CVE-2025-24200

Description: Apple has patched a zero-day vulnerability affecting iPhones and iPads, which allowed attackers to disable USB Restricted Mode on locked devices. The flaw, tracked as CVE-2025-24200, has reportedly been exploited in highly targeted attacks. The fix was released in iOS 18.3.1, iPadOS 18.3.1, and iPadOS 17.7.5. Sophisticated attacks targeting iPhones The vulnerability was discovered by … The post Apple Patches Zero-Day Exploit Targeting Locked iPhones appeared first on CyberInsider.

EPSS Score: 1.04%

Source: CyberInsider
February 10th, 2025 (5 months ago)
Description: Four distributors of the encrypted communications service Sky ECC, used extensively by criminals, were arrested in Spain and the Netherlands. [...]
Source: BleepingComputer
February 10th, 2025 (5 months ago)
Description: Brave has announced a new feature in its latest desktop release (version 1.75) that allows advanced users to inject custom JavaScript scriptlets into web pages. This functionality offers users greater control over their browsing experience while maintaining strong privacy protections. Empowering users with custom scriptlets Brave has long positioned itself as a privacy-first browser, blocking … The post Brave Introduces Custom Scriptlets for Advanced Privacy Options appeared first on CyberInsider.
Source: CyberInsider
February 10th, 2025 (5 months ago)
Description: The newspaper company expects the investigation to take some time, but said in an SEC filing that it has not yet identified any material impact.
Source: Dark Reading
February 10th, 2025 (5 months ago)

CVE-2024-13209

Description: Summary Stored XSS in REDAXO 5.18.1 - Article / "content/edit". Details On the latest version of Redaxo, v5.18.1, the article name field is susceptible to stored XSS. Impact A malicious actor can easily steal cookie using this stored XSS and perform a session hijacking attack. References https://github.com/redaxo/redaxo/security/advisories/GHSA-7wj8-856p-qc9m https://nvd.nist.gov/vuln/detail/CVE-2024-13209 https://github.com/redaxo/redaxo/commit/74d7391571a29a455a0c477973bc25d25710e424 https://geochen.medium.com/redaxo-cms-5-18-1-cross-site-scripting-7c9a872c72f6 https://github.com/advisories/GHSA-7wj8-856p-qc9m

CVSS: MEDIUM (5.1)

Source: Github Advisory Database (Composer)
February 10th, 2025 (5 months ago)
Description: A Threat Actor Claims to be Selling the Data of Cin Learn
Source: DarkWebInformer
February 10th, 2025 (5 months ago)