CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: A Threat Actor Claims to have Leaked the Data of Connext
Source: DarkWebInformer
January 24th, 2025 (5 months ago)
Description: The Clop ransomware gang has claimed responsibility for the November cyberattack against Blue Yonder, a major supply chain management software provider. In an update on their dark web leak site, Clop listed Blue Yonder among several new victims of their ongoing “Cleo campaign,” which involved the exploitation of vulnerabilities in Cleo's managed file transfer (MFT) … The post Clop Ransomware Claimed November Attack at Blue Yonder appeared first on CyberInsider.
Source: CyberInsider
January 24th, 2025 (5 months ago)
Description: A Threat Actor Claims to have Leaked the Data of University of Indonesia
Source: DarkWebInformer
January 24th, 2025 (5 months ago)
Description: A Threat Actor Allegedly Leaked the Data of Universitas Ciputra Jakarta
Source: DarkWebInformer
January 24th, 2025 (5 months ago)
Description: Security Information and Event Management (SIEM) systems are now a critical component of enterprise security. Learn more from Smarttech247 about how its VisionX + Splunk solution can help secure your organization. [...]
Source: BleepingComputer
January 24th, 2025 (5 months ago)
Description: Microsoft says outdated Exchange servers cannot receive new emergency mitigation definitions because an Office Configuration Service certificate type is being deprecated. [...]
Source: BleepingComputer
January 24th, 2025 (5 months ago)

CVE-2025-23006

Description: SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.

EPSS Score: 1.37%

Source: CISA KEV
January 24th, 2025 (5 months ago)
Source: TheRegister
January 24th, 2025 (5 months ago)
Description: For the first time in a long while, the federal government and the software sector alike finally have the tools and resources needed to do security well — consistently and cost-effectively.
Source: Dark Reading
January 24th, 2025 (5 months ago)
Description: Hidden text salting is a simple yet effective technique for bypassing email parsers, confusing spam filters, and evading detection engines that rely on keywords. Cisco Talos observed an increase in the number of email threats leveraging hidden text salting.
Source: Cisco Talos Blog
January 24th, 2025 (5 months ago)