CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: A Threat Actor is Allegedly Selling a Solana Drainer Tool
Source: DarkWebInformer
January 15th, 2025 (6 months ago)
Description: Cl0p Ransomware Releases a List of Companies Related to the Cleo Exploit
Source: DarkWebInformer
January 15th, 2025 (6 months ago)
Source: TheRegister
January 15th, 2025 (6 months ago)
Description: Employees inside Meta threatening to quit over the recent speech policy changes; thousands of apps hijacked to steal your location data; and lots of stories around the LA fires.
Source: 404 Media
January 15th, 2025 (6 months ago)
Description: Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared with The Hacker
Source: TheHackerNews
January 15th, 2025 (6 months ago)
Description: Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.  The Wavlink AC3000 wireless router is one of the
Source: Cisco Talos Blog
January 15th, 2025 (6 months ago)
Description: A service for creating AI-generated nude images of real people is running circles around Meta’s moderation efforts.
Source: 404 Media
January 15th, 2025 (6 months ago)
Description: Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn’t just ineffective—it’s high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems (ICS) and Operational Technology (OT) security distinctly stand out from traditional IT security. ICS/OT
Source: TheHackerNews
January 15th, 2025 (6 months ago)
Description: As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. "Attackers can take control of a malicious server and read/write arbitrary files of any connected client," the CERT Coordination Center (CERT/CC) said in an advisory. "Sensitive data, such as SSH keys,
Source: TheHackerNews
January 15th, 2025 (6 months ago)
Description: ExpressVPN has integrated ML-KEM, the newly established NIST standard for post-quantum encryption, into its proprietary Lightway VPN protocol. This move solidifies ExpressVPN’s commitment to future-proofing user data against the risks posed by quantum computers, which could render traditional encryption methods obsolete. The transition to ML-KEM follows the release of NIST’s first quantum-resistant encryption standards in … The post ExpressVPN Adopts NIST-Approved Post-Quantum Encryption appeared first on CyberInsider.
Source: CyberInsider
January 15th, 2025 (6 months ago)