Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Car rental giant Hertz Corporation warns it suffered a data breach after customer data for its Hertz, Thrifty, and Dollar brands was stolen in the Cleo zero-day data theft attacks. [...]
Source: BleepingComputer
April 14th, 2025 (about 7 hours ago)
Description: A vulnerability within the online application platform for insurance policies likely resulted in the breach of customer details.
Source: The Record
April 14th, 2025 (about 10 hours ago)
Description: Alleged Data Breach of MN & Asociados S.A
Source: DarkWebInformer
April 14th, 2025 (about 16 hours ago)
Description: Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we feature the first Exposure Management Academy FAQ. We’ll run these FAQs from time to time to share some of the most common questions we receive about exposure management. You can read the entire Exposure Management Academy series here.By Team TenableHere at the Exposure Management Academy, we get questions all the time. So we’re inaugurating an occasional FAQ series this week with an up-close look at exposure management itself, the role of AI in exposure management and how cyber exposure management and cloud security work together. In future FAQs, we’ll cover a range of topics. Stay tuned. What is exposure management?It’s the essential question that always comes first: Just what is exposure management? In our first Exposure Management Academy post we covered what exposure management is and why it matters in depth. But for this FAQ, we’ll keep it short. Exposure management gives teams visibility and context across the modern attack surface so they can separate the actual exposures that can have a material impact on the business from all the noise. This means that your team can minimize churn and help prevent breaches by closing the exposures (or toxic risk combinations) attackers exploit before attacks get underway.As the natural evolution of vulnerability management, exposure management ext...
Source: Tenable Blog
April 14th, 2025 (about 18 hours ago)
Description: In March 2025, data from Samsung Germany was compromised in a data breach of their logistics provider, Spectos. Allegedly due to credentials being obtained by malware running on a Spectos employee's machine, the breach included 216k unique email addresses along with names, physical addresses, items purchased from Samsung Germany and related support tickets and shipping tracking numbers.
Source: HaveIBeenPwnedLatestBreaches
April 13th, 2025 (2 days ago)
Description: Alleged Data Breach of Services Industriels de Genève
Source: DarkWebInformer
April 11th, 2025 (3 days ago)
Description: The country's national social security agency said the cyberattack resulted in the leak of sensitive personal data reportedly belonging to millions of citizens.
Source: The Record
April 11th, 2025 (4 days ago)
Description: Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. "A threat actor used a known

CVSS: CRITICAL (9.8)

Source: TheHackerNews
April 11th, 2025 (4 days ago)
Description: The most damaging attacks continue to be ransomware, but financial fraud claims are more numerous — and both are driven by increasing third-party breaches.
Source: Dark Reading
April 11th, 2025 (4 days ago)
Description: Western Sydney University (WSU) announced two security incidents that exposed personal information belonging to members of its community. [...]
Source: BleepingComputer
April 11th, 2025 (4 days ago)