Home Cyber Threat Intelligence Mobile Version
Alert Details

Google  New - Exploit

Google has updated Chrome for Desktop to fix 1 security vulnerability. Exploits exist in the wild.

More...

Inaba Denki Sangyo  New

Several vulnerabilities exist in CHOCO TEI WATCHER mini. Highest CVSSv4 score of 9.3

More...

HPE  New

Four security vulnerabilities exist in Telco Service Orchestrator software that could allow a remote attacker to cause a DoS, SSRF, and Remote Access Restriction Bypass. Highest CVSSv3 score of 9.4

More...

HPE  New

Security vulnerabilities have been identified in HPE Unified OSS Console (UOC) and HPE Unified OSS Console Assurance Monitoring (UOCAM). Highest CVSSv3 score of 4.7

More...

Broadcom  New

VMware Tanzu PostgreSQL has been updated to fix 242 vulnerabilities. Highest CVSSv3 score of 9.8

More...

Broadcom  New

VMware Tanzu Gemfire has been updated to fix 6 vulnerabilities. Highest CVSSv3 score of 10.

More...

Broadcom  New

Tanzu has been updated to fix one vulnerability caused by Apache Tomcat. CVSSv3 score of 9.8

More...

Arista  New - 0-Day

A vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. CVSSv3 score of 8.8

More...

BD  New

BD has published Critical third-party patches for Alaris.

More...

Linux  New

Updates for Red Hat.

More...

Kubernetes  

ingress-nginx has been updated to fix several critical vulnerabilities that have been publicly disclosed. Highest CVSSv3 score of 9.8

More...

Hitachi Energy  

Hitachi has published 3 new bulletins with updates for RTU500, MicroSCADA Pro/X SYS600, and TRMTracker. Highest CVSSv3 score of 9.9

More...

HPE  

Security vulnerabilities have been identified in the HPE B-Series SANnav Management Portal. Highest CVSSv3 score of 8.0

More...

F5  

Vulnerabilities in NET-SNMP affects BIG-IQ Centralized Management. CVSSv3 score of 6.5

More...

NetApp  

NetApp has published 10 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 9.8

More...

IBM  

IBM has published Critical bulletins for Planning Analytics Workspace, ApplinX, and Concert Software.

More...

Linux  

Updates for Red Hat and Mageia.

More...

Next.js  

Next.js has been released to address a security vulnerability. It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. CVSSv3 score of 9.1

More...

Alert State
Google InabaDenki HPE
Exploit New Patch
Broadcom Arista BD
Patch 0-Day Patch
Click for vulnerability details
Alert State
Kubernetes Hitachi HPE
+24hr +24hr +24hr
F5 NetApp IBM
+24hr +24hr +24hr
Click for vulnerability details
Virus News

VBS/DwnLdr-SJF   More...

Troj/Phish-PI   More...

Troj/Phish-AAQ   More...

Troj/Phish-AAC   More...

Troj/PDFUri-AUT   More...

Troj/DocDl-IOB   More...

JS/DwnLdr-SKE   More...

JS/DwnLdr-SKC   More...

JS/DwnLdr-SJW   More...

JS/DwnLdr-SIM   More...

Computer Network Defence Alert Level
Overall
Security News

New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations

More...

EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware

More...

RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

More...

Malicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacks

More...

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

More...

Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks

More...

How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More

More...

Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms

More...

New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround

More...

Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker

More...

Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years

More...

AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface

More...

Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps

More...

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust

More...

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

More...

Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks

More...

VanHelsing RaaS Launch: 3 Victims, $5K Entry Fee, Multi-OS, and Double Extortion Tactics

More...

⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More

More...

VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware

More...

How to Balance Password Security Against User Experience

More...

Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks

More...

Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed

More...

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

More...

UAT-5918 Targets Taiwan's Critical Infrastructure Using Web Shells and Open-Source Tools

More...

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

More...

China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families

More...

10 Critical Network Pentest Findings IT Teams Overlook

More...

Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers

More...

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility

More...

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

More...

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems

More...

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

More...

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data

More...

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

More...

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation

More...

CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages

More...

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

More...

Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia

More...

Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen

More...

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

More...

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

More...

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

More...

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise

More...

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

More...

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

More...

Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security

More...

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

More...

How to Improve Okta Security in Four Steps

More...

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

More...

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

More...

World Map
Team Cymru Malicious Activity Map
Latest Tool Versions
Burp Suite   18Mar25 2025.1.5
Kali-Linux  19Mar25 2025.1a
Metasploit  20Mar25 6.4.54
Nessus  11Sep24 10.8.3
NetworkMiner  27May24 2.9
Nmap  12Mar25 7.95
Snort  12Mar25 3.7.1.0
Wireshark  24Feb25 4.4.5
Latest IDS Signatures
Cisco Sourcefire  25Mar25 03-25-001
Talos  25Mar25 2025-03-25
Proofpoint ET  25Mar25 10890
Santa Clara CA Ft Belvoir (VA) UTC/Zulu London Central Europe Kyiv Moscow Shanghai Sydney Wellington NZ