Home Cyber Threat Intelligence Mobile Version
Alert Details

Broadcomm  New

Brocade ASCG contains a vulnerability that allows a remote attacker to cause a DoS. CVSSv3 score of 7.5

More...

Microsoft  New

Microsoft has updated Edge with the latest chromium fixes and one Edge-specific fix.

More...

F5  New

BIG-IP Next contains a vulnerability that allows a remote attacker to cause a DoS. CVSSv3 score of 5.3

More...

HPE  New

HPE Telco Service Activator contains several vulnerabilities. Highest CVSSv3 score of 7.5

More...

QNAP  New

QNAP has published 10 new bulletins identifying vulnerabilities in QVPN Device Client, Qsync Client, Qfinder Pro for Mac, QuLog Center, QTS, QuTS hero, File Station 5, QuRouter, Helpdesk, and HPS 3.

More...

IBM  New

IBM has published Critical bulletins for Aspera Shares, Engineering Requirements Management DOORS Next, Guardium Data Security Center, and Watson Discovery for Cloud Pak for Data. Highest CVSSv3 score of 10.

More...

Linux  New

Updates for Red Hat.

More...

NetApp  

NetApp has published 10 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 8.1

More...

Dell  

Dell has published a Critical bulletin for PowerStore Family.

More...

Linux  

Updates for Ubuntu.

More...

Alert State
Broadcomm Microsoft F5
Patch Patch New
HPE QNAP IBM
Patch Patch Patch
Click for vulnerability details
Alert State
NetApp Dell Linux
+24hr +24hr +24hr
     
     
     
Click for vulnerability details
Virus News

Troj/PDFUri-AEN   More...

Troj/PDFUri-AEB   More...

Troj/PDFUri-ADA   More...

Troj/HTMLDwn-AL   More...

Troj/DownLnk-CN   More...

JS/DwnLdr-RIC   More...

JS/DwnLdr-RGN   More...

JS/DwnLdr-RGL   More...

JS/DwnLdr-RFX   More...

Java/Adwind-OC   More...

Computer Network Defence Alert Level
Overall
Security News

SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa

More...

Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches

More...

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

More...

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

More...

Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links

More...

Why The Modern Google Workspace Needs Unified Security

More...

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

More...

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools

More...

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

More...

Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide

More...

Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactive

More...

What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey

More...

This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions

More...

U.S. Secret Service Seizes Russian Garantex Crypto Exchange Website

More...

Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

More...

PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, Telecom, and E-Commerce Sectors

More...

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

More...

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

More...

Outsmarting Cyber Threats with Attack Graphs

More...

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom

More...

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

More...

U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations

More...

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

More...

Defending against USB drive attacks with Wazuh

More...

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

More...

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

More...

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

More...

Identity: The New Cybersecurity Battleground

More...

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

More...

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

More...

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

More...

How New AI Agents Will Transform Credential Stuffing Attacks

More...

Suspected Iranian Hackers Used Compromised Indian Firm's Email to Target U.A.E. Aviation Sector

More...

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

More...

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

More...

Google's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities

More...

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail

More...

Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites

More...

U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children's Data Protection Practices

More...

Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks

More...

⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists

More...

The New Ransomware Groups Shaking Up 2025

More...

Vo1d Botnet's Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries

More...

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

More...

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

More...

RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable

More...

Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains

More...

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

More...

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

More...

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

More...

World Map
Team Cymru Malicious Activity Map
Latest Tool Versions
Burp Suite   07Mar25 2025.1.4
Kali-Linux  16Dec24 2024.4
Metasploit  06Mar25 6.4.52
Nessus  11Sep24 10.8.3
NetworkMiner  27May24 2.9
Nmap  27Feb25 7.95
Snort  04Feb25 3.7.0.0
Wireshark  24Feb25 4.4.5
Latest IDS Signatures
Cisco Sourcefire  06Mar25 03-05-004
Talos  06Mar25 2025-03-06
Proofpoint ET  07Mar25 10874
Santa Clara CA Ft Belvoir (VA) UTC/Zulu London Central Europe Kyiv Moscow Shanghai Sydney Wellington NZ