![U.S. Department of Homeland Security Seal. United States Computer Emergency Readiness Team US-CERT](/congress115th/20190108215014im_/https://www.us-cert.gov/sites/default/files/images/NCCIC_logo.jpg)
Alerts
Alerts provide timely information about current security issues, vulnerabilities, and exploits. Sign up to receive these technical alerts in your inbox or subscribe to our RSS feed.
- AA18-337A : SamSam Ransomware
- TA18-331A : 3ve – Major Online Ad Fraud Operation
- AA18-284A : Publicly Available Tools Seen in Cyber Incidents Worldwide
- TA18-276B : Advanced Persistent Threat Activity Exploiting Managed Service Providers
- TA18-276A : Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
- TA18-275A : HIDDEN COBRA – FASTCash Campaign
- TA18-201A : Emotet Malware
- TA18-149A : HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm
- TA18-145A : Cyber Actors Target Home and Office Routers and Networked Devices Worldwide
- TA18-141A : Side-Channel Vulnerability Variants 3a and 4
- TA18-106A : Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices
- TA18-086A : Brute Force Attacks Conducted by Cyber Actors
- TA18-074A : Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors
- TA18-004A : Meltdown and Spectre Side-Channel Vulnerability Guidance
- TA17-318B : HIDDEN COBRA – North Korean Trojan: Volgmer
- TA17-318A : HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL
- TA17-293A : Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors
- TA17-181A : Petya Ransomware
- TA17-164A : HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure
- TA17-163A : CrashOverride Malware
- TA17-156A : Reducing the Risk of SNMP Abuse
- TA17-132A : Indicators Associated With WannaCry Ransomware
- TA17-117A : Intrusions Affecting Multiple Victims Across Multiple Sectors
- TA17-075A : HTTPS Interception Weakens TLS Security
- TA16-336A : Avalanche (crimeware-as-a-service infrastructure)
- TA16-288A : Heightened DDoS Threat Posed by Mirai and Other Botnets
- TA16-250A : The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
- TA16-187A : Symantec and Norton Security Products Contain Critical Vulnerabilities
- TA16-144A : WPAD Name Collision Vulnerability
- TA16-132A : Exploitation of SAP Business Applications