Threat Landscape

Feb 23 — May 11 (weekly, 26-week baseline) · Last updated: 2026-05-18 16:00 UTC
Breaking Zero-day exploit YellowKey bypasses BitLocker encryption on Windows 11 and Server 2022/2025 — 4 articles in the last 48h
Happening Now 10 actively exploited vulnerabilities · CVE-2026-20182, CVE-2026-20133, CVE-2026-20128 +7 more
Top Story
Rising Indirect Prompt Injection Threats Target Enterprise AI Agents
Over the past two weeks, cybersecurity reports have highlighted a growing threat to enterprise AI systems: indirect prompt injection attacks. These attacks involve embedding malicious instructions in external content (e.g., emails, documents, or web pages), which AI agents execute with user privileges, often leading to data exfiltration or unauthorized actions. Threat actors, including those leveraging AI-powered tradecraft, are increasingly operationalizing these techniques, with a 32% rise in malicious prompt injection attempts observed between late 2025 and early 2026. Affected systems include AI agents, large language models (LLMs), and Kubernetes-based AI workloads, which suffer from visibility gaps in traditional security tools. Organizations are urged to adopt frameworks like AI TRiSM and MITRE ATLAS, implement least-privilege controls, and extend existing security patterns (e.g., sandboxing, egress restriction) to mitigate risks.
"Prompt Injection" up 2.8x (8 → 22)"Zero Trust" up 7.0x (2 → 14)"Threat Detection" up 4.5x (4 → 18)
Articles (6 most recent) Mitigating Indirect Prompt Injection Risks in Enterprise AI Agents: A Tactical Framework f Agentic Governance: Securing Autonomous AI Systems Within the Trust Boundary Securing LLM Sandboxes: A Guide to Domain Allowlisting for Data Exfiltration Prevention Adversarial AI: Defending Deployed Systems and Countering AI-Enabled Threat Actor Tradecra Mitigating Indirect Prompt Injection Risks in Enterprise AI Agents: A Tactical Framework f Emerging Threats in AI: Addressing Prompt Injection and the Visibility Gap in Kubernetes-B
Previous highlights (4)
Showing up to 4 most recent biweekly periods
77 articles
Critical Privilege Escalation Flaws and AI Security Gaps Emerge in Major Platforms
Over the past two weeks, multiple critical vulnerabilities have been disclosed across major operating systems and AI-driven platforms, exposing significant security risks. Researchers uncovered high-severity local privilege escalation (LPE) flaws in the Linux kernel (CVE-2026-31431, 'Copy Fail'), FreeBSD (CVE-2026-7270), and Windows RPC (PhantomRPC), enabling attackers to gain root or SYSTEM privileges. These vulnerabilities, some present for nearly a decade, highlight systemic risks in core system functions and architectural weaknesses. Concurrently, security gaps in Microsoft Copilot (CVE-2026-24299) and the broader impact of LLMs on reverse engineering defensive tools underscore the erosion of 'security through obscurity' and the urgent need for robust AI security frameworks. The disclosures emphasize the criticality of timely patching, least privilege principles, and defense-in-depth strategies to mitigate risks of container breakouts, multi-tenant host compromises, and persistent AI-driven attacks.
"Exploit Techniques" up 2.1x (18 → 37)"Prompt Injection" up 2.8x (8 → 22)"Zero-Day Vulnerabilities" up 2.1x (9 → 19)
Articles (6 most recent) Persistent Exploitation in Microsoft Copilot: Uncovering CVE-2026-24299 and the Copirate A Persistent Exploitation of CVE-2017-9841: A Decade-Old PHPUnit RCE Vulnerability Still Und April 2026 High-Impact Vulnerabilities: A Surge in Exploited CVEs and Emerging Threat Acto The Visibility Gap in AI Agent Security: Why MCP Servers Need Structured Audit Logging The Efficiency Trap: How Centralized SD-WAN Controllers Concentrate Risk and Attract Attac Quantifying Supply Chain Risks in MCP Servers: From Theory to Real-World Compromises
48 articles
AI and State Actors Accelerate Cyber Threats Amid Unpatched Systemic Flaws
Over the past two weeks, a surge in cybersecurity developments has highlighted the dual-edged role of AI in both offensive and defensive operations. Anthropic's Mythos AI demonstrated autonomous zero-day exploitation across major platforms, raising concerns about AI-driven phishing and reconnaissance, which now matches human expert effectiveness. Concurrently, Chinese state-sponsored threat actors, including the MSS and PLA, have industrialized their operations using shared malware frameworks like ShadowPad and compromised edge devices, complicating detection. Architectural vulnerabilities, such as the unpatched PhantomRPC flaw in Windows RPC, persist despite their potential for privilege escalation, reflecting challenges in addressing systemic risks. Meanwhile, AI-assisted discoveries, like the QEMU virtio-gpu heap overflow, underscore the growing sophistication of virtualization exploits. The evolving threat landscape is further strained by shrinking exploitation windows, with attackers leveraging weak credentials and unpatched systems to achieve long-term persistence, while Apple's iOS security model faces scrutiny for its reliance on rapid patching and lack of scalable detection mechanisms.
"Exploit Techniques" up 5.4x (5 → 27)"Cyber Threat Intelligence" up 13.5x (2 → 27)"Zero-Day Vulnerabilities" up 4.3x (3 → 13)
Articles (6 most recent) Critical Authentication Bypass in cPanel & WHM: Deep Dive into CVE-2026-41940 Exploitation CVE-2026-41940: Critical Authentication Bypass in cPanel & WHM Affecting 1.5 Million Serve Persistent Exploitation in Microsoft Copilot: Uncovering CVE-2026-24299 and the Copirate A Critical Authentication Bypass in cPanel & WHM (CVE-2026-41940): Exploitation Observed in Critical cPanel/WHM Pre-Auth Bypass (CVE-2026-41940) Exploited in Large-Scale Mirai and Ra Critical Authentication Bypass Vulnerability in cPanel and WHM Exploited in the Wild
9 articles
State-Aligned APTs Escalate Cyber Ops Amid Global Tensions, Targeting Gov & Critical Sectors
Over the past two weeks, state-aligned advanced persistent threat (APT) groups—primarily linked to Iran (MuddyWater, APT35, APT42, APT34/OilRig) and China (APT41/RedGolf, Emperor Dragonfly)—have intensified cyber operations targeting government agencies, defense contractors, financial institutions, and critical infrastructure across the U.S., Israel, South Korea, Japan, and Southeast Asia. Techniques include pre-positioned C2 infrastructure (e.g., blockchain-based communications, SSH key reuse, domain impersonation), exploitation of Fortinet vulnerabilities, Rust-based loaders delivering Cobalt Strike Cat, and multilingual phishing campaigns leveraging shared ZIP lure infrastructure. Rare exposures of attacker staging servers revealed operational toolkits, target lists (e.g., South Korea’s Ministry of Health, Shiseido), and open-source proxy tools (IOX, FRP, Rakshasa) used to evade detection. These activities, coinciding with geopolitical escalations, underscore a shift toward proactive infrastructure clustering and multi-stage attack workflows, heightening risks of espionage, data exfiltration, and potential kinetic cyber-physical impacts.
"Hunt.io" is new (appeared 11 times)"Open Directory" up 5.0x (1 → 5)"HuntSQL" is new (appeared 6 times)
Articles (6 most recent) Iranian APT Infrastructure Mapping: State-Aligned Clusters and C2 Patterns Amid Geopolitic Cobalt Strike Cat Campaign Targeting South Korean Government and Commercial Organizations KeyPlug-Linked Staging Server Exposes Fortinet Exploits, Webshells, and Reconnaissance Tar APT34-Like Pre-Operational Infrastructure Identified via SSH Key Reuse, Domain Impersonati Detecting Open-Source Proxy Infrastructure: IOX, FRP, and Rakshasa Hunting Techniques Multilingual Phishing Campaigns Targeting Asian Financial and Government Organizations via
29 articles
Critical Fortinet Flaws & AI Vulnerabilities Dominate Recent Cyber Threats
Over the past two weeks, critical vulnerabilities in Fortinet FortiClient EMS (CVE-2026-35616) have been actively exploited in the wild, enabling unauthenticated remote code execution via crafted API requests. Approximately 2,000 internet-exposed instances are at risk, prompting CISA to mandate federal remediation by April 9. Concurrently, AI-driven threats have surged, with Anthropic's Claude.ai facing 'Claudy Day' — a chained attack exploiting prompt injection and data exfiltration flaws — and the Granola AI app exposing indirect prompt injection risks. Additionally, Meta's React framework was found vulnerable to React2DoS (CVE-2026-23869), a denial-of-service flaw in its Server Components. These incidents highlight escalating risks from both traditional enterprise software and emerging AI systems, underscoring the need for rapid patching and robust governance frameworks.
"Vulnerability Research" up 2.0x (8 → 16)"Anthropic" up 3.2x (4 → 13)"Responsible Disclosure" up 3.3x (3 → 10)
Articles (6 most recent) Claudy Day: Chained Prompt Injection and Data Exfiltration Vulnerabilities Discovered in C Shadow Agents: Enterprise Security Risks of Uncontrolled 'Claw' AI Agent Framework Adoptio Claude Mythos and the AI-Driven Vulnpocalypse: What AppSec Teams Need to Know Node.js Module Resolution Flaw Enables Local Privilege Escalation on Windows: npm CLI and BlueHammer: Zero-Day Local Privilege Escalation Vulnerability in Microsoft Defender DNS Tunneling and Metadata Service Vulnerabilities in Amazon Bedrock AgentCore Sandbox Env
Detailed Analysis
Influence operations
⚠ SPIKE
3 this week
▲ Rising (41.3%/w) Shift: -16.7%
Details
Mean: 0.5/w Z-score: 2.58 Recent 3w avg: 1.7/w Prior 3w avg: 2.0/w Total: 13
Crypto theft
⇋ SHIFTING
3 this week
▲ Rising (34.7%/w) Shift: -60.0%
Details
Mean: 1.2/w Z-score: 0.78 Recent 3w avg: 2.7/w Prior 3w avg: 6.7/w Total: 32
Ad fraud
⇋ SHIFTING
2 this week
▼ Falling (-15.4%/w) Shift: -50.0%
Details
Mean: 1.0/w Z-score: 0.83 Recent 3w avg: 0.7/w Prior 3w avg: 1.3/w Total: 16
DDoS
⇋ SHIFTING
0 this week
▼ Falling (-18.6%/w) Shift: -75.0%
Details
Mean: 0.9/w Z-score: -0.91 Recent 3w avg: 0.3/w Prior 3w avg: 1.3/w Total: 13
Cryptojacking
⇋ SHIFTING
0 this week
▼ Falling (-19.4%/w) Shift: -100.0%
Details
Mean: 0.8/w Z-score: -0.73 Recent 3w avg: 0.0/w Prior 3w avg: 0.7/w Total: 11
Prepositioning
● NORMAL
22 this week
▲ Rising (39.2%/w) Shift: -1.4%
Details
Mean: 7.2/w Z-score: 1.31 Recent 3w avg: 23.7/w Prior 3w avg: 24.0/w Total: 187
Wiper / Sabotage
● NORMAL
2 this week
▼ Falling (-18.2%/w) Shift: -25.0%
Details
Mean: 1.9/w Z-score: 0.03 Recent 3w avg: 2.0/w Prior 3w avg: 2.7/w Total: 40
BEC / Wire fraud
● NORMAL
2 this week
▲ Rising (13.2%/w) Shift: +9.1%
Details
Mean: 1.8/w Z-score: 0.11 Recent 3w avg: 4.0/w Prior 3w avg: 3.7/w Total: 34

Low Volume

< 10 articles — limited statistical significance
Payment card theft
⚠ SPIKE
9 total (12w)
Sextortion
⚠ SPIKE
4 total (12w)
Defacement
● NORMAL
2 total (12w)
Archetype Status This Week Mean Z-Score Total (12w) Trend Shift
Espionage significant 21 4.8 2.0 125 +42.4%/w +17.4%
Ransomware significant 11 4.1 2.22 68 +9.0%/w +43.8%
Data exposure significant 4 0.7 2.7 17 +49.7%/w +125.0%
Influence operations significant 3 0.5 2.58 13 +41.3%/w -16.7%
Payment card theft significant 2 0.3 2.12 9 +31.3%/w +50.0%
Sextortion significant 2 0.2 3.75 4 +43.6%/w +100.0%
Credential theft elevated 31 14.6 1.59 250 +2.6%/w +47.1%
Initial access brokering elevated 25 8.9 1.72 187 +26.0%/w +26.7%
Account takeover (ATO) elevated 5 1.1 1.97 29 +51.1%/w +7.7%
Crypto theft shifting 3 1.2 0.78 32 +34.7%/w -60.0%
Ad fraud shifting 2 1.0 0.83 16 -15.4%/w -50.0%
DDoS shifting 0 0.9 -0.91 13 -18.6%/w -75.0%
Cryptojacking shifting 0 0.8 -0.73 11 -19.4%/w -100.0%
Prepositioning normal 22 7.2 1.31 187 +39.2%/w -1.4%
Wiper / Sabotage normal 2 1.9 0.03 40 -18.2%/w -25.0%
BEC / Wire fraud normal 2 1.8 0.11 34 +13.2%/w +9.1%
Defacement normal 0 0.2 -0.4 2 -18.2%/w
Actor Articles Associated Archetypes
TeamPCP
crime-syndicate
aka Team PCP, Mini Shai-Hulud, Mini Shai-Hulud campaign, Mini Shai-Hulud threat actor, TeamPCP (behind the Trivy breach and subsequent operations), TeamPCP (cyber criminal operation), TeamPCP (implied attribution)
Conducts sophisticated supply chain attacks, including CI cache poisoning, OIDC abuse, credential theft, and ransomware operations. Known for the Shai-Hulud worm campaign targeting npm packages, GitHub repositories, and developer tooling. Recently partnered with the ransomware group Vect, indicating a shift toward large-scale extortion.
65 Credential theft (26) Initial access brokering (19) Prepositioning (6)
Lazarus Group
nation-state
aka UNC1069, Kimsuky, Lazarus, Contagious Interview, Sapphire Sleet, BlueNoroff, PolinRider, STARDUST CHOLLIMA
A threat actor involved in a cryptocurrency theft campaign uncovered by Google, using social engineering tactics to direct victims to fraudulent video calls and execute malicious scripts.
37 Espionage (13) Crypto theft (10) Prepositioning (8)
Qilin
crime-syndicate
aka Qilin ransomware operators
A ransomware group that held the leading position in ransomware attacks in the previous reporting period, responsible for 12.34% of victims published on data leak sites in Q1 2026.
16 Ransomware (12) Credential theft (1) DDoS (1)
ShinyHunters
crime-syndicate
aka Bling Libra
Mentioned as a distinct cluster utilizing similar SaaS data-theft techniques. UNC6671 co-opted the ShinyHunters brand in at least one instance to inject artificial credibility into their threats, though operations are assessed to be independent.
13 Ransomware (7) Data exposure (2) Espionage (1)
LockBit
crime-syndicate
aka LockBit affiliates, LockBit 5.0
A well-known ransomware group responsible for 2.80% of ransomware attacks detected by Kaspersky in Q1 2026, known for its RaaS operations and widespread targeting.
13 Ransomware (10) Credential theft (2) DDoS (1)
Fancy Bear
nation-state
aka APT28, Forest Blizzard, APT 28, FancyBear, GRU Military Unit 26165
Russia-nexus intrusion set attributed to Russia’s General Staff Main Intelligence Directorate (GRU). Known for hybrid operations, modular and disposable implants (e.g., MASEPIE, STEELHOOK, OCEANMAP), stealthy delivery and persistence mechanisms, and use of frameworks like Covenant for reconnaissance and espionage. Targets include military networks, diplomatic crises, and utilizes advanced techniques such as steganography, COM hijacking, and custom C2 protocols leveraging cloud services like Koofr or Filen.
12 Espionage (7) Credential theft (3) Ransomware (1)
fraudsters
criminal
aka criminals, Organized scam call centers, bad actors, cyber criminals, online fraudsters, organized crime groups, scammers
Engaging in sophisticated and automated cyber-attacks, including ransomware, data exfiltration, and exploitation of third-party software vulnerabilities for financial gain.
12 BEC / Wire fraud (5) Ransomware (3) Credential theft (2)
Akira
crime-syndicate
aka Akira ransomware group, Conti ransomware group
A ransomware group responsible for 7.25% of victims published on data leak sites in Q1 2026, known for targeted ransomware attacks.
10 Ransomware (10)
MuddyWater
nation-state
aka Seedworm, APT34, Dark Scepter, Helix Kitten, Iranian-aligned group connected to the Ministry of Intelligence and Security (MOIS), OilRig, TA402, MuddyWater APT
Conducted a global espionage campaign targeting organizations across multiple sectors (industrial and electronics manufacturing, education, public-sector, financial services, and professional services) to steal sensitive information, including intellectual property, research data, and intelligence on rival governments. The group used advanced tradecraft such as DLL sideloading with signed binaries, Node.js-based orchestration, PowerShell scripting, credential theft, and data exfiltration via public file-transfer services. The campaign is linked to the Iranian Ministry of Intelligence and Security (MOIS).
10 Espionage (6) Prepositioning (2) Wiper / Sabotage (2)
Handala
nation-state
aka Handala Hack Team, Homeland Justice, Banished Kitten, Handala Hack, Handala Hacking Team, Ministry of Intelligence and Security (MOIS), MOIS Linked Cyber Influence Ecosystem, The Handala Popular Resistance Front (HPR)
Conducts coordinated cyber influence operations aligned with Iran’s Ministry of Intelligence and Security (MOIS). Activities include intrusion, data exfiltration, disruptive or destructive actions, and rapid public disclosure through controlled infrastructure. Exhibits shared infrastructure, persistent use of Telegram for amplification, and consistent rhetorical framing.
10 Espionage (3) Influence operations (3) Wiper / Sabotage (2)
LAPSUS$
crime-syndicate
aka Scattered Lapsus$ Hunters, LAPSUS$ (new group), Scattered Lapsus$
Published multiple screenshots indicating they gained access into Okta's corporate systems, specifically into Okta's customer support environment through internal admin access. The compromise involved a support engineer's endpoint being compromised for five days, allowing potential access to Jira tickets and user lists associated with customer accounts, as well as the ability to reset passwords and MFA factors for customer accounts.
9 Data exposure (4) Account takeover (ATO) (3) Credential theft (2)
The Gentlemen
crime-syndicate
aka Hastala, zeta88, hastalamuerte, The Gentlemen RaaS, The Gentlemen RaaS administrator, The Gentlemen Ransomware-as-a-Service
An emerging ransomware group that surpassed the activity levels of established groups like Akira and INC Ransom, accounting for 9.25% of victims published on data leak sites in Q1 2026.
8 Ransomware (8)
Shai-Hulud
crime-syndicate
aka Shai-Hulud attacker, Shai-Hulud threat actor, Shai-Hulud worm campaign, Shai-Hulud 2.0, Shai-Hulud malware, Shai-Hulud worm
Conducts self-propagating npm supply chain attacks, including credential harvesting, exfiltration, and self-replication using stolen npm tokens and GitHub Actions runners. The attack chain involves phishing maintainers, compromising packages, and persisting via rogue workflows and cloud credentials.
8 Credential theft (4) Initial access brokering (2) Account takeover (ATO) (1)
BlackCat
crime-syndicate
aka ALPHV/BlackCat, BlackCat/Alphv, ALPHV, ALPHV BlackCat
A ransomware-as-a-service (RaaS) operation linked to a negotiator who colluded with the group to share privileged insights into ransomware negotiations and allegedly participated as an affiliate.
7 Ransomware (5) Credential theft (2)
VECT
crime-syndicate
aka Vect ransomware group, Vect (ransomware group), VECT Ransomware
Announced a partnership with TeamPCP, suggesting involvement in large-scale extortion and ransomware operations as part of the Shai-Hulud supply chain campaign.
7 Data exposure (2) Prepositioning (1) Credential theft (1)
EvilTokens
crime-syndicate
aka EvilTokens affiliates, EvilToken, eviltokensadmin, EvilTokens (related infrastructure), EvilTokens administrator, EvilTokens PhaaS
Operates a phishing-as-a-service (PhaaS) platform designed to capture authentication tokens via device code phishing. The platform offers various landing pages and themes, automates attack chains, and provides tools like the 'Portal Browser' for managing compromised Microsoft 365 accounts to scale business email compromise (BEC) operations.
7 Account takeover (ATO) (5) BEC / Wire fraud (2) Initial access brokering (1)
Islamic Revolutionary Guard Corps (IRGC)
nation-state
aka Iran's Islamic Revolutionary Guard Corps Cyber Electronic Command, Islamic Revolutionary Guard Corps
Uses Iranian Cultural Centers for intelligence gathering, recruitment, radicalization, and logistical support. Engages in espionage, terrorist plots, propaganda dissemination, and collaboration with criminal networks (e.g., drug cartels, guerrilla groups) for funding and operational support. Implicated in assassination plots, money laundering, and cyber disinformation campaigns across Latin America.
7 Prepositioning (4) Espionage (2) Crypto theft (1)
Scattered Spider
crime-syndicate
aka Octo Tempest
Resumed aggressive ransomware operations against insurance entities in 2025 following a significant pause.
6 Espionage (3) Credential theft (2) Ransomware (1)
Charming Kitten
nation-state
aka Refined Kitten, APT35, APT42, Phosphorus, TA453
Iran-linked threat actor known for phishing-led intrusion campaigns and intelligence gathering. Targets governments, energy providers, military entities, critical infrastructure, journalists, and policy organisations. Relies on credential theft, password spraying, and vulnerability exploitation.
6 Espionage (2) Wiper / Sabotage (2) Ransomware (1)
CyberAv3ngers
nation-state
aka 313 Team, Cyber Islamic Resistance, Iranian-affiliated advanced persistent threat (APT) actors
Claimed responsibility for a DDoS attack against the Bluesky social media platform and API, causing intermittent outages. Linked to Iran.
6 Wiper / Sabotage (4) Espionage (1) Prepositioning (1)

State-Sponsored Activity

Attributed nation-state operations (12w)
Iran 31 articles
Active Actors
Handala (20) MuddyWater (16) APT34 (9) OilRig (9) Charming Kitten (6) Mint Sandstorm (6) APT42 (6) APT33 (5)
Operations
Wiper / Sabotage (52) DDoS (12) Espionage (11) Credential theft (4) Prepositioning (3)
Targeted Sectors
Telecommunications (7) Computer Systems Design and Related Services (6) Electric Power Generation, Transmission and Distribution (6) Manufacturing (5) Oil and Gas Extraction (5) Medical Device Manufacturing (4)
Recent articles Seedworm: Iran-Linked APT Group Expands Global Espionage Campaign Using DLL Side Iranian-Nexus Cyber Espionage Campaign Targets Oman: 11 Ministries Compromised a Top Cyber Threat Groups Targeting Organizations: Profiling OilRig, Cozy Bear, La DinDoor Deno-Based Backdoor: Execution Chain Analysis and Active C2 Infrastructu MOIS-Aligned Cyber Influence Ecosystem: Unified Analysis of Homeland Justice, Ka
North Korea 31 articles
Active Actors
Lazarus Group (21) Contagious Interview (7) Famous Chollima (4) Kimsuky (2) APT38 (2) APT37 (2) Lazarus (1) Stonefly (1)
Operations
Espionage (14) Crypto theft (10) Credential theft (7) Ransomware (4) Initial access brokering (2)
Targeted Sectors
Information Technology (5) Software Publishers (3) Computer Systems Design and Related Services (3) Data Processing, Hosting, and Related Services (3) Finance and Insurance (2) Energy (1)
Recent articles Analysis of Kimsuky's Multi-Themed Spear Phishing Campaigns: Exploiting Legitima North Korea's Cybercrime Operations: Funding Military Ambitions and Evading Sanc Inside DPRK’s npm Malware Factory: A 31-Day Campaign of 108 Packages and 261 Ver noon-contracts: Sophisticated DeFi-Targeted npm Supply Chain RAT with Triple Per Top Cyber Threat Groups Targeting Organizations: Profiling OilRig, Cozy Bear, La
Russia 19 articles
Active Actors
APT28 (10) Fancy Bear (8) Forest Blizzard (5) APT29 (4) Sandworm (2) Midnight Blizzard (1) Cozy Bear (1) Secret Blizzard (1)
Operations
Espionage (20) Credential theft (7) Ransomware (3) Account takeover (ATO) (2) Wiper / Sabotage (1)
Targeted Sectors
National Security / Military (1) Executive, Legislative, and Other General Government Support (1) Justice, Public Order, and Safety Activities (1) Air Transportation / Air Force (1) Computer Security / Cybersecurity Services (1)
Recent articles Midnight Blizzard Attack on Microsoft: A Deep Dive into Nation-State Espionage a Evolution of Kazuar: From Monolithic Backdoor to Modular P2P Botnet Ecosystem Sandworm Unmasked: Operational Patterns, Escalation Tactics, and Defensive Strat Automating .NET Malware Analysis: Tooling and Techniques for Scalable Reverse En Spring Cleaning Your Browser: Reducing Attack Surfaces Through Digital Hygiene
China 16 articles
Active Actors
Volt Typhoon (5) Mustang Panda (5) Salt Typhoon (4) APT41 (3) APT31 (3) APT40 (1) APT27 (1) Silk Typhoon (1)
Operations
Espionage (13) Prepositioning (3) Wiper / Sabotage (3) Initial access brokering (2) Credential theft (2)
Targeted Sectors
Electric Power Generation, Transmission and Distribution (2) Water, Sewage and Other Systems (2) Finance and Insurance (2) Government (2) Industrial Machinery Manufacturing (1) Other Heavy and Civil Engineering Construction (1)
Recent articles SHADOW-EARTH-053: China-Aligned Cyberespionage Campaign Exploits Legacy Microsof State-Sponsored Cyber Threats: Redefining Incident Response for Advanced Persist AI-Powered Vulnerability Discovery and Exploit Development: The Rise of Mythos P Network Telemetry Unveils Nation-State Pre-Positioning in the Defense Industrial LOTUSLITE v1.1: Mustang Panda Evolves Backdoor Targeting India's Banking Sector
Tracking 707 unique CVEs over the window. Found: new 158spiking 6persistent 9active 13
CVE-2026-20182
10.0 NEW
May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vu
Cisco Catalyst Sd-Wan ManagerCisco Sd-Wan Vsmart Controller
3 this week 3 total 1w active
Articles Active Exploitation of Critical Cisco Catalyst SD-WAN Vulnerabilities: A Deep Di Active Exploitation of Cisco Catalyst SD-WAN Vulnerabilities: CVE-2026-20182 and The Efficiency Trap: How Centralized SD-WAN Controllers Concentrate Risk and Att
CVE-2025-32711
9.3 NEW
Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Microsoft 365 Copilot
1 this week 1 total 1w active
Articles The Visibility Gap in AI Agent Security: Why MCP Servers Need Structured Audit L
CVE-2025-54518
7.3 NEW
Improper isolation of shared resources within the CPU operation cache on Zen 2-based products could allow an attacker to corrupt instructions executed at a different privilege level, potentially resul
Adobe CommerceAfter EffectsAdobe Connect
1 this week 1 total 1w active
Articles May Security Updates: Adobe and Microsoft Patch Critical Vulnerabilities in Comm
Apache Doris MCPApache Pinot MCPAlibaba RDS MCP
1 this week 1 total 1w active
Articles Critical Vulnerabilities in MCP Servers: SQL Injection, Authentication Bypass, a
npm packagesTanStackMistral AI
1 this week 1 total 1w active
Articles Analysis of the Shai-Hulud Supply Chain Campaign: CI Cache Poisoning, OIDC Abuse
CVE-2026-0265
7.2 NEW
An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Servic
PAN-OSPA-Series firewallsVM-Series firewalls
1 this week 1 total 1w active
Articles Critical Authentication Bypass Vulnerability in Palo Alto Networks PAN-OS (CVE-2
CVE-2026-33032
9.8 SPIKE
Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /
Nginxui Nginx Ui
2 this week 4 total 3w active
CVE-2025-33073
8.8 SPIKE
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
Microsoft Windows 10 1507Microsoft Windows 10 1607Microsoft Windows 10 1809Microsoft Windows 10 21H2Microsoft Windows 10 22H2
2 this week 3 total 2w active
CVE-2025-32433
10.0 SPIKE
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remo
Erlang Erlang\/OtpCisco Confd BasicCisco Network Services OrchestratorCisco Cloud Native Broadband Network GatewayCisco Inode Manager
2 this week 3 total 2w active
CVE-2026-20122
5.4 SPIKE
A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the atta
Cisco Catalyst Sd-Wan Manager
2 this week 3 total 2w active
CVE-2026-20128
7.5 SPIKE
A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain DCA user privileges on an affected system. This v
Cisco Catalyst Sd-Wan Manager
2 this week 3 total 2w active
CVE-2026-20133
6.5 SPIKE
A vulnerability in Cisco Catalyst SD-WAN Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file
Cisco Catalyst Sd-Wan Manager
2 this week 3 total 2w active
CVE-2025-55182
10.0 PERSISTENT
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-
Facebook ReactVercel Next.Js
0 this week 12 total 6w active
Articles PCPJack: A Credential Theft Framework Targeting Exposed Cloud Infrastructure and Comprehensive Cyber Threat Landscape: Global Cyber Operations, Espionage, and Em ShadowLink: Connecting Residential Proxy Networks on Compromised IoT Devices to Kubernetes Under Siege: How Threat Actors Exploit Container Identities to Compro Cisco Talos Threat Source: AI-Democratized BEC Scams, Next.js Credential Harvest
CVE-2026-20127
10.0 PERSISTENT
A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, r
Cisco Catalyst Sd-Wan ManagerCisco Sd-Wan Vsmart Controller
3 this week 12 total 6w active
Articles Active Exploitation of Critical Cisco Catalyst SD-WAN Vulnerabilities: A Deep Di Active Exploitation of Cisco Catalyst SD-WAN Vulnerabilities: CVE-2026-20182 and The Efficiency Trap: How Centralized SD-WAN Controllers Concentrate Risk and Att Critical Unauthenticated Buffer Overflow Vulnerability in PAN-OS (CVE-2026-0300) Metasploit Framework Update: New Exploit Modules for Cisco SD-WAN, osTicket, and
CVE-2026-21643
9.8 PERSISTENT
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized cod
Fortinet Forticlientems
0 this week 7 total 4w active
Articles Critical SQL Injection Flaw in FortiClient EMS 7.4.4 Under Active Exploitation Critical Unauthenticated SQL Injection Vulnerability in FortiClient EMS 7.4.4 Un Authentication Bypass in FortiClient EMS via HTTP Header Spoofing and Weak Certi Fortinet customers confront actively exploited zero-day, with a full patch still Critical Zero-Day Improper Access Control Vulnerability in Fortinet FortiClientE
CVE-2026-1731
9.9 PERSISTENT
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted req
Beyondtrust Privileged Remote AccessBeyondtrust Remote Support
0 this week 6 total 4w active
CVE-2026-33017
9.3 PERSISTENT
Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows withou
Langflow
2 this week 6 total 4w active
CVE-2026-1281
9.8 PERSISTENT
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
Ivanti Endpoint Manager Mobile
0 this week 5 total 5w active
CVE-2026-41940
9.3 ACTIVE
cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
CpanelCpanel WhmCpanel Wp Squared
4 this week 18 total 3w active
CVE-2026-31431
7.8 ACTIVE
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associ
Linux Linux KernelRedhat Openshift Container PlatformRedhat Enterprise LinuxAmazon Amazon LinuxCanonical Ubuntu Linux
2 this week 12 total 3w active
CVE-2026-0300
9.3 ACTIVE
A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code wi
Paloaltonetworks Pan-OsSiemens Ruggedcom Ape1808 Firmware
1 this week 7 total 2w active
CVE-2026-43284
8.8 ACTIVE
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks
Linux Linux Kernel
2 this week 6 total 2w active
CVE-2026-43500
7.8 ACTIVE
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the
Linux Linux Kernel
2 this week 6 total 2w active
CVE-2026-34197
8.8 ACTIVE
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bri
Apache ActivemqApache Activemq Broker
1 this week 4 total 2w active