Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
RARLAB
RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.
Microsoft
Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.
D-Link
D-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
Array Networks
Array Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.
Meta
Meta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Please note CVE-2025-66478 has been rejected, but it is associated with CVE-2025- 55182.
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
MUKUL-TIWARI/CyberShield-Security-Suite
AI-powered phishing, email, and vishing detection system.
Farimah20/cctv-security-system
AI-Powered CCTV Security Monitor with Theft Detection
AmirhosseinHonardoust/Onchain-Security-Suite
A complete Web3 security toolkit combining AI-powered token auditing, ML-based deployer reputation scoring, and live Etherscan V2 data. Includes static analysis for rugpull detection, RandomForest reputation modeling, contract-fetching automation, and Solidity on-chain registries for transparent, reproducible security insights.
rakshitdabral/network-security-system
An AI-powered Network Intrusion Detection System (NIDS) designed to monitor network traffic and detect anomalies in real-time. Leverages machine learning algorithms to classify malicious packets and predict potential security threats.
iamrahulramu/Enhancing-IoV-Security-Using-Lightweight-Cryptographic-Algorithm---ASCON
A two‑layer security framework is proposed for Internet of Vehicles (IoV) environments that combines lightweight cryptography with a machine learning‑based Network Intrusion Detection System (NIDS).
scthornton/ai-security-analyst-rag
Build an AI Security Analyst Assistant with RAG! LEARN FROM SCRATCH
