Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
RARLAB
RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.
Microsoft
Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.
D-Link
D-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
Array Networks
Array Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.
Meta
Meta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Please note CVE-2025-66478 has been rejected, but it is associated with CVE-2025- 55182.
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
Cyber-Security-Tech/house-price-predictor
Predict house prices using linear regression and random forest models. Includes model evaluation, visualizations, and feature analysis on the classic Kaggle dataset.
Projects-Developer/Cyber-Security-Final-Year-Projects-Github
Cyber threat detection using machine learning is a proactive approach to cybersecurity that involves training machine learning algorithms. Includes Source Code, PPT, Synopsis, Report, Documents, Base Research Paper & Video tutorials
emmanuel-tuyishime/Traffic-Classification-for-MQTT-IoT-Network-Based-Security-Attacks-
Feature selection for malicious traffic classification in MQTT-IoT networks using statistical moments difference thresholding. The study applies machine learning to enhance anomaly detection while optimizing computational efficiency.
anusha-chebolu/E2E-MLOps-ETL-NetworkSecuritySystem
A production-ready Network Security System built with Python that leverages Machine Learning for threat detection and analysis.
hiyaamalik/Self-Healing-AI-for-Network-Security
This is an artificial intelligence (ML and DL) project for network security which works by detecting threats and uses attack classification and then implements self-healing mechanisms
Prot-Security-Studio/Prot-Defender-Core
Prot Defender core code open source repository
