Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
Citrix
Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.
Apple
Apple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework.
Trend Micro
Trend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.
N-able
N-able N-Central contains a command injection vulnerability via improper sanitization of user input.
N-able
N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
mikehubers/Awesome-AI-For-Security
🛡️ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.
vittipum/CyberSecurity-Network-Sniffer
🛡️ A lightweight Python-based network scanner that detects and lists all devices on your local network using IP and MAC addresses. Built with Scapy for cybersecurity and network analysis tasks.
RepiFahmiSidiq/Onchain-Security-Suite
🛡️ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.
PeterHovng/HUTECH_DACN.CyberSecurity
Đồ án chuyên ngành - ngành An ninh mạng "Hệ thống phát hiện tấn công mạng trên AWS bằng Machine Learning (Network Intrusion Detection System - NIDS)"
polymons/MCP-Security-Proxy
A project to test MCP voulnerabilities and defense strategies in a cloud-native Dockerized environment. This repository is part of my Bsc thesis in computer engineering at Óbuda University.
AyoubElmortaji/Cloud-Security
Analysis and Detection of Threats in Cloud Environments Using Machine Learning Developed an anomaly detection model achieving 80% accuracy with Random Forest. This academic project, completed during my Cybersecurity & Cloud Computing studies at ENSAM Casablanca, focuses on identifying suspicious activities and threats in cloud logs using machine l
