Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
N-able
N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.
RARLAB
RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.
Microsoft
Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.
Microsoft
Microsoft Internet Explorer contains a memory corruption vulnerability that allows for remote code execution. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
D-Link
D-Link DCS-2530L and DCS-2670L devices contains an unspecified vulnerability that could allow for remote administrator password disclosure. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
RepiFahmiSidiq/Onchain-Security-Suite
🛡️ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.
mikehubers/Awesome-AI-For-Security
🛡️ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.
PeterHovng/HUTECH_DACN.CyberSecurity
Đồ án chuyên ngành - ngành An ninh mạng "Hệ thống phát hiện tấn công mạng trên AWS bằng Machine Learning (Network Intrusion Detection System - NIDS)"
polymons/MCP-Security-Proxy
A project to test MCP voulnerabilities and defense strategies in a cloud-native Dockerized environment. This repository is part of my Bsc thesis in computer engineering at Óbuda University.
AyoubElmortaji/Cloud-Security
Analysis and Detection of Threats in Cloud Environments Using Machine Learning Developed an anomaly detection model achieving 80% accuracy with Random Forest. This academic project, completed during my Cybersecurity & Cloud Computing studies at ENSAM Casablanca, focuses on identifying suspicious activities and threats in cloud logs using machine l
PeterHovng/HUTECH_DACS.CyberSecurity
Nghiên cứu khoa học & Đồ án cơ sở - ngành An ninh mạng "Hệ thống phát hiện và phòng chống tấn công Web bằng Machine Learning (Web Intrusion Detection System - WIDS)"
