Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
Adobe
Adobe Coldfusion contains an unspecified vulnerability, which could result in information disclosure from a compromised server.
Adobe
Adobe Coldfusion contains a directory traversal vulnerability, which could permit an unauthorized user access to restricted directories.
Adobe
Adobe Coldfusion contains an authentication bypass vulnerability, which could result in an unauthorized user gaining administrative access.
Adobe
Adobe BlazeDS, which is utilized in LifeCycle and Coldfusion, contains a vulnerability that allows for information disclosure.
Cisco
A vulnerability in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code elevate privileges, execute arbitrary commands, bypass authentication and authorization protections, fetch and run unsigned software, or cause a denial of service (DoS).
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
VascoMaria/msc-thesis-cv-security-system
Masterβs Thesis in Software Engineering: a computer visionβbased security system for banking self-service machines (ATMs/VTMs).
Rizwan723/MCP-Security-Proxy
π Implement a security proxy for Model Context Protocol using ensemble anomaly detection to classify requests as benign or attack for enhanced safety.
RepiFahmiSidiq/Onchain-Security-Suite
π‘οΈ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.
mikehubers/Awesome-AI-For-Security
π‘οΈ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.
hmshujaatzaheer/federated-scion-security-framework
Formally Verified Federated Learning Framework for Privacy-Preserving Anomaly Detection in Path-Aware Networks (PhD Research)
raghavpoonia/ai-security-mastery
Complete 90-day learning path for AI security: ML fundamentals β LLM internals β AI threats β Detection engineering. Built from first principles with NumPy implementations, Jupyter notebooks, and production-ready detection systems.
