Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
Apache
Apache Tomcat treats Apache JServ Protocol (AJP) connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited.
Treck TCP/IP stack
The Treck TCP/IP stack contains an IPv6 out-of-bounds read vulnerability.
Exim
Exim contains an out-of-bounds write vulnerability which can allow for remote code execution.
Cisco
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands.
Microsoft
A remote code execution vulnerability exists in Microsoft Excel when the software fails to properly handle objects in memory.
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
mikehubers/Awesome-AI-For-Security
π‘οΈ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.
Rizwan723/MCP-Security-Proxy
π Implement a security proxy for Model Context Protocol using ensemble anomaly detection to classify requests as benign or attack for enhanced safety.
RepiFahmiSidiq/Onchain-Security-Suite
π‘οΈ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.
VascoMaria/msc-thesis-cv-security-system
Masterβs Thesis in Software Engineering: a computer visionβbased security system for banking self-service machines (ATMs/VTMs).
hmshujaatzaheer/federated-scion-security-framework
Formally Verified Federated Learning Framework for Privacy-Preserving Anomaly Detection in Path-Aware Networks (PhD Research)
raghavpoonia/ai-security-mastery
Complete 90-day learning path for AI security: ML fundamentals β LLM internals β AI threats β Detection engineering. Built from first principles with NumPy implementations, Jupyter notebooks, and production-ready detection systems.
