// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 14 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 2
HIGH (page) 1
MEDIUM (page) 2
LOW (page) 0
CRITICAL 90% confidence cve

Google Project Zero Discovers Critical 0-click Exploit for Android

A critical 0-click exploit chain affecting most Android devices via Dolby Unified Decoder and other media processing components. High risk of remote code. Read

['Increased attack surface due to AI features', 'Media processing vulnerabilities allow RCE']

AndroidGoogle Messages
action items (2)
  • Apply available security updates
  • Monitor systems for suspicious activity

Google Project Zero ·

CRITICAL 85% confidence general

0-Click Exploit Chain for Pixel 9 Part 2: Breaking Out of Sandbox

A new exploit chain targets the Pixel 9's mediacodec context and BigWave driver. Discover how it bypasses sandboxing for kernel-level access. Includes severity,

['Critical hardware components like BigWave are common attack vectors', 'Exploits can allow full access to the system, undermining security']

Pixel 9
action items (2)
  • Review system logs for signs of unauthorized /dev/bigwave access
  • Update to latest firmware and patches for Pixel 9 devices

Google Project Zero ·

HIGH 90% confidence outage

Pixel 9 0-Click Exploit Chain Analysis

['Google Project Zero reveals new details on exploiting Pixel 9 devices via audio attack vectors. Recommendations for improvement in Android ecosystem security.

['Operators need to be aware of the expanded attack surface presented by third-party services and processes handling sensitive data automatically. This includes the risk posed by audio message transcription features whic

Google Pixel 9Android Devices with Similar Architectures
action items (3)
  • Review existing mitigation strategies for zero-click attacks
  • Update policies regarding the use of third-party services that handle user data
  • Conduct a thorough review of all processes involved in automatic data handling on Android devices

Google Project Zero ·

MEDIUM 95% confidence advisory

Simplify Network Segmentation with Multiple LGW Routing Domains

['AWS Outposts now supports multiple local gateway routing domains, enhancing network segmentation for improved security and compliance in regulated. Read full

['Operators can now segment their AWS Outposts networks into distinct areas with individual routing tables and security policies to minimize lateral movement of threats.', 'Improved isolation reduces the potential blast

AWS Outposts usersEnterprises in regulated industries
action items (2)
  • Evaluate current network segmentation practices against the capabilities offered by multiple LGW routing domains.
  • Consider implementing new routing domains as part of a broader strategy to enhance data protection and regulatory adherence.

AWS Compute Blog ·

MEDIUM 85% confidence advisory

Implementing Data Governance Automation in AWS

['Explore technical implementation and architectural patterns for data governance on AWS, including automation and tagging strategies.', 'Discover how to build.

['Helps in establishing consistent and automated compliance measures', 'Provides insights into advanced monitoring and automation practices for better resource management']

AWS S3AWS Lambda
action items (2)
  • Review current data governance practices
  • Consider implementing automation through tagging

AWS Security Blog ·