// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 16 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 1
HIGH (page) 4
MEDIUM (page) 0
LOW (page) 0
HIGH 95% confidence outage

Route Leak Incident on January 22, 2026

An automated routing policy configuration error caused an unintentional BGP prefix leak from Miami data center. Learn about the impact and mitigation. Read full

['Improper configuration of automated policies', 'Human oversight issue']

Network administratorsSecurity operations teams
action items (2)
  • Review existing automated configurations
  • Implement stricter access controls on critical systems

Cloudflare Blog ·

HIGH 95% confidence cve

ZDI-26-049 Delta Electronics DIAView RCE Vulnerability

Remote attackers can execute arbitrary code on affected Delta Electronics DIAView installations requiring user interaction with a malicious project. CVSS. Read

['User interaction with malicious project required', 'High severity allows for significant system compromise']

IT administratorsNetwork security teams
action items (3)
  • Patch affected systems immediately
  • Review project access controls
  • Implement network segmentation

Zero Day Initiative ·

HIGH 95% confidence cve

Fortinet FortiSandbox SSRF RCE Vulnerability (ZDI-26-048)

Critical remote code execution vulnerability in Fortinet's FortiSandbox requires authentication. CVE-2025-67685, CVSS score of 8.8. Includes severity, confidenc

['Lack of input validation in HTTP requests allows malicious actors to disclose sensitive data and control server processes']

Fortinet usersNetwork administratorsSecurity professionals
action items (2)
  • Review system configurations for FortiSandbox installations
  • Update systems to the latest version with patched SSRF vulnerability

Zero Day Initiative ·

HIGH 90% confidence cve

ZDI-26-047: Hancom Office DOC Parsing Type Confusion RCE Vulnerability

Hancom Office DOC File Parsing Type Confusion Remote Code Execution Vulnerability. Exploits require user interaction. Includes severity, confidence, and actiona

['Allows remote attackers to execute arbitrary code with user interaction']

Hancom Office UsersEnterprise Networks
action items (2)
  • Apply security patches
  • Monitor network for suspicious activity

Zero Day Initiative ·

CRITICAL 95% confidence cve

ZDI-26-046: Cisco Snort Vulnerability Allows Remote Code Execution

Cisco Snort is vulnerable to a Use-After-Free Remote Code Execution flaw that can be exploited without requiring authentication. Includes severity, confidence,

['Lack of proper memory management in _bnfa_search_csparse_nfa function', 'Attackers can manipulate the application state to trigger UAF and execute arbitrary code remotely']

Network SecurityIntrusion Detection Systems
action items (2)
  • Review system configurations for any direct exposure of Snort services
  • Monitor logs for suspicious activities and apply security updates promptly

Zero Day Initiative ·