// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 3 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 2
HIGH (page) 3
MEDIUM (page) 0
LOW (page) 0
HIGH 85% confidence outage

FortiGate RaaS Exploit and Citrix Vulnerabilities Impact NSYSOps

['ThreatsDay Bulletin highlights FortiGate RaaS, Citrix exploits, and more security issues affecting network operators. Stay informed about the latest threats.

['These exploits pose significant risks to network security and operational integrity due to the widespread use of affected components in enterprise environments.']

Network operatorsEnterprise IT administrators
action items (3)
  • Review system configurations and ensure compliance with security best practices.
  • Conduct regular vulnerability scans and penetration testing.
  • Educate employees on phishing attacks targeting live chat platforms.

The Hacker News ·

HIGH 95% confidence cve

ZDI-26-190: VMware Workstation PVSCSI Heap-based Buffer Overflow

A local privilege escalation vulnerability in VMware Workstation allows attackers to gain elevated privileges. CVE-2025-41238, CVSS rating 8.2. Includes severit

['High-privilege code execution required', 'Potential for unauthorized system access']

VMware Workstation users
action items (2)
  • Apply security updates immediately
  • Review system access controls

Zero Day Initiative ·

CRITICAL 95% confidence cve

VMware ESXi VMXNET3 Integer Overflow Privilege Escalation Vulnerability

Local attackers can exploit this VMware ESXi VMXNET3 integer overflow to escalate privileges. Requires high-privileged code execution on guest system. Includes

['The vulnerability exists due to insufficient validation of input parameters', 'Exploitation requires initial high-privileged access on guest systems']

VMware ESXi environments
action items (2)
  • Update affected VMware ESXi installations immediately
  • Review system configurations for proper privilege management

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-188: VMware ESXi VMCI Integer Underflow Local Privilege Escalation

Local attackers can escalate privileges on VMware ESXi due to an integer underflow in the VM Communication Interface (VMCI). ZDI has assigned CVSS rating of.

['Vulnerability permits unauthorized access and control over affected systems', 'Enables lateral movement within the system environment']

System AdministratorsCloud Infrastructure Operators
action items (2)
  • Update affected systems with the latest security updates
  • Review and tighten local privilege permissions on ESXi hosts

Zero Day Initiative ·

CRITICAL 100% confidence cve

(Pwn2Own) Synology DiskStation Manager Netatalk Library Buffer Overflow RCE Vulnerability

Critical buffer overflow flaw in Synology DiskStation Manager's Netatalk library allows remote code execution without authentication. Includes severity, confide

['Exploits can be executed remotely', 'No user interaction or authentication needed to exploit the flaw']

Synology DiskStation Manager usersNetwork administrators
action items (2)
  • Check for updates immediately
  • Monitor systems for suspicious activity

Zero Day Initiative ·