// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 33 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 0
HIGH (page) 5
MEDIUM (page) 0
LOW (page) 0
HIGH 90% confidence outage

Lazarus Group Uses Medusa Ransomware in Healthcare Attacks

The Lazarus Group, linked to North Korea, used Medusa ransomware in attacks targeting U.S. and Middle East healthcare entities. Includes severity, confidence, a

['Ransomware poses significant data exfiltration risk', 'Medusa variant may evade traditional detection']

Healthcare organizationsIT security teams
action items (3)
  • Review security logs for suspicious activity
  • Increase monitoring of healthcare IT infrastructure
  • Educate staff on ransomware prevention

The Hacker News ·

HIGH 90% confidence outage

West Midlands Police and Generative AI Misstep

["UK Parliament delivers official review of West Midlands Police's use of Copilot AI, highlighting risks in AI-driven public order decisions.", 'Case study on.

['The misuse of generative AI in critical systems underscores the importance of rigorous testing and validation processes before deployment.', 'Lack of oversight and understanding of AI limitations led to inappropriate i

Public safetyLaw enforcement
action items (2)
  • Conduct a thorough review of existing AI implementations in public order contexts.
  • Develop guidelines and best practices for the ethical use of generative AI in law enforcement operations.

The Register ·

HIGH 90% confidence outage

Korean Cops Charge Teens for Bike Hire Breach

["Two teens charged over South Korea's public bike hire service data breach affecting 4.62M users, following an investigation.", 'South Korean prosecutors mull.

['This breach underscores critical security weaknesses in city infrastructure systems that handle personal and sensitive data.', 'It highlights the importance of robust cybersecurity measures for protecting user informat

Public transportation systemsUrban infrastructure management
action items (3)
  • Conduct a thorough review of current security measures
  • Enhance user data encryption practices
  • Train employees on recognizing and responding to cyber threats

The Register ·

HIGH 90% confidence cve

ZDI-26-075 GFI Archiver Auth Bypass Vulnerability

Remote attackers can bypass authentication in GFI Archiver due to a missing authorization flaw. CVE-2026-2038 CVSS rating of 7.3. Includes severity, confidence,

['Failure to properly authenticate users enables unauthorized access', 'Exploitation leads to potential data theft or manipulation']

GFI Archiver usersNetwork administrators managing email archiving solutions
action items (2)
  • Update GFI Archiver software to the latest version
  • Review and enhance authentication mechanisms in affected systems

Zero Day Initiative ·

HIGH 90% confidence advisory

ZDI-26-123: Docker Desktop MCP Server Cleartext Storage Vulnerability

["Local attackers can disclose sensitive information via Docker Desktop's cleartext storage. CVSS rating 5.5.", 'Docker Desktop vulnerability allows local.

['The vulnerability arises from improper handling of sensitive information, allowing for unauthorized access and potential data exposure.']

Docker Desktop usersLinux distributions using Docker
action items (3)
  • Update Docker Desktop to the latest version with security patches.
  • Review and encrypt all sensitive data stored on Docker installations.
  • Implement strict access control policies for Docker environments.

Zero Day Initiative ·