// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 39 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 1
HIGH (page) 4
MEDIUM (page) 0
LOW (page) 0
CRITICAL 95% confidence outage

In-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

Threat actors have begun exploiting a critical security flaw in BeyondTrust Remote Support and Privileged Remote Access products, highlighting the need for.

['Critical security flaw poses significant risk to system integrity', 'Immediate action required to prevent data breaches and service disruptions']

BeyondTrust RS usersBeyondTrust PRA users
action items (2)
  • Update systems with latest security patches
  • Enhance monitoring for suspicious activity

The Hacker News ·

HIGH 90% confidence outage

npm's Supply Chain Security Update and Considerations

['npm implements major security updates post Sha1-Hulud incident but warns users about remaining supply-chain vulnerabilities.', "Read how npm's changes don't.

['To mitigate risks associated with supply chain attacks following the Sha1-Hulud event']

Node.js developersIT Security Teams
action items (2)
  • Review updated npm authentication methods
  • Enhance monitoring for suspicious activity in package registries

The Hacker News ·

HIGH 90% confidence outage

Malicious Chrome Extension Stealing Business Data

['A malicious Chrome extension has been discovered stealing business data, emails, and browsing history from users of Meta Business Suite and Facebook Business.

['The compromised extension can exfiltrate critical data, posing significant risks to business operations and security.']

business_operatorssecurity_engineers
action items (2)
  • Audit installed Chrome extensions for suspicious activities
  • Update security policies to restrict potentially risky extensions

The Hacker News ·

HIGH 95% confidence advisory

Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup

['New social engineering tactic uses nslookup to retrieve malware payloads through DNS lookups.', 'Microsoft warns of clickfix attacks leveraging nslookup for.

['Operators need to monitor and control use of nslookup and similar utilities that can be abused for exfiltration or malware download.']

Windows ServerWindows Workstations
action items (2)
  • Review and update security policies regarding DNS queries from command-line tools.
  • Enhance monitoring and alerting mechanisms to detect anomalous nslookup activity

The Hacker News ·

HIGH 95% confidence cve

Chrome Zero-Day CVE-2026-2441 Exploitation Report

Critical use-after-free bug in Chrome CSS under active attack. Patch available now. Includes severity, confidence, and actionable response guidance for operator

['Patching Chrome as soon as possible can prevent exploitation of this vulnerability', 'This issue could allow attackers to execute arbitrary code with user privileges']

Google Chrome users
action items (2)
  • Install the patch provided by Google for CVE-2026-2441
  • Monitor systems for signs of exploitation activity related to this vulnerability

The Hacker News ·