// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 41 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 0
HIGH (page) 5
MEDIUM (page) 0
LOW (page) 0
HIGH 85% confidence outage

French Bank Account Database Breach

["Unknown attacker breaches French government's database containing bank account details, exfiltrates 1.2 million records.", "France's national banking. Read fu

['The incident highlights potential vulnerabilities within critical infrastructure systems and the need for robust patch management practices.', 'Attackers exploited a possible unpatched vulnerability or misconfiguration

GovernmentFinancial Services
action items (3)
  • Review and update patching policies to ensure timely application of security updates.
  • Deploy advanced analytics tools for anomaly detection in network traffic and system access patterns.
  • Strengthen data encryption measures, especially for datasets containing highly sensitive financial information.

The Register ·

HIGH 95% confidence cve

ZDI-26-107: AutoCAD MODEL File Remote Code Execution Vulnerability

Remote code execution flaw in Autodesk AutoCAD could allow attackers to execute arbitrary code if users visit a malicious page or open a file. CVE-2026-0875.

["Inadequate validation of input data in AutoCAD's MODEL files handling", 'Potential use by threat actors to gain unauthorized access and control over systems']

Autodesk AutoCAD users and administrators
action items (2)
  • Apply available security updates immediately
  • Review network traffic logs for signs of suspicious activity related to this threat

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-106 AutoCAD CATPART File Parsing OOB Write RCE Vulnerability

A remote code execution flaw in Autodesk AutoCAD affects CATPART file parsing. Requires user interaction to execute malicious code. Includes severity, confidenc

['Users may execute remote code without their knowledge', 'Vulnerability can be leveraged for lateral movement within networks']

Engineering DepartmentsIT Security Teams
action items (2)
  • Apply available security updates immediately
  • Monitor for signs of exploitation via log reviews

Zero Day Initiative ·

HIGH 90% confidence cve

CISA Adds Four Active Exploit Vulnerabilities to KEV Catalog

Four security flaws flagged by CISA under active exploitation, including CVE-2026-2441 in Google Chrome. Includes severity, confidence, and actionable response

["CISA's additions to the KEV list signal heightened risk for organizations using affected software.", 'Immediate action is required to mitigate potential security breaches due to these vulnerabilities.']

Google Chrome usersNetwork Administrators
action items (2)
  • Install latest security patches for affected software components.
  • Review CISA’s KEV catalog regularly for updates on exploitable vulnerabilities.

The Hacker News ·

HIGH 90% confidence outage

Notepad++ Fixes Hijacked Update Mechanism for Malware Delivery

['Notepad++ releases version 8.9.2 to address a hijacked update mechanism exploited by Chinese threat actors.', "Fixes include enhanced verification and. Read f

['Understanding and mitigating risks associated with software supply chain security is critical.', 'Operators need to ensure their tools are updated and secured against such exploits.']

Windows operating system usersDevelopers using Notepad++ for code editing
action items (2)
  • Verify all systems running outdated versions of Notepad++ and schedule upgrades
  • Review security policies regarding software supply chain integrity

The Hacker News ·