// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 50 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 1
HIGH (page) 2
MEDIUM (page) 2
LOW (page) 0
CRITICAL 95% confidence outage

Ingress NGINX Retirement: Critical Migration Alert

Kubernetes will retire Ingress NGINX in March 2026. Begin migration to alternatives like Gateway API or third-party controllers immediately. Includes severity,

['Project lacks maintainers and contributors.', 'Security risks increase without regular updates.', 'Technical debt and design flaws render it unsustainable.']

Kubernetes usersCloud native environments
action items (3)
  • Check clusters for Ingress NGINX usage.
  • Begin planning migration now.
  • Monitor for new vulnerabilities after retirement.

Kubernetes Blog ·

HIGH 95% confidence cve

CISA Adds CVE-2026-1281 to KEV Catalog

['CISA adds Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability (CVE-2026-1281) to its Known Exploited Vulnerabilities Catalog, emphasizing risk.

['This type of vulnerability is a common entry point for malicious cyber actors and poses significant risks to federal networks.', "CISA's action underscores the necessity of timely remediation for known exploited vulner

Federal Civilian Executive Branch (FCEB) agenciesAll organizations
action items (2)
  • Review the CISA KEV Catalog for additional vulnerabilities requiring mitigation.
  • Ensure compliance with BOD 22-01 for federal agencies, prioritize remediation accordingly.

CISA Current Activity ·

MEDIUM 85% confidence advisory

New Conversion from cgroup v1 CPU Shares to v2 CPU Weight

Kubernetes implements an improved conversion formula for mapping cgroup v1 CPU shares to cgroup v2 CPU weight. Learn how this impacts resource allocation and.

['Improves resource prioritization in multi-process environments', 'Allows for more granular management of workload resources within containers']

Kubernetes operatorsSystem administrators managing containerized workloads
action items (2)
  • Review resource management strategies within applications
  • Update custom tools and monitoring systems for compatibility with the new conversion formula

Kubernetes Blog ·

MEDIUM 85% confidence advisory

Introducing Node Readiness Controller for Kubernetes

The new Node Readiness Controller in Kubernetes ensures nodes meet all infrastructure-specific requirements before scheduling workloads. It provides custom.

['Ensures precise control over when and how workloads are scheduled to nodes', 'Allows operators to define custom readiness conditions and automate taint management']

Kubernetes Clusters with Complex Infrastructure Dependencies
action items (2)
  • Explore the Node Readiness Controller documentation
  • Consider implementing in pilot environments before full deployment

Kubernetes Blog ·

HIGH 95% confidence advisory

CISA Adds Four Known Exploited Vulnerabilities to Catalog

['CISA adds four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog due to active exploitation. Remediation required for FCEB agencies.

['These vulnerabilities pose significant risks to the federal enterprise due to their potential for exploitation by malicious cyber actors.', 'Prompt remediation is required under Binding Operational Directive (BOD) 22-0

FCEB agenciesall organizations
action items (2)
  • Review the KEV Catalog for all applicable CVEs and prioritize their remediation as per BOD 22-01 requirements.
  • Ensure timely patching and monitoring of systems to detect and mitigate potential exploitation attempts.

CISA Current Activity ·