// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 51 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 1
HIGH (page) 3
MEDIUM (page) 1
LOW (page) 0
CRITICAL 95% confidence cve

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA adds CVE-2025-11953 and CVE-2026-24423 to its KEV catalog due to active exploitation, posing significant risks. Includes severity, confidence, and actionab

['These vulnerabilities are actively exploited by malicious actors', 'They pose significant risks to federal enterprise networks', 'CISA requires FCEB agencies to remediate these by due dates']

Federal Civilian Executive Branch agenciesAll organizations with React Native or SmarterTools applications
action items (3)
  • Apply relevant patches immediately
  • Conduct a risk assessment of current systems
  • Educate staff on recognizing and responding to exploits

CISA Current Activity ·

HIGH 95% confidence cve

CISA Adds Six Known Exploited Vulnerabilities to Catalog

['CISA adds six new vulnerabilities to its KEV Catalog based on evidence of active exploitation. These include CVE-2026-21510, CVE-2026-21513, and others. Read

['These vulnerabilities are common vectors for malicious cyber actors and pose significant risks to federal enterprises.', 'BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to prot

FCEB AgenciesAll Organizations
action items (2)
  • Review the updated KEV catalog from CISA and identify any systems that are vulnerable.
  • Remediate identified vulnerabilities in accordance with BOD 22-01 requirements for FCEB agencies.

CISA Current Activity ·

HIGH 95% confidence outage

Poland Energy Sector Cyber Incident Emphasizes OT and ICS Security

A cyber incident in Poland's energy sector highlights critical gaps in operational technology (OT) and industrial control systems (ICS) security. Learn about.

['Vulnerable edge devices remain primary targets for threat actors', 'Default credentials exploited to pivot onto HMIs and RTUs', 'Critical infrastructure entities with unsupported devices face significant risks']

Energy sector entitiesCritical infrastructure owners/operatorsIndustrial control systems administrators
action items (3)
  • Review CISA's Binding Operational Directive BOD 26-02
  • Implement primary mitigations against cyber threats to OT
  • Consult CERT Polska’s Energy Sector Incident Report for detailed guidance

CISA Current Activity ·

MEDIUM 85% confidence advisory

Spotlight on SIG Architecture: API Governance

Interview with Jordan Liggitt about Kubernetes API Governance, stability vs. innovation balance, and ensuring consistency in custom resource definitions. Includ

['Ensuring consistency and stability for new and existing APIs', 'Addressing challenges of user-defined custom resources']

Kubernetes operatorsAPI developers
action items (2)
  • Review and adhere to API conventions
  • Involve API Governance in the design phase of new features

Kubernetes Blog ·

HIGH 95% confidence advisory

CISA Adds Four New Known Exploited Vulnerabilities to Catalog

['CISA has added four new vulnerabilities, including CVE-2024-43468, CVE-2025-15556, CVE-2025-40536, and CVE-2026-20700, to its Known Exploited Vulnerabilities.

["These vulnerabilities are critical as they represent active attack vectors for malicious actors. Immediate action is required to mitigate risks based on CISA's KEV guidelines."]

Federal Civilian Executive Branch (FCEB) agenciesAll organizations
action items (3)
  • Remediate identified vulnerabilities immediately.
  • Review BOD 22-01 for federal agency guidelines on KEV management.
  • Implement robust vulnerability management practices for all organizations.

CISA Current Activity ·