// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 9 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 3
HIGH (page) 1
MEDIUM (page) 1
LOW (page) 0
MEDIUM 85% confidence advisory

Systemd 260 Drops SysV Support

['The latest Systemd drops support for legacy init scripts and integrates AI in development.', 'Systemd v260 released, ending SysV compatibility and. Read full

['The discontinuation of SysVinit support and the integration of AI coding tools are significant changes that could affect legacy systems and require operators to upgrade their systems and adapt their maintenance procedu

Linux administratorsSystem maintenance teams
action items (3)
  • Review existing systems for reliance on SysVinit scripts.
  • Plan upgrades or alternative solutions for systems affected by the change.
  • Educate teams about the benefits and implications of integrating AI in development processes.

The Register ·

CRITICAL 95% confidence cve

Interlock Ransomware Exploiting CVE-2026-20131

Amazon threat intelligence identifies Interlock ransomware exploiting a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software. Read f

['Critical security flaw in firewall software', 'Allows remote execution of arbitrary Java code as root', 'Risks data exfiltration and ransomware attacks']

Enterprise network administratorsIT security professionals
action items (3)
  • Update firewall software immediately
  • Conduct a security audit of firewalls
  • Implement strict access controls

AWS Security Blog ·

CRITICAL 95% confidence cve

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131

['Amazon Threat Intelligence warns of Interlock ransomware exploiting a critical zero-day in Cisco Secure Firewall Management Center (FMC) Software.'. Read full

['Insecure deserialization flaws allow attackers to execute arbitrary code by manipulating serialized data.', 'Attackers exploit this vulnerability for root-level control, enabling ransomware deployment on compromised sy

Network SecurityFirewall ManagementRansomware Threats
action items (2)
  • Review security logs for signs of unauthorized access attempts
  • Update FMC software immediately after release

The Hacker News ·

HIGH 85% confidence outage

Amazon Warns of Zero-Day Cisco Firewall Vulnerability Exploited by Ransomware

["Ransomware gangs exploited a zero-day flaw in Cisco Secure Firewall Management Center software before it was patched. Amazon's CJ Moses warns organizations.

['The zero-day exploit allowed attackers to bypass firewall protections, enabling ransomware infections. Organizations using affected versions are at high risk.']

Enterprise NetworksManaged Service Providers
action items (3)
  • Apply available patches as soon as possible
  • Review security logs for signs of exploitation
  • Consider network segmentation to isolate firewall management systems

The Register ·

CRITICAL 95% confidence outage

Darksword Exploit Kit Targets iPhone Users

['Security researchers warn of Darksword, an info-stealing malware targeting iPhones. Multiple spyware vendors and state actors are reportedly involved.', 'A.

['iPhone users exposed to info-stealing threats', 'Risk of sensitive data compromise due to Darksword attacks']

iPhone usersSecurity researchersIT security teams
action items (3)
  • Deploy network monitoring solutions
  • Educate users on phishing and malware threats
  • Implement strict app permissions policies

The Register ·