#threatintel

9 posts · Last used 25d

Back to Timeline
@SecurityWriter@infosec.exchange · Feb 22, 2026
Up your CTI game by knowing the correct threat actor names for executive briefings. Security isn’t about being right, it’s about being accurate, after all: https://addons.mozilla.org/en-US/firefox/addon/gayint-name-converter/ Courtesy of @gayint@infosec.exchange #threatintel #cti #security #cybersecurity
View on infosec.exchange
8
0
6
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/szNwziYVqZLTBwCgA6NWWf 🔗 🇩🇪🇺🇸🇫🇷

Une faille d’injection de code dans le système d’aide menace la stabilité des postes de travail critiques.

#cybersecurity #security #threatintel #cve #osint

View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/mE7ZhqmZWLS2X9HU5NGNPL 🔗 🇩🇪🇺🇸🇫🇷

A high-severity code injection flaw in KeePass’s help system, while not actively exploited, presents a tangible risk of application crashes and workflow disruption through crafted HTML content.

#cybersecurity #security #threatintel #cve #osint

View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/wXivcJdGsJsNDv46vvaEjc 🔗 🇩🇪🇺🇸🇫🇷

Eine Code-Injection-Schwachstelle im Hilfesystem der Passwort-Manager-Software kann zu Anwendungsabstürzen führen, stellt jedoch ein moderates Risiko dar.

#cybersecurity #security #threatintel #cve #osint

View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026

📺 https://peer.adalta.social/w/1yG6uMbdZ6ERmwL2Sfck4Q 🔗 🇩🇪🇺🇸🇫🇷

Une vulnérabilité publique et exploitée sur un équipement non maintenu représente un risque de priorité 1 pour les réseaux hérités.

#cybersecurity #security #threatintel #osint #cve

View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026

📺 https://peer.adalta.social/w/snU5nCd7kRYQC28d23s8xm 🔗 🇩🇪🇺🇸🇫🇷

A publicly exploitable, remote OS command injection flaw in the unmaintained D-Link DIR-615 router poses a critical risk to consumer and small office networks.

#cybersecurity #security #threatintel #osint #cve

View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026

📺 https://peer.adalta.social/w/shXDXweVZNtm8Qt8kPLhEj 🔗 🇩🇪🇺🇸🇫🇷

Öffentlich verfügbarer Exploit für eine Remote-Command-Injection in der DIR-615-Firmware stellt ein kritisches Risiko für ungepatchte, ungewartete Geräte dar.

#cybersecurity #security #threatintel #osint #cve

View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 05, 2026

📺 https://peer.adalta.social/w/oKrbQ3HamL2pFvNH2jjP2z 🔗 🇩🇪🇺🇸🇫🇷

An unquoted service path vulnerability in a widely used VPN client enables attackers with local access to gain full SYSTEM control over Windows endpoints.

#cybersecurity #security #threatintel #osint #cve

View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 05, 2026

📺 https://peer.adalta.social/w/g9qXhTZRu5rcZyA45zxm2U 🔗 🇩🇪🇺🇸🇫🇷

Ein unquotierter Dienstpfad in Version 9.2 ermöglicht lokalen Angreifern die Ausführung von Code mit SYSTEM-Rechten.

#cybersecurity #security #threatintel #osint #cve

View on adalta.social
0
0
0

You've seen all posts