indicator,indicator_type,severity,first_seen,description,source_url CVE-2019-0708,cve,crit,2026-04-30,"ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories",https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html CVE-2019-15126,cve,crit,2026-04-16,Supply chain dependencies: Have you checked your blind spot?,https://www.welivesecurity.com/en/business-security/supply-chain-dependencies-have-you-checked-your-blind-spot/ CVE-2022-0847,cve,crit,2026-04-30,New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions,https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html CVE-2023-20198,cve,crit,2026-04-22,"IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist",https://blog.talosintelligence.com/ir-trends-q1-2026/ CVE-2023-32434,cve,crit,2026-03-26,Coruna: the framework used in Operation Triangulation,https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/ CVE-2023-33538,cve,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ CVE-2023-38606,cve,crit,2026-03-26,Coruna: the framework used in Operation Triangulation,https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/ CVE-2024-1708,cve,crit,2026-04-29,CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV,https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html CVE-2024-1709,cve,crit,2026-04-29,CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV,https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html CVE-2024-32114,cve,crit,2026-04-23,"ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories",https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html CVE-2024-57046,cve,crit,2026-04-23,"ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories",https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html CVE-2024-57726,cve,crit,2026-04-25,"CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline",https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html CVE-2024-57728,cve,crit,2026-04-25,"CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline",https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html CVE-2024-7399,cve,crit,2026-04-25,"CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline",https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html CVE-2025-0921,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2025-14847,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2025-20333,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2025-20362,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2025-20393,cve,crit,2026-04-22,"IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist",https://blog.talosintelligence.com/ir-trends-q1-2026/ CVE-2025-21042,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2025-22952,cve,crit,2026-04-23,"ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories",https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html CVE-2025-23304,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2025-24371,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2025-29635,cve,crit,2026-04-25,"CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline",https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html CVE-2025-55182,cve,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ CVE-2025-59287,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2025-66478,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2026-0740,cve,crit,2026-04-24,LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure,https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html CVE-2026-1281,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2026-1340,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2026-1731,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-21509,cve,crit,2026-03-10,Sednit reloaded: Back in the trenches,https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/ CVE-2026-21510,cve,crit,2026-04-29,CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV,https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html CVE-2026-21513,cve,crit,2026-04-29,CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV,https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html CVE-2026-21571,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-21876,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-22584,cve,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ CVE-2026-23627,cve,crit,2026-04-30,"ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories",https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html CVE-2026-24908,cve,crit,2026-04-30,"ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories",https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html CVE-2026-25262,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-25874,cve,crit,2026-04-28,Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE,https://thehackernews.com/2026/04/critical-cve-2026-25874-leaves-hugging.html CVE-2026-26268,cve,crit,2026-04-30,Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution,https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html CVE-2026-27174,cve,crit,2026-04-23,"ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories",https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html CVE-2026-27175,cve,crit,2026-04-23,"ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories",https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html CVE-2026-27654,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-28950,cve,crit,2026-04-23,Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages,https://thehackernews.com/2026/04/apple-patches-ios-flaw-that-stored.html CVE-2026-31431,cve,crit,2026-04-30,New Linux ‘Copy Fail’ flaw gives hackers root on major distros,https://www.bleepingcomputer.com/news/security/new-linux-copy-fail-flaw-gives-hackers-root-on-major-distros/ CVE-2026-32173,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-32202,cve,crit,2026-04-30,PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials,https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html CVE-2026-32604,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-32613,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-33032,cve,crit,2026-04-22,Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API,https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html CVE-2026-33626,cve,crit,2026-04-30,PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials,https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html CVE-2026-33694,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-33824,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-33871,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-34197,cve,crit,2026-04-23,"ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories",https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html CVE-2026-3517,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-3518,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-3519,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-3844,cve,crit,2026-04-24,LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure,https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html CVE-2026-3854,cve,crit,2026-04-30,PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials,https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html CVE-2026-3965,cve,crit,2026-04-30,"ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories",https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html CVE-2026-40050,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-40372,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-4047,cve,crit,2026-04-30,"ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories",https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html CVE-2026-4048,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-40872,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-41651,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-41940,cve,crit,2026-04-30,"Critical cPanel and WHM bug exploited as a zero-day, PoC now available",https://www.bleepingcomputer.com/news/security/critical-cpanel-and-whm-bug-exploited-as-a-zero-day-poc-now-available/ CVE-2026-42208,cve,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ CVE-2026-5752,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-5754,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-5756,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-5757,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html CVE-2026-5760,cve,crit,2026-04-27,"⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More",https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html 2b1.916.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ 2pd.f22.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ 6688cf.jhxrpbgq.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 92j.130.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ abc.3mkorealtd.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ abc.doublemobile.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ abc.fetish-friends.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ abc.haijing88.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ abc.ilptour.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ abc.petitechanson.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ abc.sudsmama.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ abc.woopami.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ adobe.com,domain,crit,2026-04-22,"IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist",https://blog.talosintelligence.com/ir-trends-q1-2026/ ae-payapp.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ airansupasdports.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ alpha.filehost36.sbs,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ alphafly-drones.com,domain,crit,2026-04-27,PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks,https://thehackernews.com/2026/04/phantomcore-exploits-trueconf.html anadnet.com,domain,crit,2026-04-30,"ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories",https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html ao.online,domain,crit,2026-04-21,New NGate variant hides in a trojanized NFC payment app,https://www.welivesecurity.com/en/eset-research/new-ngate-variant-hides-in-a-trojanized-nfc-payment-app/ api.dc1637.xyz,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ api.npoint.io,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ api.ra-backup.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ app1password.com,domain,crit,2025-11-13,How password managers can be hacked – and how to stay safe,https://www.welivesecurity.com/en/cybersecurity/password-managers-under-attack-what-you-should-know/ appbitwarden.com,domain,crit,2025-11-13,How password managers can be hacked – and how to stay safe,https://www.welivesecurity.com/en/cybersecurity/password-managers-under-attack-what-you-should-know/ appleid.apple.com-update.required.kontol.emiratesbankgroup.info,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ appstoreios.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ aramcoamericainvest.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ arch2.maxdatahost1.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ arch2.megadatahost3.homes,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ audit.checkmarx.cx,domain,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ b0p.c0d.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ b1z.0f6.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ bankiran.bet,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ bankofamerica.com.oidscreen.gorequestlocale.emiratesbankgroup.info,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ biransupasdports.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ bit.ly,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ bore.pub,domain,crit,2026-04-30,New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials,https://thehackernews.com/2026/04/new-python-backdoor-uses-tunneling.html bot.ddosvps.cc,domain,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ bouleversement.niovapahrm.com,domain,crit,2026-04-30,Email threat landscape: Q1 2026 trends and insights,https://www.microsoft.com/en-us/security/blog/2026/04/30/email-threat-landscape-q1-2026-trends-and-insights/ buydubaipropertywithcrypto.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ c1y.bf3.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ c45.94b.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ cache3.filehost36.sbs,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ callnrwise.com,domain,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ centrastage.net,domain,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ championships-peoples-point-cassette.trycloudflare.com,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ checkmarx.cx,domain,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ checkmarx.zone,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ ciderurginsx.com,domain,crit,2026-04-13,JanelaRAT: a financial threat targeting users in Latin America,https://securelist.com/janelarat-financial-threat-in-latin-america/119332/ cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0.io,domain,crit,2026-04-22,Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens,https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html cnc.vietdediserver.shop,domain,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ cnmaestro.sapb-aramco.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ com-govauv.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ cover.www.microsoft.com.irancell.courses,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ create-sensitivity-grad-sequence.trycloudflare.com,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ crypto-stroe.cc,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ cryptocurrencies-offers.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ csec-c2-server.onrender.com,domain,crit,2026-04-29,"New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs",https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html d1g.ccd.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dnshook.site,domain,crit,2026-04-07,Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox,https://unit42.paloaltonetworks.com/bypass-of-aws-sandbox-network-isolation-mode/ ds20221202.dsc.wcsset.com,domain,crit,2025-11-19,PlushDaemon compromises network devices for adversary-in-the-middle attacks,https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/ dubai-custbims.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubai-custboms.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubai-customs.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubai-polices.ae-finesquery.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubaicuctoms.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubaicustoms.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubaicustonms.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubaiicuctoms.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ dubaipolice.gov-tollbillba.life,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ eg3.db1.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ emirates-ae.pack-541202699.azmtrust.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ emirates-post.racunari-bl.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ emiratescryptobank.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ emiratesinvestunion.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ emiratespost-pay.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ emiratespost.traz.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ etisalataccount-quickpayae.click,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ etisalataccountquickpayae.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ etisalatquickpay.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ f43.c76.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ file.io,domain,crit,2026-04-23,China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors,https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html firansupport.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ fkiransusdpportsdf.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ fudcrypt.net,domain,crit,2026-04-23,"ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories",https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html gcp-sa-aiplatform-re.iam.gserviceaccount.com,domain,crit,2026-03-31,Double Agents: Exposing Security Blind Spots in GCP Vertex AI,https://unit42.paloaltonetworks.com/double-agents-vertex-ai/ gov-tollbillba.life,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ govauv.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ haematogenesis.hvishay.com,domain,crit,2026-04-30,Email threat landscape: Q1 2026 trends and insights,https://www.microsoft.com/en-us/security/blog/2026/04/30/email-threat-landscape-q1-2026-trends-and-insights/ helllo2025.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ hyperfilevault1.xyz,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ hyperfilevault2.mom,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ hyperfilevault3.mom,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ hyperfilevault3.pics,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ investigation-launches-hearings-copying.trycloudflare.com,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ iosfc.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ iran.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iran11.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iran14.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iran15.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iran16.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iran18.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iran19.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iran2.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ irancross.shop,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ irandargah.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ irandonation.org,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iranforward.org,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iranpaye.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iransupasdports.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iransupports.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iransupporttyst.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ iransusdpportsdf.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ kamikaze.sh,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ kiransupport.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ kiransupportsdf.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ kkkhhhnnn.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ kmd.8cd.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ kube.py,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ kzw.ce3.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ m1w.4a0.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ majormetalcsorp.com,domain,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ mcagov.cc,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ media.hyperfilevault2.mom,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ media.megafilehost2.sbs,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ metadata.google.internal,domain,crit,2026-03-31,Double Agents: Exposing Security Blind Spots in GCP Vertex AI,https://unit42.paloaltonetworks.com/double-agents-vertex-ai/ mgi1y.siyangoil.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ models.litellm.cloud,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ monicasue.app.n8n.cloud,domain,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ mti4ywy4.lahuafa.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ mtjln.siyangoil.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ my-secret.dnshook.site,domain,crit,2026-04-07,Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox,https://unit42.paloaltonetworks.com/bypass-of-aws-sandbox-network-isolation-mode/ myemiratespost.click,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ mziyytm5ytk.ahroar.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ newso.com,domain,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ ngy2yjq0otlj.ahroar.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ njb.551.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ nmu8n.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ ntm0mdkzymy3n.oukwww.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ nxj.e57.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ nziwytu5n.lahuafa.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ odm0.siyangoil.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ onedrivedownload.zoholandingpage.com,domain,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ outlook.outlook.saudidigtalbank.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ packages.npm.org,domain,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ pagepoinnc.app.n8n.cloud,domain,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ plug-tab-protective-relay.trycloudflare.com,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ pnd.86c.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ policy-my.com,domain,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ portal.0111etisalat.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ portal.sapb-aramco.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ pro.iranpanel.life,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ progamevl.ru,domain,crit,2026-01-30,DynoWiper update: Technical analysis and attribution,https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/ prop.py,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ proton.me,domain,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ recovery.cover.www.microsoft.com.irancell.courses,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ redalert.apk,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ requestrepo.com,domain,crit,2026-04-24,LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure,https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html robinhood.com,domain,crit,2026-04-30,"ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories",https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html roldco.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ s0u.210.mytemp.website,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ saudi-bill-pay.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ saudidigtalbank.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ scan.aquasecurtiy.org,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ secretemirates.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ server.com,domain,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ sffifdsfsransupasdports.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ sfrclak.com,domain,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ souls-entire-defined-routes.trycloudflare.com,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ srv2.filehost37.sbs,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ stardebug.app,domain,crit,2026-04-27,PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks,https://thehackernews.com/2026/04/phantomcore-exploits-trueconf.html store.appleid-apple.com-confirmation.verif.emiratesbankgroup.info,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ stub.com,domain,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ sudsmama.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ superset.0111etisalat.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ sxsfcc.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ tehran.t2.drproxy.pro,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ telemetry.api-monitor.com,domain,crit,2026-04-22,Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens,https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html test.dsc.wcsset.com,domain,crit,2025-11-19,PlushDaemon compromises network devices for adversary-in-the-middle attacks,https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/ the-dubai-lifestyleapp.cryptocurrencies-offers.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ the1password.com,domain,crit,2025-11-13,How password managers can be hacked – and how to stay safe,https://www.welivesecurity.com/en/cybersecurity/password-managers-under-attack-what-you-should-know/ tinyurl.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ top1hbt.arm,domain,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ top1hbt.mips,domain,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ top1hbt.mpsl,domain,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ tpcp.tar.gz,domain,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ traz.top,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ trdfiransupport.cyou,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ trumpvsirancoin.xyz,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ tti.app.n8n.cloud,domain,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ ubiquitarianism.drilto.com,domain,crit,2026-04-30,Email threat landscape: Q1 2026 trends and insights,https://www.microsoft.com/en-us/security/blog/2026/04/30/email-threat-landscape-q1-2026-trends-and-insights/ us-docker.pkg.dev,domain,crit,2026-03-31,Double Agents: Exposing Security Blind Spots in GCP Vertex AI,https://unit42.paloaltonetworks.com/double-agents-vertex-ai/ vnc.kcii2.com,domain,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ wcsset.com,domain,crit,2025-11-19,PlushDaemon compromises network devices for adversary-in-the-middle attacks,https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/ www.emirates-post.ae-payapp.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ www.forever-iran.net,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ www.gxzhrc.cn,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ www.hyperfilevault2.mom,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ www.iran2026.org,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ www.portal.0111etisalat.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ www.shirideitch.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ www.superset.0111etisalat.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ xz.apps-store.im,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ yjzhengruol.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ yoshi.0111etisalat.com,domain,crit,2026-04-17,Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17),https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/ zdrhnmjjndu.ulbcl.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ zmx6f.com,domain,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 101.99.88.113,ipv4,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ 101.99.88.188,ipv4,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ 103.116.72.119,ipv4,crit,2026-04-24,LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure,https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html 103.159.132.30,ipv4,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ 104.21.91.170,ipv4,crit,2026-04-21,New NGate variant hides in a trojanized NFC payment app,https://www.welivesecurity.com/en/eset-research/new-ngate-variant-hides-in-a-trojanized-nfc-payment-app/ 104.238.149.198,ipv4,crit,2026-04-06,Understanding Current Threats to Kubernetes Environments,https://unit42.paloaltonetworks.com/modern-kubernetes-threats/ 108.165.230.223,ipv4,crit,2026-04-21,New NGate variant hides in a trojanized NFC payment app,https://www.welivesecurity.com/en/eset-research/new-ngate-variant-hides-in-a-trojanized-nfc-payment-app/ 108.187.37.85,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 108.187.41.221,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 108.187.42.63,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 118.107.234.26,ipv4,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ 118.107.234.29,ipv4,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ 135.125.255.55,ipv4,crit,2026-04-30,EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades,https://thehackernews.com/2026/04/etherrat-distribution-spoofing.html 139.180.128.251,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 139.180.139.209,ipv4,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 142.11.206.73,ipv4,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 154.82.81.192,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 154.82.81.205,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 158.247.193.100,ipv4,crit,2026-04-24,Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2,https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html 192.163.167.14,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 192.229.115.229,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 192.238.205.47,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 195.5.171.242,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 207.56.119.216,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 207.56.138.28,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 209.34.235.18,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 212.71.124.188,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 216.126.237.71,ipv4,crit,2026-04-29,"New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs",https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html 23.142.184.129,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 23.235.188.3,ipv4,crit,2026-04-06,Understanding Current Threats to Kubernetes Environments,https://unit42.paloaltonetworks.com/modern-kubernetes-threats/ 24.152.36.241,ipv4,crit,2026-04-28,Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign,https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html 31.172.71.5,ipv4,crit,2026-01-30,DynoWiper update: Technical analysis and attribution,https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/ 38.54.17.131,ipv4,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ 45.118.133.203,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 45.148.10.212,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 45.192.219.60,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 45.32.108.178,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 45.76.155.14,ipv4,crit,2026-04-06,Understanding Current Threats to Kubernetes Environments,https://unit42.paloaltonetworks.com/modern-kubernetes-threats/ 47.242.198.250,ipv4,crit,2025-11-19,PlushDaemon compromises network devices for adversary-in-the-middle attacks,https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/ 51.38.137.113,ipv4,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 57.133.212.106,ipv4,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 63.251.162.11,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 65.111.25.67,ipv4,crit,2026-04-29,LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure,https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html 65.111.27.132,ipv4,crit,2026-04-29,LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure,https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html 8.212.132.120,ipv4,crit,2025-11-19,PlushDaemon compromises network devices for adversary-in-the-middle attacks,https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/ 83.142.209.11,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 83.142.209.203,ipv4,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 91.195.240.123,ipv4,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ 94.154.172.43,ipv4,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ 039E93B98EF5E329F8666A424237AE73,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 04194f8ddd0518fd8005f0e87ae96335,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 043e457726f1bbb6046cb0c9869dbd7d,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 0565364633b5acdd24a498a6a9ab4eca,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 06130DC648621E93ACB9EFB9FABB9651,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 075b4aa105e728f2b659723e3f36c72c,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 0B9B420E3EDD2ADE5EDC44F60CA745A2,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 0C3B60FFC4EA9CCCE744BFA03B1A3556,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 0ff6abe0252d4f37a196a1231fae5f26,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 1020497BEF56F4181AEFB7A0A9873FB4,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 114721fbc23ff9d188535bd736a0d30e,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 11705121f64fa36f1e9d7e59867b0724,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 13669b8f2bd0af53a3fe9ac0490499e5,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 19733e0dfa804e3676f97eff90f2e467,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 1AA72CD19E37570E14D898DFF3F2E380,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 1D1F71936DB05F67765F442FEB95F3FD,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 1d2f32c57ae2f2013f513d342925e972,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 202A5BCB87C34993318CFA3FA0C7ECB0,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 2375193669e243e830ef5794226352e7,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 2717b58246237b35d44ef2e49712d3a2,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 2740a703859cbd8b43425d4a2cacb5ec,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 27A3C439308F5C4956D77E23E1AAD1A9,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 2915b3f8b703eb744fc54c81f4a9c67f,md5,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ 2b92e125184469a0c3740abcaa10350c,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 2c5a1dd4cb53287fe0ed14e0b7b7b1b7,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 31d25ddf2697b9e13ee883fff328b22f,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 32407207e9e9a0948d167dca96c41d1a,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 3279307508F3E5FB3A2420DEC645F583,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 3417B9CF7ACB22FAE9E24603D4DE1194,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 3C6AEC25EBB2D51E1F16C2EEF181C82A,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 410eddfc19de44249897986ecc8ac449,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 4126348d783393dd85ede3468e48405d,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 41444d7018601b599beac0c60ed1bf83,md5,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ 417ae7f384c49de8c672aec86d5a2860,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 44299A368000AE1EE9E9E584377B8757,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 49a8934ccd34e2aaae6ea1e6a6313ffe,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 4a5195a38a458cdd2c1b5ab13af3b393,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 4d343515f4c87b9a2ffd2f46665d2d57,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 4FC5EC1DE89CE3FCDD3E70DB4A9C39D1,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 4FC8C78516A8C2130286429686E200ED,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 5390E8BF7131CAAAA98A5DD63E27B2BC,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 53B68CA8D7A54C15700CF9500AE4A4E2,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 5b998a5bc5ad1c550564294034d4a62c,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 5bdae6cb778d002c806bb7ed130985f3,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 5ED84B2099E220D645934E1FD552AE3A,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 6495c409b59deb72cfcb2b2da983b3bb,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 6611E902945E97A1B27F322A50566D48,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 686989d97cf0d70346cbde2031207cbf,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 6cf382d3a0eae57b8baaa263e4ed8d00,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 70016DDBCB8543BDB06E0F8C509EE980,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 70AE9CA2A285DA9005A8ACB32DD31ACE,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 79CD56FC9ABF294B9BA8751E618EC642,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 79fe383f0963ae741193989c12aefacc,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 7b4c61ff418f6fe80cf8adb474278311,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 7bdbd180c081fa63ca94f9c22c457376,md5,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ 7e678ca2f01dc853e85d13924e6c8a45,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 7F27818E4244310A645984CCC41EA818,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 808c87015194c51d74356854dfb10d9e,md5,crit,2026-04-13,JanelaRAT: a financial threat targeting users in Latin America,https://securelist.com/janelarat-financial-threat-in-latin-america/119332/ 814032eec3bc31643f8faa4234d0e049,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 84c81a5e49291fe60eb9f5c1e2ac184b,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 84E54C3602D8240ED905B07217C451CD,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 891DE2FF486A1824F2DB01C1BDF1D2E9,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 8AC5BEE89436B29F9817E434507FEF55,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 8cbd34393d1d54a90be3c2b53d8fc17a,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 8d45a67b648d2cb46292ff5041a5dd44,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 8f51f82393c6467f9392fb9eb46f9301,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 8FC911CA37F9F451A213B967F016F1F8,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 90257aa1e7c9118055c09d4a978d4bee,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 933F1CB8ED2CED5D0DD2877C5EA374E8,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ 9bf9f635019494c4b70fb0a7c0fb53e4,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ A083C546DC66B0F2A5E0E2E68032F62C,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ A0D1223CA4327AA5F7674BDA8779323F,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ A234850DFDFD7EE128F648F9750DD2C4,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ a2cf85d22a54e26794cbc7be16840bb1,md5,crit,2026-04-23,It pays to be a forever student,https://blog.talosintelligence.com/it-pays-to-be-a-forever-student/ a543b96b0938de798dd4f683dd92a94a,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ A75713F0310E74FFD24D91E5731C4D31,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ aac3165ece2959f39ff98334618d10d9,md5,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ AD39A5790B79178D02AC739099B8E1F4,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ af4461a149bfd2ba566f2abefe7dcde4,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ B0E06925DB5416DFC90BABF46402CD6F,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ B23D302B7F23453C98C11CA7B2E4616E,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ b500e0a8c87dffe6f20c6e067b51afbf,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ B53E3CC11947E5645DFBB19934B69833,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ B5CA812843570DCF8E7F35CACAB36D4A,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ b639f7f81a8faca9c62fd227fef5e28c,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ B6DF7C59756AB655CA752B8A1B20CFFA,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ bafba3d044a4f674fc9edc67ef6b8a6b,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ be9e0d516f59ae57f5553bcc3cf296d1,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ c2efb2dcacba6d3ccc175b6ce1b7ed0a,md5,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ c50c980d3f4b7ed970f083b0d37a6a6a,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ CB3D86E3EC2736EE1C883706FCA172F8,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ cb66a4d52a30bfcd980fe50e7e3f73f0,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ cf859f164870d113608a843e4a9600ab,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ d138a63436b4dd8c5a55d184e025ef99,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ d17caf6f5d6ba3393a3a865d1c43c3d2,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ D1D78CD1436991ADB9C005CC7C6B5B98,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ d48b580718b0e1617afc1dec028e9059,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ d749e0f8f2cd4e14178a787571534121,md5,crit,2026-04-23,It pays to be a forever student,https://blog.talosintelligence.com/it-pays-to-be-a-forever-student/ d7a68749635604d6d7297e4fa2530eb6,md5,crit,2026-04-13,JanelaRAT: a financial threat targeting users in Latin America,https://securelist.com/janelarat-financial-threat-in-latin-america/119332/ daea40562458fc7ae1adb812137d3d05,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ dbd8dbecaa80795c135137d69921fdba,md5,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ dbe51eabebf9d4ef9581ef99844a2944,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ DD0114FFACC6610B5A4A1CB0E79624CC,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ de8f0008b15f2404f721f76fac34456a,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ dfc64dd9d8f776ca5440c35fef5d406e,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ e0c10106626711f287ff91c0d6314407,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ E5E8EF65B4D265BD5FB77FE165131C2F,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ e6362a81991323e198a463a8ce255533,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ e66bae6e8621db2a835fa6721c3e5bbe,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ ebff5b7d4c5becb8715009df596c5a91,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ eefc28e9f2c0c0592af186be8e3570d2,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ f15a67899cfe4decff76d4cd1677c254,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ f4dbbb78979c1ee8a1523c77065e18a5,md5,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ F7037CC9A5659D5A1F68E88582242375,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ f8371097121549feb21e3bcc2eeea522,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ fa08b243f12e31940b8b4b82d3498804,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ fc546acf1735127db05fb5bc354093e0,md5,crit,2026-04-30,Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India,https://securelist.com/silver-fox-tax-notification-campaign/119575/ fd0dc5d4bba740c7b4cc78c4b19a5840,md5,crit,2026-04-20,FakeWallet crypto stealer spreading through iOS apps in the App Store,https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/ 145ef372c3e9c352eaaa53bb0893749163e49892,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 1ce1111702b765f5c4d09315ff1f0d914f7e5c70,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 2fa28ef1c6744bdc2021abd4048eefc777dccf22,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 3ce5b358c2ddd116ac9582efbb38354809999cb5,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 586edef41c3b3fba87bf0f0346c7e402f86fc11e,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 650fc6b3e4f62ecdc1ec5728f36bb46ba0f74d05,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 675cb83cec5f25ebbe8d9f90dea3d836fcb1c234,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 829f8be65dfe159d2b0dc7ee7a61a017acb54b7b,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 92e9dcaf7249110047ef121b7586c81d4b8cb4e5,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 952ed694b60c34ba12df9d392269eae3a4f11be4,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 99B454262DC26B081600E844371982A49D334E5E,sha1,crit,2026-03-10,Sednit reloaded: Back in the trenches,https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/ 9e089a733fb2740c0e408b2a25d8f5a451584cf6,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ bc544f455d7c06c8a1f3446160a6d9a4a8236b11,sha1,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ ca665b59bc590292f94c23e04fa458f90d7b20c9,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ D0DB619A7A160949528D46D20FC0151BF9775C32,sha1,crit,2026-03-10,Sednit reloaded: Back in the trenches,https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/ d475ace24b9aedebf431efc68f9db32d5ae761bd,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ de584703c78a60a56028f9834086facd1401b355,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ e6018cd482c012de8b69c64dc3165337bc121b86,sha1,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 00078aeeaca54b5d3c1237e964e9f956690b782e4ea160d81edc3c6b44e7f620,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 01c9484abc948daa525516464785009d1e7a63ffd6012b9e85b56477acc3e624,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 05eac3663d47a29da0d32f67e10d161f831138e10958dcd88b9dc97038948f69,sha256,crit,2026-04-06,Understanding Current Threats to Kubernetes Environments,https://unit42.paloaltonetworks.com/modern-kubernetes-threats/ 06361562cc53d759fb5a4c2b7aac348e4d23fe59be3b2871b14678365283ca47,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 07c69fc33271cf5a2ce03ac1fed7a3b16357aec093c5bf9ef61fbfa4348d0529,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 0880819ef821cff918960a39c1c1aada55a5593c61c608ea9215da858a86e349,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 09ca719e06a526f70aadf34fb66b136ed20f923776e6b33a33a9059ef674da22,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 0c0d206d5e68c0cf64d57ffa8bc5b1dad54f2dda52f24e96e02e237498cb9c3a,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 0c6a3555c4eb49f240d7e0e3edbfbb3c900f123033b4f6e99ac3724b9b76278f,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 0d83030ab8bfba675fc1661f0756b6770be7dd80b1b718de3d68a01f2e79a5f4,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 167ce57ef59a32a6a0ef4137785828077879092d7f83ddbc1755d6e69116e0ad,sha256,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ 18a24f83e807479438dcab7a1804c51a00dafc1d526698a66e0640d1e5dd671a,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 18f784b3bc9a0bcdcb1a8d7f51bc5f54323fc40cbd874119354ab609bef6e4cb,sha256,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ 1e559c51f19972e96fcc5a92d710732159cdae72f407864607a513b20729decb,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 20df0909a3a0ef26d74ae139763a380e49f77207aa1108d4640d8b6f14cab8ca,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 30015DD1E2CF4DBD49FFF9DDEF2AD4622DA2E60E5C0B6228595325532E948F14,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 37414d9ca87a132ec5081f3e7590d04498237746f9a7479c6b443accee17a062,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55,sha256,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ 3c1dbc3f56e91cc79f0014850e773a7f12bbfef06680f08f883b2bf12873eccc,sha256,crit,2026-04-23,It pays to be a forever student,https://blog.talosintelligence.com/it-pays-to-be-a-forever-student/ 3fbd2a2e82ceb5e91eadbad02cb45ac618324da9b1895d81ebe7de765dca30e7,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 41C4F2F37C0B257D1E20FE167F2098DA9D2E0A939B09ED3F63BC4FE010F8365C,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 4465bdeaddc8c049a67a3d5ec105b2f07dae72fa080166e51b8f487516eb8d07,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 4caaa18982cd4056fead54b98d57f9a2a1ddd654cf19a7ba2366dfadbd6033da,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 506690fcbd10fbe6f2b85b49a1fffa9d984c376c25ef6b73f764f670e932cab4,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 526ab39d1f56732e4e926715aaa797feb13b1ae86882ec570a4d292e7fdc3699,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 534b654531a6a540a144da9545ee343e1046f843d7de4c1091b46c3ee66a508b,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 56f21f412e898ad9e3ee05d5f44c44d9d7bcb9ecbfbdb9de11b8fa5a637aeef6,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 58401c195fe0a6204b42f5f90995ece5fab74ce7c69c67a24c61a057325af668,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 59336a964f110c25c112bcc5adca7090296b54ab33fa95c0744b94f8a0d80c0f,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 5966513a12a5601b262c4ee4d3e32091feb05b666951d06431c30a8cece83010,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 5b5fbc627502c5797d97b206b6dcf537889e6bea6d4e81a835e103e311690e22,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 5bb67e88846096f1f8d42a0f0350c9c46260591567612ff9af46f98d1b7571cd,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 5e2ab672c3f98f21925bd26d9a9bba036b67d84fde0dfdbe2cf9b85b170cab71,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 5e2ba7c4c53fa6e0cef58011acdd50682cf83fb7b989712d2fcf1b5173bad956,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe,sha256,crit,2026-04-23,It pays to be a forever student,https://blog.talosintelligence.com/it-pays-to-be-a-forever-student/ 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 61ff00a81b19624adaad425b9129ba2f312f4ab76fb5ddc2c628a5037d31a4ba,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 6328a34b26a63423b555a61f89a6a0525a534e9c88584c815d937910f1ddd538,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 66fe485f29a6405265756aaf7f822b9ceb56e108afabd414ee222ee9657dd7e2,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 7321caa303fe96ded0492c747d2f353c4f7d17185656fe292ab0a59e2bd0b8d9,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 7b47ed28e84437aee64ffe9770d315c1b984135105f7f608a8b9579517bc0695,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 7b5cc85e82249b0c452c66563edca498ce9d0c70badef04ab2c52acef4d629ca,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 7bbb21fec19512d932b7a92652ed0c8f0fedea89f34b9d6f267cf39de0eb9b20,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 7d2c9b4a3942f6029d2de7f73723b505b64caa8e1763e4eb1f134360465185d0,sha256,crit,2026-04-06,Understanding Current Threats to Kubernetes Environments,https://unit42.paloaltonetworks.com/modern-kubernetes-threats/ 7df6cef7ab9aae2ea08f2f872f6456b5d51d896ddda907a238cd6668ccdc4bb7,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 7e00030a35504de5c0d16020aa40cbaf5d36561e0716feb8f73235579a7b0909,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 7f30259d72eb7432b2454c07be83365ecfa835188185b35b30d11654aadf86a0,sha256,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ 822dd269ec10459572dfaaefe163dae693c344249a0161953f0d5cdd110bd2a0,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 8449341ddc3f7fcc2547639e21e704400ca6a8a6841ae74e57c04445b1276a10,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 887e1f5b5b50162a60bd03b66269e0ae545d0aef0583c1c5b00972152ad7e073,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ 8b018452fdd64c346af4d97da420681e2e0b55b8c9ce2b8de75e330993b759a0,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 8fcb4d3d4df61719ee3da98241393779290e0efcd88a49e363e2a2dfbc04dae9,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59,sha256,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ 919f292a07a37f163f88527e725406187c8ecc637387ad24853fe49ce4e6ddf4,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 93a09e54e607930dfc068fcbc7ea2c2ea776c504aa20a8ca12100a28cfdcc75a,sha256,crit,2026-04-15,The n8n n8mare: How threat actors are misusing AI workflow automation,https://blog.talosintelligence.com/the-n8n-n8mare/ 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974,sha256,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ 9a10e1faa86a5d39417cae44da5adf38824dfb9a16432e34df766aa1dc9e3525,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ 9c64f1c7eba080b4e5ff17369ddcd00b9fe2d47dacdc61444b4cbfebb23a166c,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ 9df711c3aef2bba17b622ddfd955452f8d8eb55899528fbc13d9540c52f13402,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507,sha256,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ a224dd73b7ed33e0bf6a2ea340c8f8859dfa9ec5736afa8baea6225bf066b248,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91,sha256,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ a98e04dec3a7fe507eb30c72da808bad60bc14d9d80f9770ec99c438faa85a1a,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ ad8ba560ae5c4af4758bc68cc6dcf43bae0e0bbf9da680a8dc60a9ef78e22ff7,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ aeaa389453f04a9e79ff6c8b7b66db7b65d4aaffc6cac0bd7957257a30468e33,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ bb470a803b6d7b12fb596d2e4a18ea9ca91f40fd34ded7f01a487eed9a1d814d,sha256,crit,2026-04-06,Understanding Current Threats to Kubernetes Environments,https://unit42.paloaltonetworks.com/modern-kubernetes-threats/ bd04715c5c43c862c38a4ad6c2167ad082a352881e04a35117af9bbfad8e5613,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ bef7e2c5a92c4fa4af17791efc1e46311c0f304796f1172fce192f5efc40f5d7,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ c11a210cb98095422d0d33cbd4e9ecc86b95024f956ede812e17c97e79591cfa,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ c321933e4e5970ba7299fe21778dab9398994c22ca0ba0422c6cbc3fbb95ea26,sha256,crit,2026-04-16,A Deep Dive Into Attempted Exploitation of CVE-2023-33538,https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/ c37c0ae9641d2e5329fcdee847a756bf1140fdb7f0b7c78a40fdc39055e7d926,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ cd08115806662469bbedec4b03f8427b97c8a4b3bc1442dc18b72b4e19395fe3,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ cdc05cd30eb53315dadb081a7b942bb876f0d252d20e8ed4d2f36be79ee691fa,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ D53FCC01038E20193FBD51B7400075CF7C9C4402B73DA7B0DB836B000EBD8B1C,sha256,crit,2025-12-18,LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan,https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/ d5edd791021b966fb6af0ace09319ace7b97d6642363ef27b3d5056ca654a94c,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ D8CAF4581C9F0000C7568D78FB7D2E595AB36134E2346297D78615942CBBD727,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ da2b170994031477091be89c8835ff9db1a5304f3f2f25344654f44d0430ced1,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ e49c2732fb9861548208a78e72996b9c3c470b6b562576924bcc3a9fb75bf9ff,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ e4edd126e139493d2721d50c3a8c49d3a23ad7766d0b90bc45979ba675f35fea,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba,sha256,crit,2026-04-30,"Great responsibility, without great power",https://blog.talosintelligence.com/great-responsibility-without-great-power/ e6310d8a003d7ac101a6b1cd39ff6c6a88ee454b767c1bdce143e04bc1113243,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ e64e152afe2c722d750f10259626f357cdea40420c5eedae37969fbf13abbecf,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ e775049d1ecf68dee870f1a5c36b2f3542d1182782eb497b8ccfd2309c400b3a,sha256,crit,2026-04-23,fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet,https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/ e87a55d3ba1c47e84207678b88cacb631a32d0cb3798610e7ef2d15307303c49,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ e9b1e069efc778c1e77fb3f5fcc3bd3580bbc810604cbf4347897ddb4b8c163b,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ ecce7ae5ffc9f57bb70efd3ea136a2923f701334a8cd47d4fbf01a97fd22859c,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ f35475829991b303c5efc2ee0f343dd38f8614e8b5e69db683923135f85cf60d,sha256,crit,2026-04-24,The npm Threat Landscape: Attack Surface and Mitigations,https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/ f398f06eefcd3558c38820a397e3193856e4e6e7c67f81ecc8e533275284b152,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ f7084b0229dce605ccc5506b14acd4d954a496da4b6134a294844ca8d601970d,sha256,crit,2026-03-31,Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure,https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/ f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf,sha256,crit,2026-04-01,Threat Brief: Widespread Impact of the Axios Supply Chain Attack,https://unit42.paloaltonetworks.com/axios-supply-chain-attack/ CVE-2008-0015,cve,high,2026-02-17,CISA KEV: CVE-2008-0015 — Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2009-0238,cve,high,2026-04-14,CISA KEV: CVE-2009-0238 — Microsoft Office Remote Code Execution,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2009-0556,cve,high,2026-01-07,CISA KEV: CVE-2009-0556 — Microsoft Office PowerPoint Code Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2012-1854,cve,high,2026-04-13,CISA KEV: CVE-2012-1854 — Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2014-6271,cve,high,2026-04-29,AI-powered honeypots: Turning the tables on malicious AI agents,https://blog.talosintelligence.com/ai-powered-honeypots-turning-the-tables-on-malicious-ai-agents/ CVE-2017-7921,cve,high,2026-03-05,CISA KEV: CVE-2017-7921 — Hikvision Multiple Products Improper Authentication Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2018-14634,cve,high,2026-01-26,CISA KEV: CVE-2018-14634 — Linux Kernel Integer Overflow Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2018-4063,cve,high,2025-12-12,CISA KEV: CVE-2018-4063 — Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2019-19006,cve,high,2026-02-03,CISA KEV: CVE-2019-19006 — Sangoma FreePBX Improper Authentication Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2020-7796,cve,high,2026-02-17,CISA KEV: CVE-2020-7796 — Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2020-9715,cve,high,2026-04-13,CISA KEV: CVE-2020-9715 — Adobe Acrobat Use-After-Free Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2021-22054,cve,high,2026-03-09,CISA KEV: CVE-2021-22054 — Omnissa Workspace ONE Server-Side Request Forgery,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2021-22175,cve,high,2026-02-03,CISA KEV: CVE-2021-22175 — GitLab Server-Side Request Forgery (SSRF) Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2021-22681,cve,high,2026-03-05,CISA KEV: CVE-2021-22681 — Rockwell Multiple Products Insufficient Protected Credentials Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2021-26828,cve,high,2025-12-03,CISA KEV: CVE-2021-26828 — OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2021-26829,cve,high,2025-11-28,CISA KEV: CVE-2021-26829 — OpenPLC ScadaBR Cross-site Scripting Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2021-30952,cve,high,2026-03-05,CISA KEV: CVE-2021-30952 — Apple Multiple Products Integer Overflow or Wraparound Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2021-39935,cve,high,2026-02-03,CISA KEV: CVE-2021-22175 — GitLab Server-Side Request Forgery (SSRF) Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2022-20775,cve,high,2026-02-25,CISA KEV: CVE-2022-20775 — Cisco SD-WAN Path Traversal Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2022-37055,cve,high,2025-12-08,CISA KEV: CVE-2022-37055 — D-Link Routers Buffer Overflow Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2023-21529,cve,high,2026-04-13,CISA KEV: CVE-2023-21529 — Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2023-27351,cve,high,2026-04-20,CISA KEV: CVE-2023-27351 — PaperCut NG/MF Improper Authentication Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2023-36424,cve,high,2026-04-13,CISA KEV: CVE-2023-36424 — Microsoft Windows Out-of-Bounds Read Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2023-43000,cve,high,2025-12-15,CISA KEV: CVE-2023-43000 — Apple Multiple products Use-After-Free Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2023-52163,cve,high,2025-12-22,CISA KEV: CVE-2023-52163 — Digiever DS-2105 Pro Missing Authorization Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2024-27199,cve,high,2026-04-20,CISA KEV: CVE-2024-27199 — JetBrains TeamCity Relative Path Traversal Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2024-37079,cve,high,2026-01-23,CISA KEV: CVE-2024-37079 — Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2024-43468,cve,high,2026-02-12,CISA KEV: CVE-2024-43468 — Microsoft Configuration Manager SQL Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2024-7694,cve,high,2026-02-17,CISA KEV: CVE-2024-7694 — TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-11371,cve,high,2025-11-04,CISA KEV: CVE-2025-11371 — Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-11953,cve,high,2026-02-05,CISA KEV: CVE-2025-11953 — React Native Community CLI OS Command Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-13223,cve,high,2025-11-19,CISA KEV: CVE-2025-13223 — Google Chromium V8 Type Confusion Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-14174,cve,high,2025-12-12,CISA KEV: CVE-2025-14174 — Google Chromium Out of Bounds Memory Access Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-14611,cve,high,2025-12-15,CISA KEV: CVE-2025-14611 — Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-14733,cve,high,2025-11-12,CISA KEV: CVE-2025-14733 — WatchGuard Firebox Out of Bounds Write Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-26399,cve,high,2026-02-03,CISA KEV: CVE-2025-26399 — SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-2749,cve,high,2026-01-12,CISA KEV: CVE-2025-2749 — Kentico Xperience Path Traversal Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-31125,cve,high,2025-11-12,CISA KEV: CVE-2025-31125 — Vite Vitejs Improper Access Control Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-31277,cve,high,2026-03-20,CISA KEV: CVE-2025-43510 — Apple Multiple Products Improper Locking Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-32432,cve,high,2026-03-20,CISA KEV: CVE-2025-32432 — Craft CMS Code Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-32975,cve,high,2026-04-20,CISA KEV: CVE-2025-32975 — Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-34026,cve,high,2026-01-22,CISA KEV: CVE-2025-34026 — Versa Concerto Improper Authentication Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-37164,cve,high,2026-01-07,CISA KEV: CVE-2025-37164 — Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-40536,cve,high,2026-02-12,CISA KEV: CVE-2025-40536 — SolarWinds Web Help Desk Security Control Bypass Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-40551,cve,high,2026-02-03,CISA KEV: CVE-2025-26399 — SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-40602,cve,high,2025-12-17,CISA KEV: CVE-2025-40602 — SonicWall SMA1000 Missing Authorization Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-43510,cve,high,2026-03-20,CISA KEV: CVE-2025-43510 — Apple Multiple Products Improper Locking Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-43520,cve,high,2026-02-12,CISA KEV: CVE-2025-43520 — Apple Multiple Products Classic Buffer Overflow Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-43529,cve,high,2025-12-15,CISA KEV: CVE-2023-43000 — Apple Multiple products Use-After-Free Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-47813,cve,high,2026-03-16,CISA KEV: CVE-2025-47813 — Wing FTP Server Information Disclosure Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-48572,cve,high,2025-12-02,CISA KEV: CVE-2025-48572 — Android Framework Privilege Escalation Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-48633,cve,high,2025-12-02,CISA KEV: CVE-2025-48633 — Android Framework Information Disclosure Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-48700,cve,high,2026-03-18,CISA KEV: CVE-2025-48700 — Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-48703,cve,high,2025-11-04,CISA KEV: CVE-2025-48703 — CWP Control Web Panel OS Command Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-49113,cve,high,2026-02-20,CISA KEV: CVE-2025-49113 — RoundCube Webmail Deserialization of Untrusted Data Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-50165,cve,high,2025-12-22,Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component,https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/ CVE-2025-52691,cve,high,2026-01-26,CISA KEV: CVE-2025-52691 — SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-53521,cve,high,2026-03-27,CISA KEV: CVE-2025-53521 — F5 BIG-IP Stack-Based Buffer Overflow Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-54068,cve,high,2026-03-20,CISA KEV: CVE-2025-54068 — Laravel Livewire Code Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-54313,cve,high,2026-01-22,CISA KEV: CVE-2025-54313 — Prettier eslint-config-prettier Embedded Malicious Code Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-58360,cve,high,2025-12-11,CISA KEV: CVE-2025-58360 — OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-59374,cve,high,2025-12-17,CISA KEV: CVE-2025-59374 — ASUS Live Update Embedded Malicious Code Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-59718,cve,high,2025-12-16,CISA KEV: CVE-2025-59718 — Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-59719,cve,high,2025-12-16,CISA KEV: CVE-2025-59718 — Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-60710,cve,high,2026-04-13,CISA KEV: CVE-2025-60710 — Microsoft Windows Link Following Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-61757,cve,high,2025-11-21,CISA KEV: CVE-2025-61757 — Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-6218,cve,high,2025-12-09,CISA KEV: CVE-2025-6218 — RARLAB WinRAR Path Traversal Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-62215,cve,high,2025-11-12,CISA KEV: CVE-2025-62215 — Microsoft Windows Race Condition Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-62221,cve,high,2025-12-09,CISA KEV: CVE-2025-62221 — Microsoft Windows Use After Free Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-64328,cve,high,2025-11-18,CISA KEV: CVE-2025-64328 — Sangoma FreePBX OS Command Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-64446,cve,high,2025-11-14,CISA KEV: CVE-2025-64446 — Fortinet FortiWeb Path Traversal Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-66644,cve,high,2025-12-08,CISA KEV: CVE-2025-66644 — Array Networks ArrayOS AG OS Command Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-68461,cve,high,2026-02-20,CISA KEV: CVE-2025-68461 — RoundCube Webmail Cross-site Scripting Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-68613,cve,high,2026-03-11,CISA KEV: CVE-2025-68613 — n8n Improper Control of Dynamically-Managed Code Resources Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2025-68645,cve,high,2026-01-22,CISA KEV: CVE-2025-68645 — Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-0390,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-1603,cve,high,2026-03-09,CISA KEV: CVE-2026-1603 — Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20045,cve,high,2026-01-21,CISA KEV: CVE-2026-20045 — Cisco Unified Communications Products Code Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20122,cve,high,2026-04-20,CISA KEV: CVE-2026-20122 — Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20127,cve,high,2026-02-25,CISA KEV: CVE-2026-20127 — Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20128,cve,high,2026-04-20,CISA KEV: CVE-2026-20128 — Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20131,cve,high,2026-03-19,CISA KEV: CVE-2026-20131 — Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20133,cve,high,2026-04-20,CISA KEV: CVE-2026-20133 — Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20700,cve,high,2026-02-12,CISA KEV: CVE-2025-43520 — Apple Multiple Products Classic Buffer Overflow Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20805,cve,high,2026-01-13,CISA KEV: CVE-2026-20805 — Microsoft Windows Information Disclosure Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-20963,cve,high,2026-03-18,CISA KEV: CVE-2026-20963 — Microsoft SharePoint Deserialization of Untrusted Data Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-21385,cve,high,2026-03-03,CISA KEV: CVE-2026-21385 — Qualcomm Multiple Chipsets Memory Corruption Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-21514,cve,high,2026-02-10,CISA KEV: CVE-2026-21514 — Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-21519,cve,high,2026-02-10,CISA KEV: CVE-2026-21519 — Microsoft Windows Type Confusion Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-21525,cve,high,2026-02-10,CISA KEV: CVE-2026-21525 — Microsoft Windows NULL Pointer Dereference Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-21533,cve,high,2026-02-10,CISA KEV: CVE-2026-21533 — Microsoft Windows Improper Privilege Management Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-21643,cve,high,2026-04-13,CISA KEV: CVE-2026-21643 — Fortinet FortiClient EMS SQL Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-22719,cve,high,2026-03-03,CISA KEV: CVE-2026-22719 — Broadcom VMware Aria Operations Command Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-22769,cve,high,2026-02-18,CISA KEV: CVE-2026-22769 — Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-23666,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-23760,cve,high,2026-01-26,CISA KEV: CVE-2026-24858 — Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-24061,cve,high,2026-01-26,CISA KEV: CVE-2026-24061 — GNU InetUtils Argument Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-24423,cve,high,2026-02-05,CISA KEV: CVE-2026-24423 — SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-24858,cve,high,2026-01-26,CISA KEV: CVE-2026-24858 — Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-25108,cve,high,2026-02-24,CISA KEV: CVE-2026-25108 — Soliton Systems K.K FileZen OS Command Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-26151,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-26169,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-26173,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-26177,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-26182,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-27906,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-27908,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-27909,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-27913,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-27914,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-27921,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-27922,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-3055,cve,high,2026-03-30,CISA KEV: CVE-2026-3055 — Citrix NetScaler Out-of-Bounds Read Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-32070,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32075,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32093,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32152,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32154,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32155,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32157,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32162,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32190,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32201,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-32225,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-33017,cve,high,2026-03-25,CISA KEV: CVE-2026-33017 — Langflow Code Injection Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-33114,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-33115,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-33634,cve,high,2026-03-26,CISA KEV: CVE-2026-33634 — Aquasecurity Trivy Embedded Malicious Code Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-33825,cve,high,2026-04-22,CISA KEV: CVE-2026-33825 — Microsoft Defender Insufficient Granularity of Access Control Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-33826,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-33827,cve,high,2026-04-14,Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities,https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/ CVE-2026-34621,cve,high,2026-04-13,CISA KEV: CVE-2026-34621 — Adobe Acrobat and Reader Prototype Pollution Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-3502,cve,high,2026-02-12,CISA KEV: CVE-2026-3502 — TrueConf Client Download of Code Without Integrity Check Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-35616,cve,high,2026-04-06,CISA KEV: CVE-2026-35616 — Fortinet FortiClient EMS Improper Access Control Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-3909,cve,high,2026-03-13,CISA KEV: CVE-2026-3909 — Google Skia Out-of-Bounds Write Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-3910,cve,high,2026-03-13,CISA KEV: CVE-2026-3910 — Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-39987,cve,high,2026-04-23,CISA KEV: CVE-2026-39987 — Marimo Remote Code Execution Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog CVE-2026-5281,cve,high,2026-02-17,CISA KEV: CVE-2026-5281 — Google Dawn Use-After-Free Vulnerability,https://www.cisa.gov/known-exploited-vulnerabilities-catalog chiaselinks.com,domain,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ crystalxrat.top,domain,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ git.parat.swiss,domain,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ gofile.io,domain,high,2026-03-27,A cunning predator: How Silver Fox preys on Japanese firms this tax season,https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/ maper.info,domain,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ paste.kealper.com,domain,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ pinhole.rootcode.ru,domain,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ rlim.com,domain,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ w.anadnet.com,domain,high,2026-04-29,Popular WordPress redirect plugin hid dormant backdoor for years,https://www.bleepingcomputer.com/news/security/popular-wordpress-redirect-plugin-hid-dormant-backdoor-for-years/ webcrystal.lol,domain,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ webcrystal.sbs,domain,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ 1.3.6.1,ipv4,high,2026-04-21,Bad Apples: Weaponizing native macOS primitives for movement and execution,https://blog.talosintelligence.com/bad-apples-weaponizing-native-macos-primitives-for-movement-and-execution/ 05BACBE163EF0393C2416CBD05E45E74,md5,high,2026-03-26,An AI gateway designed to steal your data,https://securelist.com/litellm-supply-chain-attack/119257/ 0FCCC8E3A03896F45726203074AE225D,md5,high,2026-03-26,An AI gateway designed to steal your data,https://securelist.com/litellm-supply-chain-attack/119257/ 107484d66423cb601f418344cd648f12,md5,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ 1A68AE614FB2D8875CB0573E6A721B46,md5,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ 2DBE6DE177241C144D06355C381B868C,md5,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ 2E3A4412A7A487B32C5715167C755D08,md5,high,2026-03-26,An AI gateway designed to steal your data,https://securelist.com/litellm-supply-chain-attack/119257/ 34a0f70ab100c47caaba7a5c85448e3d,md5,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ 47ACCB0ECFE8CCD466752DDE1864F3B0,md5,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ 49C74B302BFA32E45B7C1C5780DD0976,md5,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ 7528bf597fd7764fcb7ec06512e073e0,md5,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ 8354223cd6198b05904337b5dff7772b,md5,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ 85ED77A21B88CAE721F369FA6B7BBBA3,md5,high,2026-03-26,An AI gateway designed to steal your data,https://securelist.com/litellm-supply-chain-attack/119257/ 88C60DF2A1414CBF24430A74AE9836E0,md5,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ CDE4951BEE7E28AC8A29D33D34A41AE5,md5,high,2026-03-26,An AI gateway designed to steal your data,https://securelist.com/litellm-supply-chain-attack/119257/ E540E9797E3B814BFE0A82155DFE135D,md5,high,2026-04-01,"A laughing RAT: CrystalX combines spyware, stealer, and prankware features",https://securelist.com/crystalx-rat-with-prankware-features/119283/ F5560871F6002982A6A2CC0B3EE739F7,md5,high,2026-03-26,An AI gateway designed to steal your data,https://securelist.com/litellm-supply-chain-attack/119257/ 3F3767D05E5A91184005D98427074711F68D9950,sha1,high,2025-12-22,Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component,https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/ 4EC1DC0431432BC318E78C520387911EC44F84FC,sha1,high,2025-12-22,Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component,https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/ 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6,sha1,high,2026-01-23,ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025,https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/ 5887D96565749067564BABCD3DC5D107AB6666BD,sha1,high,2025-12-22,Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component,https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/ 60c8128c48aac890a6d01448d1829a6edcdce0d2,sha1,high,2026-03-19,Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis,https://www.sentinelone.com/labs/building-an-adversarial-consensus-engine-multi-agent-llms-for-automated-malware-analysis/ 678aa572faa73f6873d24f24e423d315e7eb2c2d,sha1,high,2026-03-19,Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis,https://www.sentinelone.com/labs/building-an-adversarial-consensus-engine-multi-agent-llms-for-automated-malware-analysis/ d85cef60cdb9e8d0f3cb3546de6ab657f9498ac7,sha1,high,2026-04-09,The long road to your crypto: ClipBanker and its marathon infection chain,https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ f5149543014e5b1bd7030711fd5c7d2a4bef0c2f,sha1,high,2026-03-19,Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis,https://www.sentinelone.com/labs/building-an-adversarial-consensus-engine-multi-agent-llms-for-automated-malware-analysis/ CVE-2026-20884,cve,med,2026-04-16,"Foxit, LibRaw vulnerabilities",https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/ CVE-2026-20889,cve,med,2026-04-16,"Foxit, LibRaw vulnerabilities",https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/ CVE-2026-20911,cve,med,2026-04-16,"Foxit, LibRaw vulnerabilities",https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/ CVE-2026-21413,cve,med,2026-04-16,"Foxit, LibRaw vulnerabilities",https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/ CVE-2026-24450,cve,med,2026-04-16,"Foxit, LibRaw vulnerabilities",https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/ CVE-2026-24660,cve,med,2026-04-16,"Foxit, LibRaw vulnerabilities",https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/ CVE-2026-3779,cve,med,2026-04-16,"Foxit, LibRaw vulnerabilities",https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/