#threatintel

9 posts · Last used 22d

Back to Timeline
@SecurityWriter@infosec.exchange · Feb 22, 2026
Up your CTI game by knowing the correct threat actor names for executive briefings. Security isn’t about being right, it’s about being accurate, after all: https://addons.mozilla.org/en-US/firefox/addon/gayint-name-converter/ Courtesy of @gayint@infosec.exchange #threatintel #cti #security #cybersecurity
View on infosec.exchange
8
0
6
@hbrpgm@adalta.social · Feb 12, 2026
📺 https://peer.adalta.social/w/szNwziYVqZLTBwCgA6NWWf 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_N29YJ_DS/1) Une faille d'injection de code dans le système d'aide menace la stabilité des postes de travail critiques. #cybersecurity #security #threatintel #cve #osint
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026
📺 https://peer.adalta.social/w/mE7ZhqmZWLS2X9HU5NGNPL 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_N29YJ_DS/1) A high-severity code injection flaw in KeePass's help system, while not actively exploited, presents a tangible risk of application crashes and workflow disruption through crafted HTML content. #cybersecurity #security #threatintel #cve #osint
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026
📺 https://peer.adalta.social/w/wXivcJdGsJsNDv46vvaEjc 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_N29YJ_DS/1) Eine Code-Injection-Schwachstelle im Hilfesystem der Passwort-Manager-Software kann zu Anwendungsabstürzen führen, stellt jedoch ein moderates Risiko dar. #cybersecurity #security #threatintel #cve #osint
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026
📺 https://peer.adalta.social/w/1yG6uMbdZ6ERmwL2Sfck4Q 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_HW7Y74-Y/1) Une vulnérabilité publique et exploitée sur un équipement non maintenu représente un risque de priorité 1 pour les réseaux hérités. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026
📺 https://peer.adalta.social/w/snU5nCd7kRYQC28d23s8xm 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_HW7Y74-Y/1) A publicly exploitable, remote OS command injection flaw in the unmaintained D-Link DIR-615 router poses a critical risk to consumer and small office networks. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026
📺 https://peer.adalta.social/w/shXDXweVZNtm8Qt8kPLhEj 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_HW7Y74-Y/1) Öffentlich verfügbarer Exploit für eine Remote-Command-Injection in der DIR-615-Firmware stellt ein kritisches Risiko für ungepatchte, ungewartete Geräte dar. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 05, 2026
📺 https://peer.adalta.social/w/oKrbQ3HamL2pFvNH2jjP2z 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_J4ZYBSFG/1) An unquoted service path vulnerability in a widely used VPN client enables attackers with local access to gain full SYSTEM control over Windows endpoints. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 05, 2026
📺 https://peer.adalta.social/w/g9qXhTZRu5rcZyA45zxm2U 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_J4ZYBSFG/1) Ein unquotierter Dienstpfad in Version 9.2 ermöglicht lokalen Angreifern die Ausführung von Code mit SYSTEM-Rechten. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0

You've seen all posts