Auto-updating • Public sources • Link-out only
Security Intel
Designed for engineers through CISOs: what is being exploited and what deserves attention. Always validate in your environment.
Feed status
CISA KEVOK
AquaOK
Palo Alto Unit 42OK
SnykOK
Some sources are temporarily unavailable.
Updated Apr 17, 2026 (auto-refresh ~15 min)
Unified feed
Take Reality Assessment →Showing 30 of 50
Palo Alto Unit 42Apr 16, 2026
Open ↗A Deep Dive Into Attempted Exploitation of CVE-2023-33538
CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware. The post A Deep Dive Into Attempted Exploitation of CVE-2023-33538 appeared first on Unit 42.
CISA KEVApr 16, 2026High
Open ↗CVE-2026-34197 — Apache ActiveMQ
Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.
CISA KEVApr 14, 2026High
Open ↗CVE-2009-0238 — Microsoft Office
Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.
CISA KEVApr 14, 2026High
Open ↗CVE-2026-32201 — Microsoft SharePoint Server
Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.
CISA KEVApr 13, 2026High
Open ↗CVE-2012-1854 — Microsoft Visual Basic for Applications (VBA)
Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.
CISA KEVApr 13, 2026High
Open ↗CVE-2025-60710 — Microsoft Windows
Microsoft Windows contains a link following vulnerability that allows for privilege escalation
CISA KEVApr 13, 2026High
Open ↗CVE-2023-21529 — Microsoft Exchange Server
Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.
CISA KEVApr 13, 2026High
Open ↗CVE-2023-36424 — Microsoft Windows
Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation
CISA KEVApr 13, 2026High
Open ↗CVE-2020-9715 — Adobe Acrobat
Adobe Acrobat contains a use-after-free vulnerability that allows for code execution
CISA KEVApr 13, 2026High
Open ↗CVE-2026-21643 — Fortinet FortiClient EMS
Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
CISA KEVApr 13, 2026High
Open ↗CVE-2026-34621 — Adobe Acrobat and Reader
Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.
SnykApr 10, 2026
Open ↗Governing Security in the Age of Infinite Signal – From Discovery to Control
AI can find vulnerabilities at scale, but enterprise security now depends on control, validation, and governance that can keep up.
Palo Alto Unit 42Apr 08, 2026
Open ↗Cracks in the Bedrock: Agent God Mode
Unit 42 reveals "Agent God Mode" in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration risks. The post Cracks in the Bedrock: Agent God Mode appeared first on Unit 42.
CISA KEVApr 08, 2026High
Open ↗CVE-2026-1340 — Ivanti Endpoint Manager Mobile (EPMM)
Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.
Palo Alto Unit 42Apr 07, 2026
Open ↗Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox
Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore's sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox appeared first on Unit 42.
SnykApr 07, 2026
Open ↗Secure What Matters: Scaling Effortless Container Security for the AI Era
Announcing Snyk Container Registry Sync GA for automated image management and runtime intelligence. Scale container security effortlessly for the fast-paced AI era.
Palo Alto Unit 42Apr 06, 2026
Open ↗Understanding Current Threats to Kubernetes Environments
Unit 42 uncovers escalating Kubernetes attacks, detailing how threat actors exploit identities and critical vulnerabilities to compromise cloud environments. The post Understanding Current Threats to Kubernetes Environments appeared first on Unit 42.
CISA KEVApr 06, 2026High
Open ↗CVE-2026-35616 — Fortinet FortiClient EMS
Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
Palo Alto Unit 42Apr 03, 2026
Open ↗When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications
Unit 42 research on multi-agent AI systems on Amazon Bedrock reveals new attack surfaces and prompt injection risks. Learn how to secure your AI applications. The post When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications appeared first on Unit 42.
SnykApr 02, 2026
Open ↗You Patched LiteLLM, But Do You Know Your AI Blast Radius?
The LiteLLM compromise showed AI risk extends beyond dependencies. Use Evo AI-SPM to map your full AI blast radius, securing connected models, tools, and agent workflows.1
CISA KEVApr 02, 2026High
Open ↗CVE-2026-3502 — TrueConf Client
TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
Palo Alto Unit 42Apr 01, 2026
Open ↗Threat Brief: Widespread Impact of the Axios Supply Chain Attack
Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup. The post Threat Brief: Widespread Impact of the Axios Supply Chain Attack appeared first on Unit 42.
SnykApr 01, 2026
Open ↗Building AI Security with Our Customers: 5 Lessons from Evo’s Design Partner Program
Learn 5 key lessons from Snyk’s Evo design partner program. Discover how AI discovery, risk intelligence, and policy automation help teams secure generative AI and govern AI sprawl at scale.
CISA KEVApr 01, 2026High
Open ↗CVE-2026-5281 — Google Dawn
Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Palo Alto Unit 42Mar 31, 2026
Open ↗Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure
TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure appeared first on Unit 42.
Palo Alto Unit 42Mar 31, 2026
Open ↗Double Agents: Exposing Security Blind Spots in GCP Vertex AI
Unit 42 uncovers a "double agent" flaw in Google Cloud's Vertex AI, demonstrating how overprivileged AI agents can compromise cloud environments. The post Double Agents: Exposing Security Blind Spots in GCP Vertex AI appeared first on Unit 42.
SnykMar 30, 2026
Open ↗Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT
Meta description: Malicious versions of the Axios npm package (1.14.1 and 0.30.4) were published via a compromised maintainer account, injecting a hidden dependency that deploys a cross-platform remote access trojan. Here's what happened, who's affected, and how to check your exposure.
CISA KEVMar 30, 2026High
Open ↗CVE-2026-3055 — Citrix NetScaler
Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.
CISA KEVMar 27, 2026High
Open ↗CVE-2025-53521 — F5 BIG-IP
F5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.
Palo Alto Unit 42Mar 26, 2026
Open ↗Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26)
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26) appeared first on Unit 42.
Notes
- • This page aggregates public feeds and links out; it does not scan your environment.
- • Treat items as signals: verify applicability, exposure, and exploitability before action.
- • For exec-ready prioritization, pair this with the Reality Assessment.