Fixed Intel
Bug

Vulnerabilities

CVE disclosures, zero-days, and vulnerability management

Vulnerabilities

Number Usage in Passwords: Take Two, (Thu, Apr 9th)

SANS ISC
Vulnerabilities

Number Usage in Passwords: Take Two, (Thu, Apr 9th)

In a previous diary [1], we looked to see how numbers were used within passwords submitted to honeypots. One of the items of interest was how dates, and more specifically years, were represented within the data and how that changed over time. It is often seen that years and seasons are used in pa...

SANS ISCApr 9, 20261m3
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)

SANS ISC
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)

This is the seventh update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0;"When the Security Scanner Became the Weapon"&#;x26;#;xc2;&#;x26;#;xa0;(v3.0, March 25, 2026).&#;x26;#;xc2;&#;x26;#;xa0;Update 006&#;x26;#;xc2;&#;x26;#;xa0;covered developments thr...

SANS ISCApr 8, 20261m3
Vulnerabilities

More Honeypot Fingerprinting Scans, (Wed, Apr 8th)

SANS ISC
Vulnerabilities

More Honeypot Fingerprinting Scans, (Wed, Apr 8th)

One question that often comes up when I talk about honeypots: Are attackers able to figure out if they are connected to a honeypot? The answer is pretty simple: Yes!

SANS ISCApr 8, 20261m3
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsApr 8, 20261m3
Vulnerabilities

ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)

SANS ISC
Vulnerabilities

ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)

No description available.

SANS ISCApr 8, 20261m3
Vulnerabilities

A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)

SANS ISC
Vulnerabilities

A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)

Webshells remain a popular method for attackers to maintain persistence on a compromised web server. Many "arbitrary file write" and "remote code execution" vulnerabilities are used to drop small files on systems for later execution of additional payloads. The names of these files keep changing a...

SANS ISCApr 7, 20261m3
Vulnerabilities

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

CISA Alerts
Vulnerabilities

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

U.S. organizations should review the TTPs and IOCs in this advisory for indications of current or historical activity on their networks, and apply the recommendations listed in this advisory to reduce the risk of compromise.

CISA AlertsApr 7, 202616m3
Vulnerabilities

Mitsubishi Electric GENESIS64 and ICONICS Suite products

CISA Alerts
Vulnerabilities

Mitsubishi Electric GENESIS64 and ICONICS Suite products

View CSAF

CISA AlertsApr 7, 20264m3
Vulnerabilities

ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)

SANS ISC
Vulnerabilities

ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)

No description available.

SANS ISCApr 7, 20261m3
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsApr 6, 20261m3
Vulnerabilities

How often are redirects used in phishing in 2026?, (Mon, Apr 6th)

SANS ISC
Vulnerabilities

How often are redirects used in phishing in 2026?, (Mon, Apr 6th)

In one of his recent diaries, Johannes discussed how open redirects are actively being sought out by threat actors[1], which made me wonder about how commonly these mechanisms are actually misused…

SANS ISCApr 6, 20261m3
Vulnerabilities

ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)

SANS ISC
Vulnerabilities

ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)

No description available.

SANS ISCApr 6, 20261m3