Published Date All 2025-11-09 2025-11-08 2025-11-07 2025-11-06 2025-11-05 2025-11-04 2025-11-03 2025-11-02 2025-11-01 2025-10-31 2025-10-30 2025-10-29 2025-10-28 2025-10-27 2025-10-26 2025-10-25 2025-10-24 2025-10-23 2025-10-22 2025-10-21 2025-10-20 2025-10-19 2025-10-18 2025-10-17 2025-10-16 2025-10-15 2025-10-14 2025-10-13
Tags All .NET .NET AppDomainManager injection .NET Framework /dev/shm 1Password 2FA 6G Aardvark Access Control Access Management Account Compromise Account Protection Account Recovery Account Security Accountability Accuracy Acoustic Attack Acquisition Activation Lock Active Authentication (AA) Active Directory AdaptixC2 Adminer Adobe Experience Manager Adversary Emulation AES Encryption Aeza Group Afghanistan Agentic AI Agentic AI Browsers Agentic Commerce AI AI Agents AI Browsers AI Chatbots AI Coding AI Companionship AI Compliance AI Ethics AI Governance AI Hallucinations AI in Cybersecurity AI Infrastructure Debt AI Poisoning AI Powered Security AI Regulation AI Scams AI Secrets AI Security AI Sidebar Spoofing AI Training AI-Driven Fraud AI-enabled Attacks AI-powered Attacks AI-Powered Security AI-ready APIs AI/ML AiTM AJAX Akira Akira Ransomware ALPHV/BlackCat Alpine Linux Amazon Amazon Web Services Amazon Web Services (AWS) AMD AMD SEV AMOS (Atomic macOS Stealer) Android Android Intents Android Malware Android Security Anthropic Anti-Analysis Techniques Anti-Sandbox Antivirus API API Governance API Obfuscation API Observability API Security API Testing App Store Security Apple Apple ID APT APT28 APT41 APT42 Arbitrage Arbitrary Code Execution Arbitrary File Read Arbitrary File Upload ArcaneDoor ArcGIS Argument Injection Arithmetic Overflow/Underflow ARM64 ARP Spoofing Arrest artificial intelligence Artificial Intelligence Artificial Intelligence (AI) ASLR bypass ASLR Bypass ASN.1 ASP.NET Core Asset Discovery async-tar Atlas Browser Atomic Stealer ATT&CK Attack Surface Management Attack Surface Reduction Audit AuditBoard Auditing Aura Stealer Aurora Stealer AuroStealer Australia Australian Signals Directorate Australian Signals Directorate (ASD) authentication Authentication Authentication Apps Authentication Bypass Autofill Automate Automation Autonomy AWS AWS Outage Backdoor Backdoors Backup and Recovery Backup as a Service (BaaS) BadCandy Balancer Base64 Basic Access Control (BAC) BAT Scripts BeaverTail Benchmarking Beta Testing Big Sleep BIG-IP Biometrics Blink Rendering Engine Blockchain Blockchain Security Blockchain Spam Blue Angel Software Suite Blue Screen of Death (BSOD) BlueNoroff Bluetooth BNB Smart Chain Boot Failure Bootkit Border Security Bot Detection Botnet Brand Protection breach Breach and Attack Simulation (BAS) Breach Notification Broadcom BRONZE BUTLER Browser Security Brute-Force Attack Budget Constraints Budget Cuts Budget Increase Buffer Overflow Bug Bounty Bulletproof Hosting Business Alignment Business Email Compromise (BEC) Bypass Techniques C/C++ C2 Canada candidate vetting Canva CASB CBDC CDM Certificate Revocation Certificate Transparency CFPB Chakra JavaScript Engine Chat Control chatbots ChatGPT Check Point Chicago Children's Privacy China China Militia Chinese APT Chrome Chrome Extensions Chromium CI/CD Security Cifas CIPA CISA CISA KEV Cisco Cisco IOS XE Cisco Talos Cisco Umbrella Citrix NetScaler Gateway Cl0p Classified Information CLEARSHORT Clearview AI ClickFix Client-Side Git Hooks Clipboard Exfiltration Clop Ransomware CLOUD Act Cloud Backup Cloud Misconfiguration Cloud Outage cloud security Cloud Security Cloud Storage CloudFlare Cloudflare Pages CMC NDMD CMS Vulnerabilities Cobalt Strike Code Analysis Code Obfuscation coinminer Coldriver COLDRIVER Command and Control (C2) command injection Command Injection Commercial Spyware Community Compatibility Holds Compiler compliance Compliance Compliance Standards Conduent Confidential Computing Configuration Files ConnectWise Constella Intelligence Container Escape Conti Continuous Threat Exposure Management (CTEM) Cookie Replay Attack Copilot COPPA CountLoader Cracked Software Credential Dumping Credential Harvesting Credential Stealing Credential Stuffing Credential Theft Credentials Leak Credit Monitoring Criminal Complaint Critical Infrastructure CRLF Injection CrowdStrike CryptoChameleon Cryptocurrency Cryptocurrency Scam Cryptocurrency Theft Cryptographic Combiners Cryptographic Signatures Cryptography cryptsetup CSAM CSPM CTEM CTO CurlCat CurlyShell Customer Data CVE CVE-2017-3881 CVE-2023-20198 CVE-2023-40129 CVE-2024-1086 CVE-2024-38197 CVE-2024-50387 CVE-2024-50388 CVE-2025-0785 CVE-2025-11371 CVE-2025-11492 CVE-2025-11493 CVE-2025-11837 CVE-2025-12036 CVE-2025-12428 CVE-2025-20352 CVE-2025-20354 CVE-2025-20358 CVE-2025-21042 CVE-2025-24893 CVE-2025-2611 CVE-2025-30406 CVE-2025-31133 CVE-2025-34033 CVE-2025-48561 CVE-2025-52425 CVE-2025-52565 CVE-2025-52881 CVE-2025-53770 CVE-2025-53771 CVE-2025-54236 CVE-2025-54253 CVE-2025-54957 CVE-2025-55315 CVE-2025-59287 CVE-2025-59389 CVE-2025-61882 CVE-2025-61884 CVE-2025-61932 CVE-2025-62626 CVE-2025-62725 CVE-2025-62840 CVE-2025-62842 CVE-2025-62847 CVE-2025-62848 CVE-2025-62849 CVE-2025-6325 CVE-2025-6327 CVE-2025-7850 CVE-2025-7851 CVE-2025-9217 CVE-2025-9491 CVSS CVSS Score CWE-401 CWE-617 CWE-787 CWE-789 CWE-829 CWE-843 Cyber Attack Cyber Espionage Cyber Essentials Cyber Hygiene Cyber Incident Cyber Influence Campaigns Cyber Insurance Cyber Militia Cyber Reasoning System cyber resilience Cyber Risk Management cyber threat intelligence Cyber Threat Intelligence (CTI) Cyber Warfare Cyber Weapons Cyber Workforce Cyber Workforce Gap Cyber-attack Cyber-attacks Cyberattack Cyberattacks CyberCorps Cybercrime Cybercrime Convention Cybercrime Treaty Cybercrime-as-a-Service Cyberespionage cybersecurity Cybersecurity Cybersecurity AI Cybersecurity Awareness Cybersecurity Awareness Month Cybersecurity Awareness Training Cybersecurity Conference Cybersecurity Culture Cybersecurity Experts Cybersecurity Frameworks Cybersecurity Incident Cybersecurity Information Sharing Act (CISA) Cybersecurity Jobs Cybersecurity Partnership Cybersecurity Pioneer Cybersecurity Policy Cybersecurity Regulations Cybersecurity Training Cybersecurity Workforce Cyberstalking Daniel J. Bernstein Dark Covenant Dark Web Dark Web Monitoring Darktrace Dashlane Data Access Data Backup data breach Data Breach Data Breach Observatory Data Brokers data collection Data Collection Data Deduplication Data Distribution Data Encryption Data Exfiltration Data Feed Data Interception Data Leak Data Leak Site (DLS) Data Leakage Data Loss Prevention (DLP) Data Manipulation Data Mining Data Poisoning data privacy Data Privacy Data Protection Data Protection Authority (DPA) Data Retention Data Scraping Data Security Data Sovereignty Data Tampering Data Theft Data Utility Data Wipers Database David Harley DDoS DDoS Attacks DDoS Mitigation DDR4 Dead Domain Discovery Debt Solutions Decentralization Decentralized Finance (DeFi) Deepfake Deepfakes DeepSeek Default Credentials Defense Defense Evasion Defense Industry DeFi Dell BSAFE Crypto-C Denial of Service Denial-of-Service Deprecated Detection Accuracy Detection Engineering DevOps DevSecOps DFIR DHS Differential Privacy Diffing Digital Advertising digital footprint Digital Footprint Digital Forensics Digital ID Digital Identity Digital Payments digital risk assessment Digital Risk Management Digital Signatures Digital Surveillance Digital Transformation Digital Trust Diplomacy Diplomats Disaster Recovery Disaster Recovery as a Service (DRaaS) Disclosure Discord Disinformation Disk Encryption DLL Injection DLL Side-Loading DLL Sideloading DNA DNG DNS DNS Failure DNS Security DNS Spoofing Docker Docker Compose Docker Desktop Dolby UDC Domain Controller Compromise Domain Migration Domain Names Domain Registration Domain Takeover Downloader DPRK Driver Updates Drone Drones DShield Duo Desktop Dynamic Analysis Dynamic Binary Instrumentation (DBI) DynamoDB DynamoRIO Eavesdropping Eazfuscator.NET eBPF ECDSA Economic Downturn Economic Impact Economic Security EDR Bypass EFF Elderly Users Election Security Electronic Passport Elevation of Privilege ELF Email Blackmail Email Hacking Email Security Emergency Directive Emergency Patch EMF EMF+ Emotional Triggers Employee Behavior Employee Data eMRTD EMV encryption Encryption End of Life End of Support End-of-Life Software End-to-End Encryption Endpoint Detection and Response (EDR) Endpoint Management Endpoint Protection Platform Enhanced Safe Browsing Entra ID ESAFENET CDG ESET Espionage Ethereum EtherHiding EU Data Boundary European Union Europol Evil Corp Exception Handling Exchange Server Exfiltration Experian exploit Exploit Exploit Chain Exploit Development Exploit Mitigation Exploitation Export Controls Exposure Management Extended Access Control (EAC) Extended Security Updates (ESU) Extension Vulnerability Extensions Extortion Extortion-as-a-Service (EaaS) Extradition EY F5 F5 BIG-IP F5 Breach Facade Pattern Facebook Messenger Facial Recognition Fade In FakeUpdates False Positive Famous Chollima FBI FCC Federal Government Federal Hiring Freeze Fil-C File Explorer File Overwriting File Parsing Fileless Malware Financial Account Information Financial Crime Financial Data Financial Fraud Financial Impact Financial Malware Financial Motivation Financial Sanctions Financial Services Find My App Fines Fines and Penalties Firefox Firewall Firewall Configuration Files Firmware Firmware Patch Firmware Rollback First Amendment Five-Year Plan (FYP) Flax Typhoon Fluoride FOIA Foreign Actor Forensic Analysis Forensics Format String Vulnerability Fortnite FPGA Framework France fraud Fraud Fraud Detection Fraud Prevention Freemium fsmonitor Fuzzing Game Hacks Gaming Gaming Community GDPR Gemini Generative AI Geopolitics Germany Ghost Network GhostCall GhostHire Gift Cards Git Github GitHub Gladinet CentreStack Gmail Gokcpdoor Golang google Google Google Ads Google SecOps Gootloader GOV.UK One Login governance Governance Government Government Agency Government Digital Service (GDS) Government Intervention Government Investigation Government Policy Government Regulation Government Shutdown Government Surveillance GPT-5 Graphics Device Interface Graphics Device Interface (GDI) Group Policy GTFOBins Guardrails Gun Detection System Hacktivism Hardware Attacks Hardware Hacking Hardware Root of Trust Hardware Security hardware_hacking Have I Been Pwned HaveIBeenPwned Havoc Headless CMS Healthcare Healthcare Cybersecurity Healthcare Data Breach Healthcare Privacy Healthcare Sector Heap Corruption Heap Mitigations Heap Overflow Hidden Links HiddenLayer HIPAA Hiring Process Hiron Home Confinement Honeypot Honeypots Host Card Emulation (HCE) Hosting Provider HTTP HTTP Headers HTTP Request Smuggling HTTP/2 HTTPS Huawei Huddle01 Human Rights Human Trafficking Human Vulnerabilities Huntress HVNC Hybrid Identity Hybrid Key Exchange Hyper-V HyperGuard Hypervisor IAM ICO ICO Fine ICO Fines ICS Security ICS/OT Security ICS/SCADA ICTBroadcast ID Verification IDA Pro Identity and Access Management identity attacks Identity Governance and Administration (IGA) identity management Identity Management identity theft Identity Theft identity verification Identity Verification IIS Image Processing IMEI Blocking Impersonation Incident Response Incident Response (IR) Incogni IND-CCA Indicators of Compromise Industrial Control Systems (ICS) Inertial Sensors Infineon Information Commissioner's Office (ICO) Information Disclosure Information Operations Information Stealer Information Stealing Infostealer Infrastructure Abuse Infrastructure as Code (IaC) initial access Initial Access Broker Initial Access Brokers initial-access Injunction insider threat Insider Threat Instagram Security Integer Overflow Integer Overflow/Underflow Integer Underflow Intel SGX International Cooperation Internet Explorer Mode Invariant Testing Inverters Investment Scam Invisible Characters INVISIBLEFERRET IOC IOGPUFamily iOS IoT Security IoT_security ip-intel Iran Iranian Hackers Iraq IT Modernization IT Strategy JADESNOW Jaguar Land Rover (JLR) Jailbreaking Japan JavaScript JavaScript Injection Jemalloc Jen Easterly Jenkins Jewelbug Job Displacement Job Posting Scam Just Works Just-in-Time Training Kafka Broker Kaspersky KB5065789 KB5066835 Keitaro TDS Kernel Kernel-Mode Driver Kestrel Kestrel Web Server kev KEV Key Encapsulation Mechanism (KEM) Key Vaults Keylogging Known Issue Rollback (KIR) Kubernetes Kubernetes Security L3Harris LangChain LANSCOPE Lapsus$ LAPSUS$ Large Language Models Large Language Models (LLMs) Lasso LastPass Lateral Movement Law Enforcement Law Enforcement Action Law Enforcement Impersonation Lawsuit Lazarus Group LD_PRELOAD Least Privilege Legacy Systems Legislation linux Linux Linux Kernel litigation Living off the Land LLM LLM Grooming LLM Privacy LLM Security LLMNR LM Studio LNK Files Local File Inclusion (LFI) localhost Localhost LockBit LockBit 5.0 Logging LUKS2 Lumma Stealer macOS mactime Magento Malicious Infrastructure Malvertising malware Malware Malware Analysis Malware Distribution Malware Vaccines Malware-as-a-Service Malwarebytes manage user access Managed Detection and Response (MDR) Managed Security Service Provider (MSSP) Managed Service Provider (MSP) Managed Service Providers (MSPs) Mandiant Mark of the Web Mark of the Web (MotW) mat2 Matrix (protocol) MAYBEROBOT MDR Medical Devices Medusa Ransomware Meduza Infostealer Meduza Stealer Memory Corruption Memory Exhaustion Memory Exposure memory forensics Memory Leak Memory Safety MENA Mental Health Mermaid Diagrams Messaging Apps Messaging Platforms Meta Metadata Manipulation Metadata Removal Tool MFA MFA Abuse Microcode Microsoft Microsoft 365 Microsoft 365 Copilot Microsoft Azure Microsoft Defender Microsoft Digital Defense Report Microsoft Edge Microsoft Entra Microsoft Exchange Microsoft Exchange Server Microsoft Patch Tuesday Microsoft Teams Middle East Military Militia Training MIME Encoding Mimikatz Ministry of Defence (MoD) Minor Suspects Misconfiguration Misinformation Mitigation MITRE ATT&CK Mobile Security Model Context Protocol (MCP) MOIS Money Laundering Mongolia MonsterV2 Morocco Motex MOVEit Mozilla MSP (Managed Service Provider) MuddyWater Multi-Factor Authentication Multi-Factor Authentication (MFA) Multi-Factor Authentication (MFA) Bypass Mustang Panda MXDR Myanmar NAS Nation-State Actor nation-state actors Nation-State Actors Nation-State Attack Nation-State Attacker Nation-State Attackers National Cyber Director National Cyber Director (NCD) National Cyber Security Centre (NCSC) National Science Foundation National Security National Security Threat NATO NBT-NS NCSC Netherlands Network Management Network Security Network Segmentation Networking Newport Wafer Fab Nexperia NFC Relay Malware NHS NIST AI Risk Management Framework (AI RMF) NIST Framework Node.js NordVPN NOROBOT North Korea North Korean Hackers noyb Noyb npm NSA NSF Grant NSFW Content NSO Group NTLM Hash NTLM Hashes NTP Nuclei NuGet Null Cipher OAuth OAuth Attack obfuscation Obfuscation OCI Artifacts Odyssey Stealer Offensive Security Office 2016 Office 2019 Office 2024 Office LTSC 2024 Office of Personnel Management OIG Omada Omnibox Online Safety Open Source Open Source Security Open Source Software Open-Source Intelligence (OSINT) OpenAI OpenAI Assistants API OpenAI Atlas OpenInfra Foundation OpenStack OpenVSX Operation Cronos Operation DreamJob Operation Endgame Operation Zero Operational Disruption Operational Technology (OT) Security Opt-Out Oracle E-Business Suite Oracle E-Business Suite (EBS) Orchestration OS Command Injection OT Security OtterCookie Out-of-Band Update Out-of-bounds Read Out-of-bounds Write Out-of-Bounds Write Outage Outsourcing PACE Package Manager Paging Parrot TDS PassGAN Passive Authentication (PA) Passkeys passphrases password cracking Password Cracking Password Management Password Manager Password Policy Password Reset Password Security Password Vault Passwordless Passwordless Authentication passwords Passwords Patch Patch Management Patch Release Patch Tuesday Patching Patchstack Path Traversal Payload Delivery Payment penetration testing Penetration Testing People's Postcode Lottery (PPL) Permissions Perplexity AI Persistence Personal Data Personal Information Personalization Personally Identifiable Information Personally Identifiable Information (PII) PhantomRaven phishing Phishing Phishing Campaign Phishing-as-a-Service (PhaaS) Phone Theft Photoshop Physical Access Physical Attacks Physical Violence ping Pixel Manipulation PLC Plea Agreement Plugin Vulnerability PlugX PlugX RAT Pointer Authentication Code (PAC) Pointwise Maximal Leakage (PML) Poland Policy Automation pool.ntp.org Post-Quantum Cryptography Powershell PowerShell Prime Video privacy Privacy Privacy Concerns Privacy Engineering Privacy Erosion Privacy Risks privacy settings Privacy Settings Privilege Escalation Privileged Access Management Privileged Access Management (PAM) Pro-Russia Information Operations Proactive Security Prompt Injection PromptFlux PromptSteal Proof of Concept Proof-of-Concept Prosper Proton PsExec psychology Pwn2Own PyInstaller Python Qakbot Qilin Qilin Ransomware Qlin QNAP Qualys Quantum Computing Quantum Readiness Quick Machine Recovery (QMR) Race Condition Railnet LLC RAM RansomHub ransomware Ransomware Ransomware Protection Ransomware Recovery Ransomware-as-a-Service (RaaS) RAR Archives RAT Ravin Academy RDSEED Real-time Intelligence Recruitment Red Teaming Redirection RedTiger Regulation Regulatory Compliance Remediation Remote Access Fraud Remote Access Trojan (RAT) Remote Attestation remote code execution Remote Code Execution Remote Code Execution (RCE) Remote Desktop Programs Remote Dynamic Dependencies (RDD) Remote Exploitation Reputation Management Reputation Systems Request Smuggling Resilience Responder Responsible Disclosure Failure Retail Return-Oriented Programming (ROP) reverse engineering Reverse Engineering Reverse Shell Rhadamanthys Rhysida risk risk management Risk Management Risk Prioritization Risk Profile Risk Quantification RMM Robinhood Robocalls Robotics ROI Roku Root Access Rootkit Rounding Error Rounding Errors runC Russia Russian Broker Russian Drones Russian State Media Russian Threat Actor rust Rust Safari SafePay Salaries Salt Typhoon SAML Samsung Samsung Galaxy Samsung Galaxy S25 Sanctions Sandbox Escape Sandboxing Sandworm SASE Satellite Communication Satellite Communications Scam Scam Centers Scam Guard scams Scams Scanning Scattered Spider Scheduled Task Scholarship for Service ScoringMathTea Screen Sharing Scudo SD-WAN Search Secrets Leakage Secure Boot Secure by Design Secure Messaging Secure Mobility Security Security Audits Security Automation Security Awareness Training Security Baselines Security Best Practices Security Bypass Security Gaps Security Headers Security Isolation Security Keys Security Policies Security Tools Security Update Security Updates Security Validation security.txt Self-Compiling Malware Self-Service Password Reset (SSPR) Semiconductor Semiconductor Industry Sentencing SEO Poisoning Service Disruption Session Hijacking Session Token Expiration Sextortion Shadow AI Shadow IT Shadowserver Foundation SharePoint Sharp7 Shell Script SHINYSP1D3R Side-Channel Attack SIEM Silent Push SIM Box SIM Farms SIM Swapping Single Point of Failure Single Sign-On Single Sign-On (SSO) Sitecore Skills Gap Slack Sleuth Kit Slider Revolution Slopsquatting Smart App Control (SAC) Smart Contracts Smartphones SMB SMB (Small and Medium-sized Businesses) SMBs Smishing SMS Authentication SMS Scam Snapchat SNAPPYBEE SNMP Snort Snort Rules SocGholish social engineering Social Engineering social media Social Media Social Media Privacy Social Media Surveillance Social Security Number Social Security Numbers SOE Exploitation Soft Hyphen SoftEther VPN Software Cracks Software Development Software Update Software Vulnerabilities Solar Power SolarWinds SolrSearch Solvers SonicWall Sotheby's Source Code South Korea Southeast Asia Sovereignty Sovereignty Washing Spam Spamware Spear Phishing Spearphishing spiderlabs SpiderLabs Spoofing Spyware SQL Injection SQL Server SquareX SSRF Stack Overflow Staffing Stalkerware Standards Starlink STARVESPAM State-sponsored Actors State-Sponsored Attack Static Analysis Stealer Stealth Stealth Falcon STIR/SHAKEN Storm-2603 Student Debt Superinjunction Supply Chain Supply Chain Attack Supply Chain Attacks Supply Chain Disruption Supply Chain Security Suricata Surveillance Surveillance State Synology Syscall System Authorization TA569 TA585 Tax Refund Scam TCP/UDP Tech Support Scams Technical Error Telecommunications Telecommunications Security Telegram Telegram Bot API Telnet template-injection Termux Third-Party Audit Third-Party Breach Third-Party Investigation Third-party Risk Third-Party Risk Third-Party Risk Management Third-Party Security Third-Party Services Third-Party Software Third-Party Support Threat Activity Enabler (TAE) Threat Actor Threat Analysis Threat Detection Threat Hunting Threat Intelligence Threat Intelligence Sharing Threat Model Threat Modeling Threat Protection Threats to Life TikTok TikTok Scam Time Bomb Time Synchronization TLB (Translation Lookaside Buffer) tmpfs tokio-tar Toll Fraud ToolShell TP-Link tracking Tracking Pixel Trade Secret Theft Trade Secrets Trade Secrets Theft Traffic Distribution System Training Programs Transaction Relay Layer Transparency Trenchant Trend Micro Trickbot TruffleHog Trust Seal Trusted Agent Protocol Trusted Execution Environment (TEE) trustwave Trustwave Tunneling Turkey Two-Factor Authentication Two-Factor Authentication (2FA) Type Confusion Typosquatting UAC Bypass UEFI UK UK Cybersecurity UK GDPR UK Government UK Government Intervention Ukraine Ukraine War unauthenticated Unauthenticated Vulnerability Unauthorized Access UNC5142 UNC5291 UNC5342 UNC6229 UNC6384 Underground Forums Unified Exposure Management Platforms (UEMPs) United Nations Unpatched Vulnerability Unprotected Server URL Spoofing US-EAST-1 USB Use-After-Free User Privacy Vanilla Tempest Vendor Patch Veterans Vidar Virtual Kidnapping Virtual Memory Virtual Workspace Virtualization VirusTotal Visa Vishing VMware Voice Cloning Volt Typhoon Volume Shadow Copy Service (VSS) Voter Fraud Voter ID VPN VPN Router VS Code VS Code Extension VSCode vShell VTOL VulnCheck Canaries Vulnerabilities vulnerability Vulnerability Vulnerability Analysis Vulnerability Assessment Vulnerability Disclosure Vulnerability Exploitation Vulnerability Management Vulnerability Patch Vulnerability Remediation Vulnerability Replication Vulnerability Report Vulnerability Research Vulnerability Scanning Vulnerability Validation WAAP Water Systems Watering Hole Attack Web Application Firewall (WAF) Web Application Security Web Hosting Security Web Shell web tracking Web.config webctrl.cgi Webhook.site WebKit WebRTC Webshell Website Security WhatsApp WhatsApp Scam Whisper 2FA Wi-Fi Mapping WinDbg Windows Windows 10 Windows 11 Windows Insider Program Windows Internals Windows Kernel Windows Recovery Environment (WinRE) Windows Security Windows Server Windows Update Wingtech Technology Wire Wire Fraud Wordfence WordPress WordPress Plugin Vulnerability WordPress Security Workforce Training WSUS X (formerly Twitter) XDR Xiaomi XLoader XML Parser XML Parser Vulnerabilities XSLT XSS XWiki Yandex Cloud Yanluowang YARA Rule YESROBOT YouTube YubiKey ZachXBT ZDI-CAN-25373 zero trust Zero Trust Zero Trust Architecture Zero-Click Exploit Zero-day Zero-Day Zero-day exploit Zero-day Exploit Zero-Day Exploit Zero-day Exploits Zero-Day Exploits Zero-Day Vulnerabilities Zero-day Vulnerability Zero-Day Vulnerability Zero-Knowledge Proofs Zip File Vulnerability Zip64 ZTE
Categories All Access Control Account Security Advanced Persistent Threat (APT) AI Governance AI in Cybersecurity AI Security AI-Driven Security Antivirus/Antimalware API Management API Security Application Security Application Security (AppSec) APT APT (Advanced Persistent Threat) APT Analysis APT Defense APT Groups Artificial Intelligence Artificial Intelligence (AI) and Machine Learning (ML) Security Artificial Intelligence (AI) Integration Artificial Intelligence (AI) Security Artificial Intelligence in Cybersecurity Artificial Intelligence Security Attack Campaigns Authentication Authentication and Access Control Authentication and Access Management Authentication Security Authentication Technologies Availability Biometric Security Blockchain Security Breach Notification Browser Security Business Continuity Business Impact Career and Skills Cloud Computing Cloud Computing Security Cloud Security Cloud Security Posture Management (CSPM) Collaboration Security Command and Control (C2) Communication Security Compilers Compliance Compliance and Governance Compliance and Regulation Container Security CPU Security Credential Theft Critical Infrastructure Security Cryptocurrency Cryptography Cyber Attack Reports Cyber Espionage Cyber Financial Crime Cyber Insurance Cyber Policy Cyber Threat Intelligence Cyber Warfare Cyber-Physical Systems Security Cyberattack Cybercrime Cybercrime Ecosystem Analysis Cybercrime Investigation Cybercrime Investigations Cybersecurity Cybersecurity Awareness Cybersecurity Best Practices Cybersecurity Defense Cybersecurity Economics Cybersecurity Education Cybersecurity Frameworks Cybersecurity Guidance & Best Practices Cybersecurity History Cybersecurity Incident Response Cybersecurity Incidents Cybersecurity Industry News Cybersecurity News Cybersecurity Policy Cybersecurity Policy and Compliance Cybersecurity Research and Development Cybersecurity Solutions Cybersecurity Strategy Cybersecurity Threats Cybersecurity Training and Awareness Cybersecurity Trends Cybersecurity Workforce Cybersecurity Workforce Development Data Analysis Data Backup and Recovery Data Breach Data Breach Analysis Data Breach Intelligence Data Breach Notification Data Breach Notification & Response Data Breaches and Leaks Data Exfiltration Data Loss Prevention Data Management Data Privacy Data Protection Data Protection Regulation Data Security Data Security and Privacy Data Security Incident Data Security Incident Management Data Sovereignty Defense Industry Cybersecurity Detection and Response Device Security Device_Modification DevOps Digital Currency Digital Forensics Digital Forensics and Incident Response Distributed Systems Dynamic Analysis E-commerce Security Economic Impact Email Security Emerging Technologies Encryption Endpoint Detection and Response (EDR) Endpoint Security Energy Sector Cybersecurity Exploit Exploit Analysis Exploit Development Exploit Prevention Extended Detection and Response (XDR) Facial Recognition Technology Financial Crime Financial Regulation Fraud and Scams Fraud Detection and Prevention Fraud Prevention Geopolitics Geopolitics of Cybersecurity Global Cyber Attack Reports Governance, Risk, and Compliance (GRC) Government Government & Policy Government Cybersecurity Government Policy & Regulation Government Regulation Government Surveillance Government Technology Hardware Hacking Hardware Security Healthcare Cybersecurity Human Factors in Security Human Resource Security Human Resources Security Identity and Access Management Identity and Access Management (IAM) Identity Management Identity Theft Incident Management Incident Response Incident Response and Management Incident Response and Recovery Industrial Control Systems (ICS) Security Industrial Control Systems Security Industrial Cybersecurity Industry News Information Warfare Infrastructure as a Service (IaaS) Infrastructure Security Insider Threat Insider Threat Detection and Prevention International Law Enforcement International Relations Intrusion Detection Intrusion Detection/Prevention IoT Security IT Operations IT Risk Management Job Market Kernel Security Key Management Law Enforcement Legal Legal and Regulatory Legal and Regulatory Compliance Legal Issues Linux Security Malware Malware Analysis Malware Analysis and Reverse Engineering Managed Detection and Response (MDR) Managed Security Services Memory Forensics Military Modernization Military Technology Misinformation/Disinformation Mobile Device Security Mobile Security Nation-State Actors Nation-State Attack Nation-State Threat Actors National Security National Security Policy Network Security Network Security Monitoring Online Fraud Online Privacy Online Reputation Management Open Source Open Source Security Operating System Security Operating Systems OT Security Password Management Security Password Security Patch Management Payment Security Penetration Testing Phishing and Social Engineering Phishing Attacks Phishing Awareness Phishing Awareness and Education Phishing Awareness and Prevention Phishing Defense Phishing Detection and Prevention Policy and Governance Policy and Regulation Post-Quantum Security Privacy Privacy Analysis Privacy and Civil Liberties Privacy Compliance Privacy Enhancing Technologies Privacy Incident Privacy Management Privacy Regulations Privacy Violations Ransomware Ransomware Attacks Ransomware Protection Ransomware Protection and Defense Ransomware Protection and Recovery Regulatory Compliance Regulatory Enforcement Remote Code Execution (RCE) Remote Monitoring and Management (RMM) Security Reverse Engineering Risk Management Risk Management & Compliance Rootkit Analysis Router Security Satellite Security SD-WAN Technologies Search Engine Optimization (SEO) Security Secure Communications Security Automation security awareness Security Awareness Security Awareness Training Security Best Practices Security Information and Event Management (SIEM) Security Management Security Operations Security Operations (SecOps) Security Operations Center (SOC) Security Orchestration, Automation and Response (SOAR) Skills and Competencies Social Engineering Social Engineering Attacks Software Development Software Development Security Software Security Software Supply Chain Security Software Testing Software Updates State-Sponsored Cybercrime Supply Chain Security Telecommunications Security Third-Party Risk Threat Actor Threat Actor Adaptations Threat Actor Analysis Threat Actor Tactics, Techniques, and Procedures (TTPs) Threat Detection Threat Detection and Analysis Threat Detection and Prevention Threat Detection and Response Threat Forecasting Threat Hunting Threat Intelligence Threat Landscape Analysis Threat Mitigation Threat Modeling Threat Research Unmanned Systems Vulnerability Analysis Vulnerability and Exploit Vulnerability and Patch Management Vulnerability and Risk Management Vulnerability Assessment Vulnerability Assessment and Management Vulnerability Detection and Prevention Vulnerability Exploitation Vulnerability Exploits vulnerability management Vulnerability Management Vulnerability Mitigation Vulnerability Research Web 3.0 Security Web Application Security Web Security Zero Trust Architecture Zero Trust Security
Threat Actor All 0x54B53503c0e2173Df29f8da735fBd45Ee8aBa30d 764 Actors in possession of the CSCA private key Advanced nation-state threat actors Aeza Group AI-enhanced adversaries Akira Akira Affiliate Aleksei Olegovich Volkov Alleged Criminal (Cryptocurrency Stockpiler) ALPHV/BlackCat ransomware affiliates Antiy Technology Group cyber militia APT28 APT34 APT37 APT41 APT42 APT43 APT44 ArcaneDoor Automated Scanners Babuk 2.0 Balancer v2 Exploiters Bharat Singh Chand Bitter Black Basta BladedFeline BlueNoroff BRONZE BUTLER Chen Zhi China China-linked espionage group China-linked hackers Chinese 'Salt Typhoon' Chinese Communist Party Chinese crime groups Chinese gangs Chinese government Chinese hackers Chinese megacorp Chinese security services Chinese state-backed hackers Chinese state-sponsored threat actors Chinese-speaking criminal syndicates Cl0p CL0P Clearview AI ClickFix threat actor Clop Coldriver COLDRIVER Conti Conti Ransomware Group Criminal Gangs criminals Crimson Collective Cryptex Cryptex Operators CryptoChameleon Curly COMrades Cyber actor believed to be associated with the Islamic Republic of Iran Cyber Av2ngers Cyber criminals Cyberattackers Cybercrime groups Cytrox Decentralized Online Crime Networks and Loosely Affiliated Individuals DeceptiveDevelopment Doppelganger DPRK DPRK's cyber force Dragon Force Ransomware Group Emotet Emotet Authors Evasive Panda Everest Evil Corp Fake customer support scammers Famous Chollima FamousSparrow Femo IT Solutions Limited Financially motivated threat cluster operating from Vietnam Flax Typhoon Foreign criminals Former Trenchant General Manager ForumTroll Fraudsters Fraudulent candidates/employees FrostyNeighbor G0027:Threat Group-3390 G0034:Sandworm Team G0128:ZIRCONIUM G0129:Mustang Panda G0150:Water Galura G1015:Scattered Spider G1033:Star Blizzard G1048:UNC3886 G1049:AppleJeus G1051:Medusa Group G1052:Contagious Interview G1053:Storm-0501 Gafgyt GalaxyGato Gamaredon Gamma Group gangs of cybercriminals GlassWorm Operators Global-Data System IT Corporation GOLD LEAPFROG Hezi Rash High-end cybercriminals Hiron Hook Spider HP InedibleOchotense Infostealers Initial-access brokers Iran IronHusky Jewelbug Just Evil Kevin Tyler Martin Kimsuky Kochava Konni Lapsus$ Large Criminal Syndicates Latvian nationals Lazarus Lazarus group Lazarus Group Leonidas Varagiannis Librarian Ghouls Linen Typhoon LockBit LummaC2 Malware Operator Matthew Lane Medusa Ransomware Group Meduza Developers Meduza Stealer Operators Memento Labs Metaspinner net GmbH Mirai Mozi MuddyWater Mustang Panda Mysterious Elephant Nation State Actors Nation-state Nation-state actor Nation-State Actor Nation-state actors Nation-state attacker Nation-state attackers Nation-state hackers Nation-state threat actor NDP NFT Minting Bots North Korea North Korea-linked cybercriminals North Korean cybercriminals North Korean hackers North Korean IT workers North Korean threat actor North Korean worker NSO Group Obscura Paige Thompson Paragon Password stealers Peter Williams PhantomRaven PhantomRaven Threat Actor Play PlushDaemon Portal Kombat Prasan Nepal Qakbot Operators Qantas Hackers Qilin Qlin Railnet LLC RansomHub Ransomware Operators RedHotel Redline RedMike RedTiger Operators REvil REvil Threat Actors RomCom Russia Russian broker Russian buyer Russian construction technology company Russian government supplier Russian hackers Russian state-attributed sources Russian state-sponsored threat actors linked to the Russian Federal Security Service’s (FSB) Center 16 Ryan Clifford Goldberg SafePay Safepay ransomware gang Salesloft Drift breach perpetrators Salt Typhoon Sandworm scammers Scammers Scattered Lapsus$ Hunters Scattered LAPSUS$ Hunters Scattered Spider Shiny Hunters Shiny Lapsus$ Hunters ShinyHunters SideWinder Silk Typhoon Silver Fox SIMCARTEL SIMCARTEL Network SinisterEye Sinobi Smishing Campaign Actors Smishing Triad Sophisticated Social Engineers Spammers Speccom SpyEye State-backed hackers State-sponsored group behind the 2024 ArcaneDoor campaign State-sponsored threat actor State-Sponsored Threat Actors Static Tundra Stealth Falcon Storm-0494 Storm-2603 TA569 TA585 Taliban Tech support scammers TEMP.Zagros The Com The thieves TheWizards thieves Threat actor behind SesameOp Threat Actors Exploiting NTLM Hash Leaks Threat actors using free VPN apps Trickbot TrickBot Trickbot Group Trump administration Turla UAT4356 UNC1069 UNC4899 UNC5142 UNC5291 UNC5342 UNC6040 UNC6240 UNC6384 UNC6512 Unemployed tech workers Unknown threat actor deploying malicious NuGet packages Unspecified Actor Unspecified Attackers Unspecified Threat Actors Unspecified Threat Actors Exploiting NTLM Hash Leakage Vanilla Tempest Vidar Vidar Developer(s) Violet Typhoon Virtualine Technologies Volt Typhoon Vulnerability researchers WannaCry XLoader Zeus
Actor Aliases All "the attacker" 0x506D1f9EFe24f0d47853aDca907EB8d89AE03207 Agenda Aleskey Olegovich Volkov ALPHV Angelo APT34 APT44/Sandworm Attackers BAITSWITCH Beijing Bentley Bitwise Spider Bjorka Spirit (Ransomware) BlackCat BLOODALCHEMY Brain Spider Brickstorm Byex Exchange Callisto Catch and Revoke China's Salt Typhoon cyber-espionage group Chinese gangs chubaka.kor ChuongDong CL-STA-0049 Cl0p CLEARFAKE Company 3 Contagious Interview Crimefluencers CurlCat CurlyShell Defhost DiorHost DPRK DPRK nation state threat actor Earth Alux Earth Estries Embargo Ransomware FakeUpdates Fancy Bear FIN11 FinSpy Forest Blizzard FormBook ForumTroll FrozenLake FROZENLAKE Fyodor Aleksandrovich Andreev GhostEmperor GlassWorm Golden Fortune Resorts World Ltd Graphite Hacking Team Hafnium Huione Group Inactive inactivecx Inactivee0 Jasper Sleet Jin Bei Group Kalambur Kimsuky Korplug Kremlin Lanedonet Datacenter LAPSUS$ Lazarus LeetAgent Loadbaks LockBit LockBit Black Lumma Stealer MASAN Medusa Medusa Ransomware Meduza Meduza virus Muddy Water MUDDYCOAST Mustang Panda MysterySnail MysterySnail RAT North Korea OilRig Operation DreamJob Operation Zero Pegasus Pravda network Pravda Network Predator President Donald Trump Prince Group Prince Holding Group PUKCHONG Qilin Ransomware Qilin.B RalfHacker Raptor Train REF7707 Rhysida RomCom Salt Typhoon Sandworm Sanyo Scattered Lapsus$ Hunters Seedworm SesameOp Shamel shanhai666 ShinyHunters SHINYSP1D3R SIMPLEFIX SLSH SmokeLdr SocGholish SOGU SOGU.SEC Star Blizzard Stern Sting STORM-1849 SWISSNETWORK02 TA450 TA505 TEMP.Hex The Debt Relief Team Tick TIGERPLUG Twill Typhoon UAT4356 UNC2286 UNC4057 UNC5267 UNC5356 UNC6229 Vice Society VICE SPIDER Vitali Nikolaevich Kovalev WageMole Wibag Yellow Nix ZEROLOT
Exploit Method All .NET AppDomainManager injection 3CX Supply Chain Attack (C0057) Abuse of Cyberduck for data exfiltration Abuse of Linked Devices (T1676) Abuse of Microsoft cdb.exe Abuse of Monitoring and Data Sharing by Authoritarian Regimes Abuse of SSH Login on VMWare ESXi Abuse of Velociraptor for Persistence Accidental Data Exposure via Hidden Spreadsheet Cells Account Hijacking via Weak Password and Lack of 2FA Account Takeover Actively Exploited Zero-Days AdaptixC2 Misuse Adminer SSRF Exploit Adversarial AI Threats Adversarial Manipulation of AI Models Adversary-in-the-Middle Adversary-in-the-Middle (AiTM) Attacks Adware Impersonation to Steal User Data Agent Impersonation/Privilege Escalation (Potential) Agent-Mediated Data Exposure Agentic AI Misconfiguration/Breach Leading to Lateral Movement Agere Modem Driver EoP Agere Modem Driver Exploitation AI Agent Misuse AI Forgetting Guardrails AI Misidentification Exploit AI model compromise/weaponization AI Sidebar Spoofing AI_Training_Data_Scraping AI-Assisted Cheating in Recruitment AI-Based Malware Obfuscation AI-Driven Fraud AI-driven scams preying on Gen Z’s digital lives AI-Enabled Social Engineering (Vishing with voice cloning) AI-Enhanced Adversaries AI-Generated Code Vulnerabilities AI-Powered Attack Simulation for Security Validation AI-Powered Geolocation from Images AI-Powered Malware and Phishing AI-powered Phishing and Social Engineering AI-powered Voice Cloning AiTM Update Attack ALPHV/BlackCat Ransomware AN0M Backdoor and Event Log Clearing and Inclusion Initiatives and Misconfigured Perimeter Systems and Repair Android Infostealer via Termux Apex Attacker/Nation-State Actors API Abuse Arbitrary File Read via Insufficient Validation of File Paths ArcaneDoor Campaign ArcGIS SOE Webshell Argument Injection via `git show --format --output` and `rg --pre` Argument Injection via `go test -exec` Argument Injection via Facade Pattern with `fd -x` ARP Spoofing ASLR Bypass via SDP Discovery Callback Leak ASN.1 Integer Overflow in _A_DecodeType ASN.1 Record Integer Underflow Leading to Out-of-Bounds Read ASN.1 Record Stack Overflow Atlas Browser Malicious Instruction Injection Audio Deepfake Attack Authentication Bypass via Malicious Server Redirection Automated Vulnerability Scanning Autonomous Malware Autonomous Vulnerability Discovery AWS Credential Exposure in NextJS SSR AWS Credential Harvesting and Privilege Escalation by Crimson Collective AWS Credential Theft AWS Service Dependency Exploit BAC Tracing via Oracle Attacks BadCandy Webshell Bait-and-Switch Employment Basic Access Control (BAC) Offline Brute-Force Battering RAM BIG-IP Cookie Leakage Vulnerability BIG-IP Source Code Theft Bitstream Modification via Unauthorized Access Blockchain Spam Attacks Bluetooth Root Access via Universal Credentials Botnet Creation Brash Brickstorm Backdoor Brickstorm Malware Deployment Brute-Force Attack Brute-force attack against cloud backup service Brute-Force Attack on Cloud Backup Service Brute-Force Attacks via XML-RPC BSOD Triggered by Incompatible Driver Budget and Personnel Cuts Impacting Cybersecurity Posture Bug Bounty Scanner Identification Business Email Compromise (BEC) Business Logic Errors Bypassing Multi-Factor Authentication (MFA) via Mobile Wallet Abuse Cache Smuggling with Malicious Images Caller ID Spoofing Caller Identity Forgery in Video/Audio Calls Celebrity Baiting Certificate Spoofing and Code Obfuscation to Distribute Spyware Chained MCP Exploits (SQL Injection, Prompt Injection, Supply Chain Attacks) Chaining low- and medium-impact flaws Chakra JavaScript Engine Zero-Day Exploit Chat Name Modification ChatGPT Authentication Piggybacking/Remote Code Execution Chinese Cyberattacks on US Critical Infrastructure Cisco Firewall Attack Spree Citrix NetScaler Gateway Vulnerability Cl0p Ransomware Exploit of Oracle E-Business Suite Zero-day Claude File API Data Exfiltration via Indirect Prompt Injection ClickFix ClickFix Campaign ClickFix malware infection via online store techniques ClickFix Social Engineering ClickFix/Paste and Run Clipboard Picture Exfiltration via Python Infostealer Clop Ransomware Attack Clop-linked EBS Exploit Chain Close-Access Operation via RDP CLOUD Act Data Access Cloud Bucket Misconfiguration Cloud Computing System Misconfiguration Cloud Misconfiguration Leading to Data Exposure Cloudflare Pages Abuse Cobalt Strike Code Execution via Overwriting SDP Discovery Callback COLDCOPY "ClickFix" Lure with Rundll32 Collusion Command Injection in Exiftool Communications Jamming Complex Cyber Threat Exploitation Compromised Account Phishing Compromised Administrator Credentials Compromised Backup Admin Account Compromised Credentials leading to Account Takeovers Compromised Credentials leading to Chat History Exposure Compromised Critical Infrastructure Compromised Github Action Compromised npm Packages Compromised Password Exploitation Compromised Remote Desktop Programs used for Malicious Access Compromised WordPress Plugin Compromised WordPress Website Compromised WordPress Websites Compromising logistics/trucking companies via RMM tool installation Compromising the Hosting Provider Contagious Interview Social Engineering Campaign Container Escape via Custom Mount Configurations Content Cloaking for AI Manipulation Conti Ransomware Cookie Replay Attacks Crafted EMR_STARTDOC Record for OOB Read Crafted Packet Remote Code Execution Credential Abuse Credential and Cryptocurrency Wallet Theft Credential Compromise via Phishing/Fake Websites Credential Dumping Credential Harvesting via Phishing Credential Leaks Credential Phishing via Social Engineering (LastPass 'Death Certificate' Scam) Credential Stealing Credential Stealing via Fake Application Credential Stuffing Credential Stuffing Attack Credential Stuffing Attacks on DraftKings Credential Stuffing/Account Takeover via Leaked Credentials Credential Stuffing/Password Reuse Credential Theft Credential Theft via Browser Password Pilfering Credential Theft via Infostealer Logs Credential Theft via Malware Credential Theft via Phishing for "Log-in Credential Theft via Social Engineering Credential Theft via Stealer Logs Credentialed Access & Data Exfiltration Criminalization of legitimate cybersecurity research Cross-border Data Access Cross-Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) in ChatGPT Cross-Site Scripting (XSS) CrowdStrike Falcon Update Bug Cryptocurrency Theft and Laundering CVE-2024-1086 Local Privilege Escalation CVE-2025-59287_EXPLOIT CVSS-based Prioritization Cyber Av2ngers disruption of water supplies Cyber Incident Affecting Click & Collect Cyber Militia Offensive Operations Cyber-attacks Cyber-enabled Financial Fraud Cyberattack Leading to Data Exfiltration and System Shutdown Cyberstalking DanaBot Memory Leak Vulnerability Data Aggregation for Personal Profiling Data and Model Poisoning Data Breach Data Breach Leading to Financial Data Exposure Data Breach Leading to Physical Harm and Threats Data Breach on Ravin Academy's Online Platform Data Breach via Third-Party Data Collection and Profiling Data Collection and Sale of Children's Data Data Collection for Advertising and Training AI Models Data Exfiltration Data Exfiltration and Potential Ransomware Data Exfiltration and Public Disclosure Data Exfiltration from BIG-IP Product Development and Engineering Knowledge Management Platform Data exfiltration from Toys R Us Canada Data exfiltration related to WhatsApp Data Exfiltration related to WhatsApp Data Exfiltration to China Data Exfiltration via SystemBC and Rclone Data Exfiltration via Unauthorized Access Data Exposure through Agent Activity Data Exposure via 'Work with Apps' Integration on macOS Data Exposure via Company Knowledge Feature Data Exposure via Personalized AI Model Data Exposure via Third-Party Integrations Data Exposure via Third-Party Service Connections Data Exposure via Unauthorized AI Tools Data Exposure Vulnerabilities Data Harvesting Post-Credential Theft Data Leak and Subsequent Publication on the Dark Web Data Leak Site Defacement Data Leak via Publicly Indexed Chatbot Conversations Data Leak via Shared Chat Link Data Leak via Technical Error Data Leakage Exploitation Data Leakage via AI Systems Data Leakage via Unsecured Mobile Access Data Mining for Inference and Prediction Data Poisoning Data Poisoning and Model Manipulation Data Poisoning of LLMs Data Scraping for Commercial Gain Data Scraping for Social Engineering and Targeted Attacks Data Scraping of Public Sources Data Staging/Exfiltration in Memory-Only Filesystems Data Theft via Discord support vendor Data Theft via GitLab breach Data Wipers Against Ukraine's Grain Sector Database Misconfiguration Leading to Data Leakage DCSync/DCShadow DDoS Attack DDoS Attacks DDoS Command and Control Infrastructure Dead Domain Takeover Deepfake and Synthetic Identity Deepfake Enabled Voice and Video Cloning Deepfake Impersonation Deepfake Phishing Deepfake Scams Default Credentials Exploit Denial of Service via Malicious Metafiles Dependence on Amazon Web Services (AWS) for Signal Dependency on Hyperscale Providers Diagnosis Digital Wallet Theft Direct Prompt Injection in OpenAI's Atlas Browser via URL Manipulation Disable_Logging_Intercept_CLI_Crash_Devices Disabled TLS Certificate Checks in WebRTC Client Disinformation Campaigns Display Name Alteration in Private Chats Distributed Denial of Service (DDoS) Attacks Distributed Denial-of-Service (DDoS) Attacks and Phone Calls DLL Hijacking using DroneEXEHijackingloader.dll DLL Side-Loading DLL Sideloading with SNAPPYBEE DLL-search-order hijacking DLLInjectionInDockerDesktopInstaller DNS Hijacking DNS Rebinding DNS Tunneling via Non-Standard BASE64 Encoding DNS_Race_Condition_Leading_to_IP_Address_Deletion DockerComposePathTraversal Dolby Digital Plus Audio Decoder Integer Overflow Domain Impersonation DoS via Reboot Loop Double Extortion Doxing and Harassment via Data Breach Information Drugging for Credential Theft Dynamic Code Compilation Eavesdropping via Unencrypted Satellite Communication eBPF Rootkit - LinkPro ECScape Privilege Escalation via IMDS Electronic Surveillance Powers Abuse Elevation of Privileges via Windows Agere Modem Driver Email Account Compromise Email BCC Misconfiguration Email Correspondence Interception Emotet Kill Switch Bypass Emotional Manipulation Leading to Suicide Employment Fraud Encrypted Command and Control (C2) Equity ESAFENET CDG V5 Scans EtherHiding Eucleak ECDSA Key Extraction via EM Side-Channel Evolving Privacy Assumptions Excessive Agency Executable Neutering Executive Impersonation Exfiltration of WhatsApp Data Exploitation of AI Infrastructure Debt via Unpatched Vulnerabilities and Weak Security Controls Exploitation of Common Vulnerabilities Exploitation of Critical Infrastructure by Cyber Militia Exploitation of exposed HMIs Exploitation of leaked Source Code and Builders Exploitation of Legacy Systems Exploitation of Legacy Vulnerabilities in Edge Devices Exploitation of Monitoring Schemes Exploitation of Stolen VPN Credentials Exploitation of Unpatched Web Assets Exploitation of Virtualization Infrastructure Exploitation of Vulnerabilities for Initial Access Exploitation of Vulnerabilities in Unsupported Software Exploitation of zero-day vulnerabilities for high-volume data exfiltration Exploitation of Zero-Day Vulnerabilities in Network Appliances by RedMike (Salt Typhoon) Exploitation via Security Policy Drift Exploiting CMS Vulnerabilities Exploiting Encrypted Kubernetes Environments Exploiting Exposed S3 Bucket with Hardcoded Credentials Exploiting IoT/OT Devices Exploiting Lack of Robust Anti-Theft Measures Exploiting Unpatched Web Assets Exploiting Unpatched/End-of-Life Network Devices Exposed Remote Services Extortion-as-a-Service (EaaS) F5 BIG-IP Source Code and Undisclosed Vulnerability Exploit F5 BIG-IP Source Code Theft Facial Recognition Misidentification Failure to Fix Known Vulnerabilities Fake AI Interface (Spoofed AI Sidebars) Fake Customer Support Impersonation Fake Job Offer Social Engineering Fileless Malware via Syscall Obfuscation Fileless Rootkit Installation via Guest Shell FinFisher (FinSpy) Installation via Fake Firefox Update Firewall_ROMmon_Modification Flawed Persistence Mechanism Forced Alteration of Ownership Structure Gafgyt Botnet GATT Heap Overflow Exploit GDPR Non-Compliance Leading to Data Misuse GitLab CI/CD Pipeline Exploitation via Instance Runners Google Ads Misuse for Malicious Redirection Governance Failures Leading to Technology Transfer Graphite spyware exploitation of compromised smartphones Great Firewall Censorship Circumvention Group Policy Modification for Local Account Creation Hacktivist water pressure alteration Hardware Modification for Noise Removal Heap_Corruption_via_Missing_XML_Tag Heap-based Buffer Overflow with EmfPlusSetTSClip Help Desk Social Engineering Hidden Communication Modules Exploit Home Depot Halloween Phish HTTP Request Smuggling HTTP Traffic Interception/Alteration HTTP.sys Connection Reset Exploit HTTP/2 Localhost Connection Failure Hyper-V Virtual Machine Isolation Bypass ICS Manipulation by Hacktivists ICS/OT Asset Identification at Scale ICTBroadcast Command Injection via BROADCAST Cookie IE Mode Spoofed Website Attack IGEL OS Secure Boot Bypass Implant Installation and Data Exfiltration Improper Input Validation on Samsung Galaxy S25 Improper Output Handling Inconsistent Risk Logging and Tracking Inconsistent Security Baseline Enforcement Indirect Attribute Inference Indirect Prompt Injection in Fellou Browser Indirect Prompt Injection with Mermaid Diagrams for Data Exfiltration Information Asymmetry and Poor Communication Information Disclosure through Heap Memory Leakage Information Disclosure via Improper Email Handling Information Operations (IO) - Disinformation/Propaganda Information Stealers Information_Exposure_via_API_Parameter_Manipulation Infostealer Initial Access Infostealer Malware Infrastructure Automation Mistakes Initial Access Brokering Initial Access via Malicious File and Lateral Movement Insecure KEM Combination via Concatenation Insider Threats Internal IT Shutdown Internal Spearphishing Invisible Character Phishing InvisibleFerret Malware IOGPUFamily Out-of-Bounds Write IT Worker Scheme for Illicit Revenue Generation JADESNOW Downloader Jailbreaking via Role-Playing Just Works Authentication Bypass KB5066835 USB Device Unusability in WinRE Kerberoasting Kerberos Ticket Injection into LSASS Keylogging and Screenshotting via OtterCookie Kubernetes Container Escape Lack of Centralized API Governance leading to Untrustworthy APIs Lack of comprehensive Microsoft 365 backups Lack of Consistent Governance in AI Systems Lack of Granular Privacy Settings and Default Configurations Lack of Input Validation on User-Supplied Input Lack of System Authorization LANDFALL Spyware LandFall Spyware Deployment via Malformed DNG Image Landfall Spyware via DNG Image Exploitation LANSCOPE Endpoint Manager Zero-Day Exploitation Lateral Movement Lateral Movement and Privilege Escalation Lateral Movement via Windows Remote Management (WinRM) LD_PRELOAD Hijacking Leaked Secrets in VSCode Extensions Legacy System Operation LFI_WebConfig_MachineKey_RCE Linux Rootkit Deployment Linux Rootkit Deployment via Cisco IOS/IOS XE Vulnerability Living off the Land LLM Grooming LLM-Driven Data Exfiltration LLMNR/NBT-NS Poisoning LNK File Command Injection LNK File Command-Line Argument Injection Local Vulnerability Scanning LockBit 3.0 Builder Leak LockBit 5.0 Ransomware Low-and-Slow Attack LUKS2 Null Cipher Exploit Malformed Audio File Exploitation Malformed SAML Assertion Response Denial-of-Service Malformed SAML Authentication Request Crash Malformed SAML Response Memory Exhaustion Malicious ArcGIS SOE Webshell Malicious Automation/Rogue Bots Exploiting Agentic Commerce Malicious Campaign using RAR archives and BAT scripts Malicious Code Blocks in Free Templates Malicious Cryptocurrency Wallet Draining Extensions Malicious Git Repository with core.fsmonitor Malicious Macro Execution Malicious MCP Server Configuration Exploits Malicious NuGet Packages with Delayed Payloads Malicious or Accidental Data Deletion Malicious PDF and Social Engineering Malicious Third-Party Clients/Mods Malicious VPNs Used for Botnet Creation Maliciously Signed Fake Teams Installers Malvertising campaign delivering Oyster backdoor Malware Delivery via Password-Protected Archives Malware Distribution via Blockchain (EtherHiding) Malware Distribution via Fake Apps Malware Hosting and Distribution Man-in-the-Middle (MitM) Attacks Manual Processing Bypass Mass Surveillance Matrix.org Homeserver Outage MCP Server Persistence Exploit Meduza Infostealer Meduza Stealer Memory Safety Bugs in C/C++ Merging Federal Datasets for Voter Verification Message Editing Without Trace Message Overwriting Mic-E-Mouse Mic-E-Mouse - Eavesdropping through Computer Mice Microsoft Zero-Day Exploits Mimikatz WDigest Registry Modification Mirai Botnet Misconfiguration Exploitation via Overly Permissive Rules Misconfigured Security Tools Misinformation Misinformation Campaign Model Switching/Routing for Sensitive Conversations Money Laundering Money Laundering Through Front Businesses and Online Gambling Platforms Mozi Botnet MSP Direct Connect Port Opening MSP Multi-Vendor Security Stack Vulnerabilities Multi-Stage Exploit Chain Nation-State Actor Exploiting F5 Vulnerability Nation-state Actor Long-Term Persistent Access Nation-State Actor Network Breach Nation-State BIG-IP Source Code and Configuration Data Exfiltration Network Intrusion NFC Relay Attack via Malicious Android Apps not break-in" Campaigns Notification Spoofing NPM Token Stealing via GitHub Actions Cache Poisoning NTDS.dit dump NTLM Hash Leakage via File Explorer Preview Pane NTLM Hash Theft via File Explorer Preview NTP Pool IPv6 Scanning OAuth token abuse for Salesforce data theft OAuth Token Exposure in ChatGPT Atlas Obscura ransomware attack disrupting Michigan City Omnibox Prompt Injection OpenPLC ModbusTCP Denial-of-Service Oracle E-Business Suite Data Theft via Zero-Day Exploitation OS Command Injection via webctrl.cgi Out-of-bounds Write via Malicious .fadein File Over-Permissioned Agents Oyster Backdoor Pass-the-Hash/Ticket Reuse Passive Satellite Data Interception Passkey Phishing Passkey-related Phishing and Social Engineering Passport Cloning via Passive Authentication Bypass Password Attacks/Credential Stuffing Password Cracking via Common Passwords Password Extraction Through Human Intuition Password Reset Vulnerability Password Reuse on Vulnerable Platforms Password Spraying and Brute-Force Attacks Password Theft Path Traversal via Malicious OCI Artifacts Pegasus Spyware Exploit via WhatsApp Flaw Persistence Mechanisms Persistence via Scheduled Task (NOROBOT) Persistent Data Allocation via CONFIG REJ and Congestion Phishing Phishing and Malicious Email Phishing and Social Engineering Phishing Attack Phishing Attack Against Password Manager Users Phishing attack with weaponized Word document Phishing Attacks Targeting Firefox Add-ons Phishing attacks to harvest credentials and bypass MFA Phishing Campaign Phishing Campaigns Phishing Email Obfuscation Phishing for Apple ID Credentials Phishing Kit Usage Phishing scams exploiting New York’s inflation refund program Phishing via Fake LastPass Inheritance Process Phishing/Smishing Campaign Phone Theft for Resale Physical Attacks Pixel-stealing “Pixnapping” attack targets Android devices Pixnapping Pixnapping - Stealing Data from Android Apps via Side Channel Planet WGR-500 Format String via HTTP Request Planet WGR-500 OS Command Injection via HTTP Request Planet WGR-500 OS Command Injection via Network Request Planet WGR-500 Stack Buffer Overflow via HTTP Request Play Ransomware social engineering campaign PlugX Malware Deployment Policy Puppetry Post-Compromise Activities on BIG-IP Appliances Post-Exploitation Phishing Potential for Mass Surveillance PowerShell One-Liner Execution PowerShell-based Malware Delivery Predictable Password Patterns Privacy Erosion via Transaction Tracking Privilege Escalation Privilege Escalation via Account Registration Privilege Escalation via Agere Modem Driver Privilege Escalation via AI Agent Evolution Privilege Escalation via Backdoor Accounts Privilege Escalation via Windows Remote Access Connection Manager Programmable Money Restrictions Prompt Injection Prompt Injection and Data Manipulation in AI Systems Prompt Injection Attack Prompt Injection in ChatGPT to Output Specific Text Prompt Injection in OpenAI Atlas Omnibox Prompt Injection to Poison Gemini's Mathematical Calculations PromptFlux Malware with Thinking Robot Module PROMPTFLUX Self-Modification for Evasion PROMPTSTEAL Data Exfiltration via LLM Generated Commands PromptSteal Data-Mining Malware ProxyLogon ProxyNotShell ProxyShell PsExec for Lateral Movement and Remote Execution PyInstaller Packaging for Evasion Qakbot Malware quotes Ransomware Ransomware Attack Ransomware Attack (Medusa) Ransomware Attack and Data Exfiltration Ransomware Attack on Customer Shares Ransomware attack on Synnovis Ransomware Attack via Credential Compromise Ransomware Attacks via Exploited Exchange Flaws Ransomware Deployment Ransomware Deployment (Black Basta) Rapid C2 Rotation RAR Archive and BAT Script Exploitation RayInitiator and LINE VIPER Deployment RDSEED Manipulation Redirect Chain Evasion Redirect Chain Exploitation RedTiger Infostealer Relative Read and Write Primitives via ERTM Fragments Relaying Active Authentication Signatures Remote Access Connection Manager Elevation of Privilege Remote Access Trojan (RAT) Installation via Social Engineering Remote Code Execution via Crafted File Upload via Java RMI Remote Code Execution via Crafted Web Page Remote Code Execution via Specially Crafted Packets Remote Dynamic Dependencies (RDD) Remote_Dynamic_Dependencies_and_Lifecycle_Scripts Request Smuggling Retrieval-Augmented Generation Privacy Leaks Return Address Corruption Rogue Agent Impersonation Rogue Extension Exploitation Rollbacks of Diversity Rootkit Deployment Rootkit Deployment via SNMP RCE Rounding Direction Error in Balancer v2 Rounding Error Exploitation in Balancer V2 Running Unsupported Operating Systems Runtime Function Patching with drwrap Runway Dependence Salesforce Data Export Salt Typhoon and Volt Typhoon intrusions Salt Typhoon Gang Telecom Network Infiltration SAML_Response_Type_Confusion Scam Texts Targeting Americans Scheduled Task Persistence ScoringMathTea RAT Deployment Secure Boot Bypass via 'mm' command Secure_Boot_Bypass_IGEL_OS Sensitive Information Disclosure SEO Poisoning and Malicious JavaScript Injection via Compromised WordPress Sites SesameOp Backdoor via OpenAI Assistants API Session Hijacking via SessionReaper SessionReaper Sextortion Sexual Exploitation of a Minor Shadow AI and Unmanaged AI Agents Shadow AI Data Exfiltration Shared Content Security Blind Spot SharePoint 0-day Exploitation SharePoint ToolShell Exploitation (C0058) Sharp7Extend Industrial Sabotage Shellcode Injection Detection Short-lived Web Page Exploit Sideloaded Stalkerware with Insecure Data Storage SIM Box Exploitation SIM Box Fraud SIM-box facilitated mass mobile identity fraud SIM-Swapping Fraud Sitecore ViewState Deserialization Exploit SMB_Client_Coercion Smishing SMS Phishing via SIM Farms SMS Spam Campaign SMS-Based 2FA Interception SNMP Exploit for Remote Code Execution SocGholish Fake Update Exploit Social Engineering Social Engineering (macOS) Social Engineering & Gamification for Radicalization Social Engineering & OTP Interception via Telegram Bots Social Engineering and Anti-Detection Tactics Social Engineering and Confidence Scam Social Engineering and Fraudulent Cryptocurrency Investment Schemes Social Engineering and Identity Deception Social Engineering and Phishing Social Engineering for Account Access Social Engineering of Gemini Social Engineering of Gemini's Safeguards Social Engineering of Trusted Recovery Contacts Social Engineering via Fake Job Interviews Social Engineering via Fake Job Offers Social Engineering via Fake Job Offers (Operation DreamJob) Social Engineering via Fake Job Postings Social Engineering via Fake Websites Social Engineering via Job Offers Social Engineering via Malicious Distribution Network Social Engineering via Trojanized Software Social Engineering/Human Vulnerability Social Media Surveillance and Visa Revocation Solana Transaction Payload Delivery SolarWinds Supply Chain Attack Solver Compromise Source Code Theft and Potential Exploitation of Undisclosed Vulnerabilities Sovereignty Washing Spear Phishing Spear Phishing with ClickFix-Style CAPTCHA Lure Spear-phishing campaign via booby-trapped LNK file Spearphishing Spearphishing with Malicious LNK files SQL Injection Stack-Based Buffer Overflow in Referer Header Starlink Terminal Misuse for Cybercrime Stolen BIG-IP Source Code and Undisclosed Vulnerability Exploitation Stolen Credentials via Infostealer Malware and Access Brokers Stolen Encrypted Vault Backups Stolen Source Code and Vulnerability Information leading to Potential Targeted Exploits Stopping Trace Logging Struts DevMode RCE via Authentication Bypass Supper SOCKS5 Backdoor Deployment for Remote Access Supply Chain Attack Supply Chain Attack on Criminal Collaborationware Supply Chain Attack on Effortless Motors Supply Chain Attack via Compromised IT Service Provider Supply Chain Attack via Malicious NPM Package Supply Chain Attack via Malicious VS Code Extension Updates Supply Chain Attacks Supply Chain Disruption Supply Chain Disruption via Export Controls Supply Chain Exploitation Supply Chain Risks due to Third-Party Providers Supply Chain Vulnerabilities Supply Chain Vulnerability via Cheaper Chinese Tech Supply-Chain Attacks via PyPI Sybil Attacks in Multi-Chain Environments System Prompt Leakage Tar Header Smuggling in async-tar Targeting of Microsoft Exchange Servers Tech Support Scams leveraging Remote Desktop Programs Telegram API as C2 Channel TEMP.Zagros Revealing Infrastructure via LLM Interaction Template Injection Leading to Coinminer Installation Third-party AI Model Risks Third-Party App Store Malware and Adware Distribution Third-Party Customer Service Provider Compromise (Discord) Third-Party/Supply Chain Attacks Time Bomb Logic in Malicious NuGet Packages Time Manipulation Attack (Implied) TLS_Configuration_Issues Tool Sprawl and Alert Fatigue ToolShell Training Data Exposure TrickBot Malware Trojanized Code Injection via Fake Development Tasks Two-Face Binary Typosquatting Typosquatting via Package Name Similarity Typosquatting_Slopsquatting_LLM_Hallucination UAC Bypass UAC Bypass for Privilege Escalation Unauthenticated Arbitrary File Upload Unauthenticated Firmware Rollback Unauthorized Database Queries Unauthorized Firewall Configuration Backup Access via API Call Unauthorized Workspace Merger/Enterprise Account Incorporation Unbounded Consumption UNC3886 Zero-Day Exploits on Routers and Virtualization Platforms (C0056) Understaffing of Digital Professionals Unencrypted Data Transfer Over WAN Unencrypted DDS Traffic Unencrypted Satellite Communication Interception Unencrypted SQL Backup Unicode Character Obfuscation Uninterrupted Automated Vulnerability Scanning Universal Backdoor Universal Password Creation Unlawful Collection and Use of Personal Data for Credit Scoring Unlawful Data Collection via Web Tracking Technologies Unmanaged Device Risk Exploitation Unpatched Software Vulnerability Unprotected Kafka Broker Access Unprotected VPN access Unresolved Vulnerability Backlog Unscheduled Network Reconfiguration Unsecured AWS S3 Bucket Unspecified Cisco Firewall Bugs Unsupported Microsoft Exchange Exploitation USB Port Exploitation on Mobile Handsets Use of compromised certificates Use of Outdated Systems Use-After-Free User Enumeration Vector and Embedding Weaknesses Vidar Infostealer Video-Driven Impersonation Attack Virtual Kidnapping Scams Vishing and Modified Data Loaders VMware Tools Privilege Escalation Voice Cloning and Call Spoofing Voice Spoofing with AI Volt Typhoon Lateral Movement VS Code Extension Attack Wallpaper Customization App Issues WannaCry Ransomware Attack Watering Hole Attack Weak Backup Password Exploitation Weak Encryption of Configuration Files Weakened National Cyber Director Authority Weaponization of new flaws faster than defenders can respond Web Skimmer WebKit Malicious Web Content Webshell Deployment WebSocket RAT WhatsApp Screen Sharing Remote Access Fraud WhatsApp Web Hijacking for Spam Campaigns WhatsApp Zero-Click + Apple OOB Write Exploit Chain Whisper 2FA Phishing Kit Wi-Fi Network Mapping for Espionage/Cyberattacks Windows Remote Access Connection Manager EoP Windows Shortcut Vulnerability (LNK File Execution) Windows_Agere_Modem_Driver_Elevation_of_Privilege Windows_Remote_Access_Connection_Manager_Elevation_of_Privilege WinRAR Zero-Day Exploit WIREGUARD_COMMAND_INJECTION WireTap Workforce and Budget Cuts Hampering Cyber Defenses Workspace Isolation Bypass WSUS Exploit Delivering Skuld Infostealer WSUS Exploitation for Reconnaissance and Data Exfiltration WSUS Malicious Update Distribution WSUS PowerShell Data Exfiltration WSUS Vulnerability leading to Skuld Infostealer Deployment WSUS_RCE_via_Unsafe_Deserialization Xiaomi Backdoors (Hypothetical) XLoader XSS vulnerability in Roundcube XWiki SolrSearch RCE XZ Utils Backdoor YouTube Ghost Network Malware Distribution Zero-Click Attack via Malicious Image Zero-click Dolby audio bug Zero-Click Exploit Zero-Day Exploit Zero-Day Exploit Sale Zero-Day Exploit Sales Zero-day exploits Zero-Day Exploits Developed by Trenchant Zero-Day Vulnerability Exploitation Zip64 End-of-Central-Directory Record Manipulation
Vulnerabilities All CVE-2016-9535 CVE-2017-3881 CVE-2017-9841 CVE-2019-3728 CVE-2021-21311 CVE-2021-3129 CVE-2021-40351 CVE-2021-4122 CVE-2022-22947 CVE-2022-29303 CVE-2022-47945 CVE-2023-1389 CVE-2023-20198 CVE-2023-34362 CVE-2023-35673 CVE-2023-40129 CVE-2023-46747 CVE-2024-1086 CVE-2024-12856 CVE-2024-1709 CVE-2024-20353 CVE-2024-20359 CVE-2024-21827 CVE-2024-23897 CVE-2024-3094 CVE-2024-3721 CVE-2024-38197 CVE-2024-42009 CVE-2024-50387 CVE-2024-50388 CVE-2024-50623 CVE-2024-51979 CVE-2024-55956 CVE-2025-0033 CVE-2025-0785 CVE-2025-11371 CVE-2025-11492 CVE-2025-11493 CVE-2025-11837 CVE-2025-12036 CVE-2025-12428 CVE-2025-20333 CVE-2025-20352 CVE-2025-20354 CVE-2025-20358 CVE-2025-20362 CVE-2025-20363 CVE-2025-21042 CVE-2025-21043 CVE-2025-22224 CVE-2025-22225 CVE-2025-22226 CVE-2025-24052 CVE-2025-24257 CVE-2025-24893 CVE-2025-24990 CVE-2025-2611 CVE-2025-2783 CVE-2025-2884 CVE-2025-30388 CVE-2025-30406 CVE-2025-31133 CVE-2025-31324 CVE-2025-33073 CVE-2025-34033 CVE-2025-41244 CVE-2025-41251 CVE-2025-41252 CVE-2025-41390 CVE-2025-43300 CVE-2025-43338 CVE-2025-43372 CVE-2025-43400 CVE-2025-43431 CVE-2025-43442 CVE-2025-43455 CVE-2025-47827 CVE-2025-47984 CVE-2025-48561 CVE-2025-48703 CVE-2025-48826 CVE-2025-49704 CVE-2025-49706 CVE-2025-49708 CVE-2025-49844 CVE-2025-52425 CVE-2025-52565 CVE-2025-52881 CVE-2025-53476 CVE-2025-53690 CVE-2025-53766 CVE-2025-53770 CVE-2025-53771 CVE-2025-53786 CVE-2025-53814 CVE-2025-53855 CVE-2025-54236 CVE-2025-54253 CVE-2025-54399 CVE-2025-54400 CVE-2025-54401 CVE-2025-54402 CVE-2025-54403 CVE-2025-54404 CVE-2025-54405 CVE-2025-54406 CVE-2025-54795 CVE-2025-54957 CVE-2025-55177 CVE-2025-55247 CVE-2025-55315 CVE-2025-57822 CVE-2025-59230 CVE-2025-59234 CVE-2025-59236 CVE-2025-59246 CVE-2025-59287 CVE-2025-59389 CVE-2025-61882 CVE-2025-61884 CVE-2025-61932 CVE-2025-62518 CVE-2025-62626 CVE-2025-6264 CVE-2025-62725 CVE-2025-62840 CVE-2025-62842 CVE-2025-62847 CVE-2025-62848 CVE-2025-62849 CVE-2025-6325 CVE-2025-6327 CVE-2025-7850 CVE-2025-7851 CVE-2025-9217 CVE-2025-9491 ZDI-CAN-25373
MITRE ATT&CK TTP All ” a Penn mailing list platform hosted on Salesforce Marketing Cloud." ] "A threat actor has claimed responsibility for stealing 1.3TB of compressed data and demanding ransom "Apache OpenOffice systems have suffered a ransomware attack claimed by the Akira gang "Compromised university email addresses "context": " describes a wave of offensive emails being sent from compromised university email addresses. This suggests a phishing attempt using compromised email accounts to distribute malicious content. The phrase \"offensive emails\" suggests potential malicious links or attachments." "context": "The article describes a scenario where a blockchain network (Solana) experienced a service disruption due to a flood of spam transactions "context": "The article discusses spam attacks on blockchain networks like Ethereum "context": "The article explicitly mentions ransomware attacks by Everest "context": "The article mentions ransomware groups (Qilin, XWorm) encrypting data after exfiltration "context": "The description includes the use of 'spear-phishing with EU/NATO-themed LNK files exploiting CVE-2025-9491' which implies the delivery of LNK files with a spearphishing lure related to Europe or NATO." "context": "The Oracle E-Business Suite vulnerability allows unauthenticated remote code execution (RCE) through a public-facing application (EBS apps) "context": "This quote indicates the exploitation of a zero-day vulnerability in a public-facing application (Oracle E-Business Suite) to gain initial access and breach the mentioned organizations. A zero-day exploit is the vulnerability which is unknown to the vendor "context": null "contradictions": "The article doesn't explicitly state that the attackers intentionally stopped the service. The disruption might be a consequence of resource exhaustion or network congestion caused by the flood of transactions. Nevertheless "contradictions": "The article focuses on mitigating spam at the transaction relay layer "contradictions": "The article provides limited context on the exact method of exploiting the vulnerability." "contradictions": "The compromised email could also be misused to spread misinformation "contradictions": "There is no contradictory evidence." } "contradictions": "While the data is said to be unreadable "contradictions": null } "Each node monitors the behavior of its peers over time and assigns a reputation score based on factors like transaction rate "Exploit Public-Facing Application: T1190 "File and Directory Discovery: T1083 "independent_analysis": " university email addresses being used suggests an attempt to establish trust and social engineer recipients into clicking a malicious link or opening a malicious attachment. The goal appears to be credential theft "independent_analysis": "The description details a specific CVE that affects a publicly accessible component of Oracle E-Business Suite. The fact that it allows unauthenticated RCE makes it directly applicable to T1190." "independent_analysis": "The detail about Solana going offline for seven hours strongly suggests that the spam attack led to a denial-of-service situation. The overload of transactions caused the system to crash "independent_analysis": "The mention of 'unreadable without proprietary tools' suggests encryption "independent_analysis": "The repeated mention of ransomware groups (Everest, Akira, Cl0p) directly performing attacks indicates the use of data encryption as the primary means of impacting victim organizations. Specific details about the encryption algorithms or ransom demands aren't given "independent_analysis": "The spearphishing lure used were LNK files - shortcuts to malicious scripts and programs and not attachments themselves. They exploited a vulnerability and it led to malware deployment and sensitive info leak." "independent_analysis": "While the article does not give technical details about exploit itself "independent_analysis": "While the article doesn't explicitly mention specific application layer protocols "independent_analysis": null "Ingress Tool Transfer: T1105 "Obfuscated Files or Information: T1027 "OS Credential Dumping: T1003 "Phishing: T1566 "Proxy: T1090 "Researchers have discovered that XWorm RAT has resurfaced with 35 plugins and an upgraded ransomware module for file encryption "Service Stop: T1489 "Spearphishing Link: T1192 "The Cl0p ransomware group likely exploited an Oracle E-Business Suite zero-day (CVE-2025-61882) to breach Pan American Silver Corp "Valid Accounts: T1078 300 files totaling 27GB of sensitive data Akira and Cl0p groups. Ransomware inherently involves encrypting data for impact allowing data theft from internet-exposed EBS apps." ] and Air Arabia." and also demanding ransom for the decryption keys. Avnet's data breach involved 1.3TB of data stolen and held for ransom and although not intentionally brought down and Cox Enterprises." ] and exfiltration of sensitive documents through advanced evasion and persistence tactics." ] and fee patterns." ] and internal reports." and ransom notes." ] and Serbia since September. The campaign was leveraging spear-phishing with EU/NATO-themed LNK files exploiting CVE-2025-9491 to deliver PlugX malware and Solana and Solana. These networks operate using application layer protocols for transaction submission and propagation. The monitoring of transaction rate and fee patterns falls under the application layer protocol analysis." and the context of ransomware attacks and ransom demands further supports the Data Encrypted for Impact technique." and the total number of affected individuals remains unknown." anyone can send transactions as long as they pay the required fee." Application Layer Protocol: T1071 Belgium Bitcoin but most data is reportedly unreadable without proprietary tools but the most likely intent is to deploy phishing for credentials or malware" } but the presence of ransomware confirms this TTP." Cloud Accounts: T1078.004 Command and Scripting Interpreter: T1059 Compromised Data: T1565 Content Injection: T1659 contracts Credentials from Password Stores: T1555 Data Encrypted for Impact: T1486 Data Exfiltration: T1041 Denial of Service: T1499 Deobfuscate/Decode Files or Information: T1140 Drive-by Compromise: T1189 Dublin Airport duplication effectively halting block production." Email Forwarding Rule: T1114.003 employee IDs enabling credential theft enabling data theft Exfiltration Over C2 Channel: T1041 Exploit of Remote Services: T1210 Exploit Public-Facing Application: T1190 Exploitation for Client Execution: T1203 Exploitation for Privilege Escalation: T1068 Exploitation of Remote Services: T1210 External Remote Services: T1133 failure rate falsely claiming that sensitive student and alumni data was stolen. All emails were sent via “connect.upenn.edu File and Directory Discovery: T1083 hence no patch released for it yet." Impair Defenses: T1562 including financial documents Indicator Removal: T1070 Ingress Tool Transfer: T1105 Inhibit System Recovery: T1490 Input Capture: T1056 Italy Lateral Movement: T1021 Lateral Tool Transfer: T1570 malware installation mentioning the zero-day vulnerability and a public-facing application allows to confirm that external application exploitation took place." Modify Registry: T1112 Native API: T1106 Network Segmentation: T1071 Non-Application Layer Protocol: T1095 Obfuscated Files or Information: T1027 or information gathering." OS Credential Dumping: T1003 Phishing: T1566 PowerShell: T1059.001 Process Injection: T1055 Proxy: T1090 quotes": [ "One well-known example occurred in 2022 when Solana went offline for seven hours after bots submitted millions of NFT minting transactions per second." ] quotes": [ "Oracle E-Business Suite zero-day CVE-2025-61882 enables unauthenticated RCE via the BI Publisher Integration component with a single low-complexity HTTP request quotes": [ "Researchers identified a China-affiliated campaign by UNC6384 targeting European diplomatic and government entities in Hungary quotes": [ "The attack resulted in the exfiltration of over 9 quotes": [ "The Cl0p ransomware group likely exploited an Oracle E-Business Suite zero-day (CVE-2025-61882) to breach Pan American Silver Corp quotes": [ "The Everest ransomware group has claimed responsibility for a series of attacks impacting AT&T quotes": [ "When blockchain networks get flooded In open networks like Ethereum quotes": [] Remote Services: T1021 Replication Through Removable Media: T1091 resulting in the exfiltration of 23GB of data." Scheduled Task/Job: T1053 Schneider Electric Service Stop: T1489 Social Engineering: T1566 Spearphishing Attachment: T1193 Spearphishing Link: T1192 Supply Chain Compromise: T1195 surveillance System Information Discovery: T1082 the context of blockchain networks implies the use of such protocols for communication and transaction processing. The monitoring of transaction characteristics is indicative of interaction with the application layer." the end result was a complete service interruption." the Netherlands the specific details of monitoring transaction rate and fee are tied to how the application layer protocol is utilized." this does not necessarily mean the data was encrypted. It could simply mean that the data was in a proprietary format that can't be easily viewed by outside parties." this resulted in an unintended service stop." thus mapping directly to this technique." Trusted Relationship: T1199 ttp": { "items": { "Application Layer Protocol: T1071 ttp": { "items": { "Data Encrypted for Impact: T1486 Unsecured Credentials: T1552 Valid Accounts: T1078 wallpaper changes Web Shell: T1505.003 which could involve some aspects of network layer protocols. However which directly relates to exploiting a public-facing application to gain unauthorized access." Windows Command Shell: T1059.003 with the data being reportedly unreadable without proprietary tools."
Exploited Software All .NET AppDomainManager injection 1Password Accellion FTA Acronis Action1 Active Directory AdaptixC2 adhamu.history-in-sublime-merge Adminer Adobe Commerce (Magento) Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE) Adobe Experience Manager (AEM) Forms on JEE Adobe Photoshop Agere Modem driver (ltmdm64.sys) Agere Windows Modem Driver AI companion apps AI Models AI Systems AI tools AI Tools ai-driven-dev.ai-driven-dev Akira ransomware Albanian government infrastructure All devices running BIG-IP (F5OS), BIG-IP (TMOS), Virtual Edition (VE), BIG IP Next, BIG-IQ, and BIG-IP Next for Kubernetes (BNK) / Cloud-Native Network Functions (CNF) ALPHV/BlackCat ALPHV/BlackCat ransomware Alpine Linux Amadey Amazon DynamoDB's DNS management system AMD Epyc and Ryzen CPUs (Zen 5 chips) AMD SEV-SNP Android Android (Samsung and Pixel devices) Android Applications Android Applications (Malicious APKs) Android Applications (Specifically targeting Signal, Google Authenticator, Venmo, and Google Maps) Android Apps (specifically princess.apk) Android Bluetooth stack (Fluoride) Android Devices Android Host Card Emulation (HCE) Android OS Android Phones Anthropic Claude's Code Interpreter Anthropic MCP Inspector AnyDesk AOL Account APIs (Application Programming Interfaces) APM Apple ID Apple iOS, iPadOS, and macOS Apple iPhones Apple iPhones and iPads Apple Wallets Arc ArcGIS Asahi Systems Askul Website and Systems ASP.NET Core Kestrel Web Server ASP.NET Core's Kestrel web server async-tar async-tar Rust library and forks AsyncRAT Atlas Atomic Stealer Aura Stealer AWS S3 Balancer v2 Balancer V2 ComposableStablePool contracts BazarBackdoor BeaverTail BEAVERTAIL malware BIG-IP BIG-IP iSeries, rSeries, or any other F5 appliance that has reached end of support BIG-IP Next for Kubernetes BIG-IQ Binance Blue Angel Software Suite Botnet malware Brave Brother MFC-J1010DW Brother MFC-J1010DW Firmware BSAFE Crypto-C 7.5 Bumblebee Canon printer assistant utility Capita Systems Capital One's cloud computing systems Cellular Data (via satellite backhaul) CentreStack Chakra JavaScript engine Chatbots ChatGPT ChatGPT Atlas Chessfi Chrome Chrome Web Store Chromium Chromium_Stealer Cisco Cisco 3750G series devices Cisco 9300 series devices Cisco 9400 series devices Cisco 9400, 9300, and legacy 3750G series devices Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Cisco ASA 5500-X Cisco ASA 5500-X devices running Cisco Secure Firewall ASA software with VPN web services enabled Cisco ASA 5500-X firewalls Cisco ASA and FTD firewalls Cisco Devices Cisco firewall Cisco firewalls Cisco IOS and IOS XE Cisco IOS and IOS XE (Cluster Management Protocol) Cisco IOS and IOS XE (SNMP) Cisco IOS XE Cisco IOS/IOS XE Cisco IOSd Cisco networking devices Cisco ROM Monitor (ROMmon) Cisco Secure ASA Software Cisco Secure FTD Software Cisco SNMP Cisco Unified Contact Center Express (UCCX) Citrix NetScaler Gateway Citrix Virtual Delivery Agent Cleo file transfer CMS platforms and plugins Cobalt Strike Coinbase COLDCOPY com.openai.dalle3umagic com.wkwaplapphfm.messengerse Comet Comet Browser Comet Browser (Perplexity) Computer information protection tools Conduent Network Conduent's systems ConnectWise Automate Conti Control Web Panel (CWP) CosmicDoor CountLoader Critical Control Web Panel Critical Infrastructure Systems cross-fetch CrowdStrike Falcon Cryptocurrency Cryptocurrency Investment Schemes Cryptocurrency wallets cryptsetup csc.exe (.NET Framework Compiler) csc.exe (Visual C# Compiler) Cyberduck Cybersecurity Providers DanaBot Dante (commercial spyware developed by Memento Labs - formerly known as Hacking Team) Dark Crystal RAT Data wipers DcRat DCRat DDR4 standard memory modules DeepSeek Dell BSAFE Crypto-C Dell BSAFE Crypto-C RSA 6.4 Dia Diffie-Hellman Discord DNG Image Files DNS (Domain Name System) Docker Docker Compose Docker Desktop Installer.exe Dolby audio Dolby Digital Plus audio decoder Dolby Unified Decoder Component (UDC) DownTroy DVRs, NVRs, CCTV, web servers (multiple vendors) E-mail clients Edge Edge Devices Electronic Passports Electronic Passports using Basic Access Control (BAC) ELF Emotet Enterprise AI Systems Entr'ouvert Lasso ESAFENET CDG V5 ESET installer ESXi Ethereum EtherHiding ExaGrid Tiered Backup Storage Exchange Server 2016 Exchange Server 2019 F5 F5 BIG-IP F5OS Facebook Facebook Messenger Fade In fd Fellou Browser File Explorer FileFix FinFisher Firefox add-ons Firefox extensions FL Studio FontParser Framework 13 (11th Gen Intel) Framework 13 (12th Gen Intel) Framework 13 (13th Gen Intel) Framework 13 (AMD Ryzen 7040) Framework 13 (AMD Ryzen AI 300) Framework 13 (Intel Core Ultra) Framework 16 (AMD Ryzen 7040) Framework Desktop (AMD Ryzen AI 300 MAX) Framework UEFI Shell Garden Solver GCC Productions Inc. Fade In Gemini General Atomics MQ-9B Git git show GitHub MCP GitHub Notification System GitLab GitLab Instance Runners Gladinet's CentreStack and Triofox Gmail go test GoAnywhere MFT Google Ads Google Authenticator Google Chrome Google Chrome V8 JavaScript engine Google Maps Google Pay Grammarly Graphics Device Interface (GDI) in Windows Graphite GraphQL-JS Grok HBS 3 Hybrid Backup Sync HMIs (Human Machine Interfaces) Home Assistant Green Homebrew Hotmail HP OneAgent HPE Integrated Lights-Out (iLO) / Integrated Dell Remote Access Computer (iDRAC) / Intelligence Platform Management Interface (IPMI) HTTP traffic Huawei Huddle01 Hundred Finance protocol Hybrid Backup Sync Hyper Data Protector IcedID iCloud ICS/OT Protocols (Modbus, DNP3, Siemens S7, BACnet) ICTBroadcast IGEL OS ImageIO In-flight Wi-Fi Industrial Control Systems (ICS) Industrial Control Systems (ICS) Devices Infected browsers Infineon secure element Infostealer malware Infostealers Intel SGX Internet Explorer mode in Edge Inverters InvisibleFerret INVISIBLEFERRET INVISIBLEFERRET malware IOGPUFamily iOS iPadOS iPhone JadeSnow JADESNOW JADESNOW malware Jaguar Land Rover IT systems JavaScript Jenkins Jira JLR's internal IT environment Kafka broker KEM_Y (Hypothetical KEM with collisions) King Addons for Elementor KPU Telecommunications Kraken Lanscope Endpoint Manager Lanscope Endpoint Manager On-Premise Laravel Ignition Large Language Models (LLMs) LastPass Latrodectus Legacy Applications LibTIFF LinkPro Linux Linux kernel LLMs LockBit LogMeIn LUKS2 Lumma Stealer LummaC2 macOS Magento Malware Malware Remover Marks & Spencer Click & Collect service MAYBEROBOT MCDbRepository mcp-remote Meduza infostealer Meduza Stealer Merkle Servers Meta Pixel Microsoft Microsoft 365 Copilot Microsoft Active Directory Microsoft ASP.NET Core Kestrel web server Microsoft cdb.exe Microsoft Copilot Microsoft Edge Microsoft Entra ID Microsoft Exchange Online Microsoft Exchange Server Microsoft Exchange Server CVE-2025-53786 Microsoft Graph APIs and OneDrive Microsoft Hyper-V Microsoft Intune Microsoft Office Microsoft SharePoint Microsoft Teams Microsoft Teams installers Microsoft Windows Microsoft Windows Server Update Services Microsoft Windows SMB client Microsoft Word Mimikatz Monday MonsterV2 Moobot Motex LANSCOPE Endpoint Manager MOVEit Transfer MuPDF MVPower DVR MyDbRepository MySonicWall.com Network appliances Next.js NextJS SSR website njRAT node-nvm-ssh NOROBOT npm packages npm Packages OAuth and JWT (JSON Web Token) Obsolete Servers Office 2016 Office 2019 Okta old, likely vulnerable message board platform OneDrive Online Gambling Platforms Online platform hosted by Ravin Academy OpenAI Atlas OpenAI Atlas Web Browser OpenAI Guardrails OpenAI's Assistants API OpenAI's Atlas OpenAI's Atlas Browser OpenPLC OpenVSX Opera Oracle E-Business Suite Oracle E-Business Suite (EBS) OtterCookie Outdated software Outdated Software Outlook Outlook Account Outlook Web Access 2019 Outlook Web Access 2019 or earlier Oyster backdoor Paragon PDQ Pegasus Pegasus Spyware Perplexity Perplexity AI Perplexity Comet Phoenix backdoor v4 Phorpiex PHPUnit Pikabot Planet WGR-500 router PLCs, remote terminal units, human-machine interfaces, SCADA systems, safety controllers, building management setups, and other industrial IoT gear PlugX PlugX Remote Access Trojan PowerSchool PowerShell Predator Predator Spyware Project 2016 Project 2019 PromptFlux PROMPTFLUX PromptSteal PROMPTSTEAL Prosper Databases PyPI Python Python 3.8 Python Wheel files Python's zipfile implementation Qakbot Qantas Frequent Flyer Details Qilin Ransomware (encryptor_1.exe and encryptor_2.exe) QNAP TS-453E NAS device QTS QuasarRAT QUIETVAULT QuMagie QuTS hero Rclone React Native Aria and GlueStack RealTimeTroy Redis Redline RedLine Stealer REMCOS RAT Remote Access Services Remote Access Software Remote Access Trojans (RATs) Remote Desktop Programs Remote Desktop Protocol (RDP) Remote Monitoring Devices Rhadamanthys Rhadamanthys infostealer Rhadamanthys Stealer Rhysida ransomware ripgrep RisePro Stealer RMM tools Robinhood Roblox RooTroy Roundcube Roundcube webmail Routers and other network devices Routers, VPNs, and Firewalls runC Rust async-tar (and forks e.g. tokio-tar) Salesforce Salesforce PersonAccount exports Salesloft Drift Salesloft Drift (Salesforce plugin) Samsung Android image processing library (libimagecodec.quram.so) Samsung Galaxy Devices Samsung Galaxy Devices (Android versions 13, 14, 15, and 16) Samsung Galaxy Phones Samsung Galaxy S25 Samsung S22, S23, S24 and Fold/Flip Devices ScoringMathTea ScreenConnect Server Message Block (SMB) SharePoint Sharp7Extend Shipped Software Signal SimonMed Imaging Systems Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) Skype for Business 2016 Skype for Business 2019 Slack Slider Revolution Smaller AI Models (<= 13 billion parameters) SMB Service SmokeLoader Snapchat SNMP (Simple Network Management Protocol) SocGholish Social Media and Communications Platforms SoftEther VPN SoftEther VPN Bridge Solana Solar Monitoring System (Lithuania's Ignitis Group) SolarWinds Orion SolarWinds Serv-U FTP SonicWall cloud backup service SonicWall firewall SonicWall firewalls SonicWall MySonicWall cloud backup feature Sonne Finance Sotheby's Website South Korean software products Spring Cloud Gateway SpyEye SQL Server SqlDbRepository SqlLiteRepository SqlRepository SqlUnicorn.Core SqlUnicornCore SqlUnicornCoreTest stalkerware-type apps Starlink Terminals Stealc SvcStealer Synology ActiveProtect Appliance DP320 NAS drive Synology CC400W camera Synology DiskStation DS925+ NAS SystemBC T-Mobile TBK DVR tcrond Teams TeamViewer Telecommunications edge devices and critical infrastructure Telegram TelMex Telnet Termux THC Hydra ThinkPHP Third-party clients/mods of messaging apps TightVNC Viewer TikTok TinyLoader tokio-tar Toys “R” Us customer database TP-Link Festa VPN routers TP-Link Omada ER605v2 router TP-Link Omada routers TP-Link Routers TradingView Trickbot TrickBot Trojanized PDF reader trojanized PDF readers Truffle Security Co. TruffleHog TruffleHog U.S. Military sea vessels UN aviation agency recruitment database Unitree G1 Humanoid Robot Unknown Malware Unpatched Software Vulnerabilities V8 JavaScript Engine Veeam Velociraptor 0.73.4.0 Venmo Vidar Virtualization Infrastructure Visio 2016 Visio 2019 visionOS Vivaldi VMWare ESXi VoIP (Voice over Internet Protocol) VPN VS Code extension VS Code Extensions VSCode Extensions vShell Warehouse Management Systems watchOS Web Applications Web Assets Web browsers Web Browsers (general) webctrl.cgi WebKit WhatsApp WhatsApp for iOS and Mac WhatsApp Plus WhatsApp Web Whisper 2FA WiBo win32kbase_rs.sys Windows Windows 10 Windows 7 Windows Active Directory Windows Agere Modem Driver Windows Defender Windows File Explorer Windows LLMNR and NBT-NS Windows LNK files Windows Remote Access Connection Manager Windows Remote Management Windows Remote Management (WinRM) Windows Server (2012 through 2025) Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019 Windows Server 2022 Windows Server 2025 Windows Server Update Service (WSUS) Windows Server Update Services (WSUS) Windows Server, version 23H2 Windows SMB Client Windows XP WinRAR WordPress WordPress Core WordPress plugins WordPress Plugins WSUS X Xiaomi Smartphones XLoader XWiki XWiki SolrSearch XZ archiving utility yasuyuky.transient-emacs YESROBOT YouTube app zero-day vulnerabilities Zeus Zoom ZoomClutch/TeamsClutch ZTE
Involved Countries All Afghanistan Africa Albania Algeria Argentina Arizona Australia Austria Baltic States Belarus Belgium Brazil Britain British Virgin Islands Bulgaria California Cambodia Canada China Colombia Commonwealth of Independent States (CIS) Cyprus Czech Republic Czechia Democratic People's Republic of Korea (DPRK) Democratic Republic of the Congo developing countries DPRK Ecuador Estonia EU Europe European Economic Area European Union Finland France Georgia Germany Greece Guatemala Honduras Hong Kong Hungary India Iran Iraq Ireland Israel Italy Japan Kazakhstan Laos Latvia Lithuania Luxembourg Malaysia Mauritius Mexico Middle East Moldova Mongolia Morocco Myanmar Nepal Netherlands New Zealand Nigeria North America North Korea Northern Ireland Norway Pakistan Panama Pennsylvania People's Republic of China (PRC) Peru Philippines Poland Portugal Qatar Romania Russia Russian Federation Serbia Singapore Slovakia South Africa South Korea Spain Sri Lanka Sweden Switzerland Taiwan Texas Thailand Turkey U.S. UAE UK Ukraine United Arab Emirates United Kingdom United States United States of America US USA Uzbekistan Vietnam
Affected Industries All Academia Accounting Adult Entertainment Advanced Manufacturing Advertising Aerospace Aerospace/Drone Manufacturing Agriculture AI Development Air Transport Aircraft Component Manufacturing Airline Airlines Application Security Art Auction Artificial intelligence Artificial Intelligence Asset Management Auction Houses Automated Machinery and Robotics Automotive Automotive Manufacturing Aviation Banking Blockchain Blockchain Services Blockchain/Cryptocurrency Brewing Business Business Process Outsourcing (BPO) Cloud Computing Cloud Security Cloud Storage Coffee Production/Restaurant Commerce Commercial Commercial Security Communications Communications Technology Community Sites Computer Hardware Computing Confidential Computing Construction Construction Technology Consulting Consumer Electronics Consumer Electronics (Samsung) Corporate Critical Infrastructure Crypto Industry Cryptocurrency Cryptocurrency Exchanges Cryptography cybersecurity Cybersecurity Data Brokerage Database Management Debt Solutions defense Defense Defense Contracting Defense Manufacturing DeFi Digital Advertising Diplomatic Diplomatic Services e-commerce E-commerce education Education Educational Institutions Elections Electronic Document Security Management Electronics Manufacturing Email Marketing Emergency Response energy Energy Energy Generation Energy Saving Grants Engineering Enterprise Networking and Security Entertainment File Hosting Services finance Finance Financial Financial Industry Financial Institutions Financial Sector Financial Services Financial Services (Credit Monitoring) Financial Technology (Fintech) financial_sector Food and Beverage Formula One Racing Gambling Gambling/Casino Gambling/Lottery Gaming Genetic Testing Geospatial Mapping Government Government Agencies Government Buildings government sector Government Services Government/Military Government/Public Sector Governmental Grain Hardware Manufacturing Health care healthcare Healthcare Highly Regulated Sectors Hospitality Hospitals Hosting Hosting Providers Human Resources Humanitarian Aid Immigration Services Industrial Industrial Automation Industrial Control Systems Industrial Manufacturing Information Technology Information Technology (IT) Infrastructure Insurance Intelligence Intelligence and Investigative Services Internet of Things (IoT) Internet Service Providers (ISPs) IT IT (Information Technology) IT and Cyber Software IT Companies IT Providers IT Services Job Recruitment/Employment Judicial Labor Unions Law Enforcement Legal Legislative Branch Local Governments Logistics Luxury Goods Managed Service Providers (MSPs) Management Consultancies Manufacturing Maritime Transport Marketing Media Media and entertainment Media and Journalism Medical Medical Device Manufacturing Messaging Apps Metal Engineering Military Mobile App Development Mobile Communications Mobile Device Manufacturing Mobile Security Multi-Party Data Collaboration Municipal Water National Government Network Security Networking NFT (Non-Fungible Token) Market NGO Non-Governmental Organizations (NGOs) Nonprofits Oil and Gas Online Gambling Outsourcing Password Management Software Payments Pensions Perimeter Security Pharmaceutical Pharmaceuticals Postal Service Power Grid Private AI Inference Private Blockchains Processor Manufacturing Professional and Scientific Services Professional Services Public Administration Public Sector Publishing Real Estate Recruiting Research Research and Academia Research Institutions Retail Retail and wholesale trade Robotics Security Security Research Security Software Security Vendors Semiconductor Semiconductor Production Semiconductors Shipping Shipping and Logistics Smart TV and Streaming Devices Social Media Software Software Development Software Development (DevSecOps) Software Development (Video Conferencing) Software Engineering Software/Application Development Solar Power Streaming services Streaming Services Supply Chain Support Services & Construction Tech Technology Technology (Networking Equipment) Technology providers Telecommunications Toll Road Services Trading Transportation Transportation and Logistics Travel Utilities Video Hosting Virtual Desktop Infrastructure Water Web Applications Web Hosting Web Hosting Services Web Services Web-hosting Webmail Services Wholesale Trade