Published Date All 2025-10-31 2025-10-30 2025-10-29 2025-10-28 2025-10-27 2025-10-26 2025-10-25 2025-10-24 2025-10-23 2025-10-22 2025-10-21 2025-10-20 2025-10-19 2025-10-18 2025-10-17 2025-10-16 2025-10-15 2025-10-14 2025-10-13 2025-10-12 2025-10-11 2025-10-10 2025-10-09 2025-10-08 2025-10-07 2025-10-06
Tags All .NET .NET Framework /dev/shm 1Password 23andMe 2FA 4chan Aardvark Access Control Access Management Account Compromise Account Protection Account Recovery Account Security Account Takeover Accountability Accuracy Acoustic Attack Acoustic Eavesdropping Acquisition Action-based Permissions Active Authentication (AA) Active Directory AdaptixC2 Adminer Adobe Experience Manager Adversarial AI Adversary Emulation Adversary-in-the-Middle (AITM) AES Encryption Afghanistan Age Verification Agentic AI Agentic AI Browsers Agentic Commerce AI AI Agents AI Browsers AI Chatbots AI Coding AI Companions AI Companionship AI Compliance AI Ethics AI Governance AI Hallucinations AI in Cybersecurity AI Infrastructure Debt AI Poisoning AI Powered Security AI Regulation AI Scams AI Secrets AI Security AI Sidebar Spoofing AI Tooling AI Training AI-enabled Attacks AI-Generated Code AI-powered Attacks Airdrop Scam AiTM AJAX Akira Akira Ransomware Amazon AMD SEV AMOS (Atomic macOS Stealer) AMSI Bypass Android Android Intents Android Malware Android Spyware ANPR Anthropic Anti-Analysis Techniques Anti-Sandbox AntSword API API Security App Store Security Apple Apple Security Apple Security Bounty APT Arbitrary Code Execution Arbitrary File Read Arbitrary File Upload ArcaneDoor ArcGIS Argument Injection ARM64 ARP Spoofing Arrest artificial intelligence Artificial Intelligence Artificial Intelligence (AI) ASLR bypass ASLR Bypass ASN.1 ASP.NET Core Asset Discovery async-tar Atlas Browser ATT&CK Attack Surface Management Attack Surface Reduction AuditBoard Auditing Aura Stealer Aurora Stealer AuroStealer Australia Australian Signals Directorate Australian Signals Directorate (ASD) authentication Authentication Authentication Apps Authentication Bypass Automate Automated Threats Automation Automotive Cybersecurity Autonomy Autotalks Awareness Training AWS AWS Outage Azure Front Door Babuk Backdoor Backup as a Service (BaaS) BadCandy Banking Trojan Base64 Basic Access Control (BAC) BAT Scripts BeaverTail Benchmarking Beta Testing BIETA Big Sleep BIG-IP Biometrics Blink Rendering Engine Blockchain Blockchain Security Blockchain Spam Blue Angel Software Suite Blue Screen of Death (BSOD) BlueNoroff Bluetooth BNB Smart Chain Bootkit Border Security Bot Detection Bot Management Botnet Botnets BPO Brand Protection Brazil breach Breach and Attack Simulation (BAS) Breach Notification BreachForums Broadcom BRONZE BUTLER Browser Notifications Browser Security Brute Force Attack Brute-Force Attack BT Group Budget Constraints Budget Cuts Buffer Overflow Bug Bug Bounty Bug Bounty Program Bug Bounty Programs Business Alignment Business Email Compromise (BEC) Bypass Techniques C/C++ C2 Canada candidate vetting Canva CASB CBDC CDM CDN Certificate Revocation Chakra Chakra JavaScript Engine Chat Control ChatGPT Check Point Child Sexual Abuse Material (CSAM) Children's Privacy China China Militia China-based Adversary China-linked Chinese APT Chrome Chrome Extensions Chromium CI/CD Security Cifas CIII CISA CISA KEV Cisco Cisco IOS XE Cisco Talos Citrix NetScaler Gateway Cl0p CL0P Classified Information ClayRat CLEARSHORT Clearview AI ClickFix Client-Side Git Hooks Clipboard Exfiltration Clop Ransomware Cloud Backup Cloud Backup Service Cloud Misconfiguration cloud security Cloud Security Cloud Storage CloudFlare Cloudflare Pages CMC NDMD CMS Vulnerabilities Cobalt Strike Code Execution Code Obfuscation Code Review coinminer Coldriver COLDRIVER Command and Control Command and Control (C2) command injection Command Injection Commercial Spyware Community Compatibility Holds Compliance Compliance Standards Conduent Confidential Computing Configuration Backup ConnectWise Constella Intelligence Content Moderation Conti Continuous Threat Exposure Management (CTEM) Cookie Replay Attack Copilot COPPA CountLoader Coyote Cracked Software Credential Abuse Credential Dumping Credential Exploitation Credential Harvesting Credential Reset Credential Stealing Credential Stuffing Credential Theft Credentials Leak Credit Monitoring Crime-as-a-Service Criminal Complaint Critical Infrastructure CRLF Injection Cron Jobs Crowdsourcing CrowdStrike CryptoChameleon Cryptocurrency Cryptocurrency Scam Cryptocurrency Theft Cryptographic Combiners Cryptographic Signatures Cryptography Cryptojacking cryptsetup CSAM CSPM CSS Abuse CTEM CTO Customer Data CVE CVE-2017-3881 CVE-2021-26829 CVE-2023-20198 CVE-2023-40129 CVE-2024-1086 CVE-2025-0785 CVE-2025-10035 CVE-2025-11371 CVE-2025-11492 CVE-2025-11493 CVE-2025-12036 CVE-2025-12428 CVE-2025-20352 CVE-2025-24893 CVE-2025-2611 CVE-2025-30406 CVE-2025-34033 CVE-2025-37947 CVE-2025-48561 CVE-2025-53770 CVE-2025-53771 CVE-2025-53967 CVE-2025-54236 CVE-2025-54253 CVE-2025-54399 CVE-2025-54400 CVE-2025-54401 CVE-2025-54402 CVE-2025-54957 CVE-2025-55315 CVE-2025-57819 CVE-2025-59287 CVE-2025-59489 CVE-2025-61882 CVE-2025-61884 CVE-2025-61932 CVE-2025-6264 CVE-2025-62725 CVE-2025-6325 CVE-2025-6327 CVE-2025-7850 CVE-2025-7851 CVE-2025-9217 CVE-2025-9491 CVSS CVSS Score CWE-121 CWE-134 CWE-775 CWE-787 CWE-789 CWE-829 Cyber Attack Cyber Espionage Cyber Essentials Cyber Incident Cyber Influence Campaigns Cyber Militia Cyber Reasoning System cyber resilience Cyber Resilience Cyber Risk Management Cyber Threat Intelligence (CTI) Cyber Warfare Cyber Weapons Cyber Workforce Cyber Workforce Gap Cyber-attack Cyber-attacks Cyberattack Cyberattacks CyberCorps Cybercrime Cybercrime Convention Cybercrime Treaty Cybercrime-as-a-Service Cyberespionage cybersecurity Cybersecurity Cybersecurity AI Cybersecurity Awareness Cybersecurity Awareness Month Cybersecurity Awareness Training Cybersecurity Conference Cybersecurity Culture Cybersecurity Frameworks Cybersecurity Incident Cybersecurity Information Sharing Act (CISA) Cybersecurity Jobs Cybersecurity Legislation Cybersecurity Partnership Cybersecurity Podcast Cybersecurity Policy Cybersecurity Regulations Cybersecurity Training Cybersecurity Workforce Cyberstalking Dark Covenant Dark Web Dark Web Monitoring Darktrace Dashlane Data Backup data breach Data Breach Data Breach Observatory Data Brokers data collection Data Collection Data Consolidation Data Deduplication Data Discovery Data Distribution Data Exfiltration Data Extortion Data Interception Data Leak Data Leak Site (DLS) Data Leakage Data Loss Prevention (DLP) Data Manipulation Data Poisoning data privacy Data Privacy Data Protection Data Protection Authority Data Protection Authority (DPA) Data Retention Data Scraping Data Security Data Sovereignty Data Tampering Data Theft Data Utility DDoS DDoS Attacks DDoS Mitigation DDR4 Debt Solutions Decentralization Decentralized Finance (DeFi) Deepfake Deepfakes DeepSeek Default Credentials Defense Defense Evasion Defense Industry Dell BSAFE Crypto-C Denial of Service Denial-of-Service Dependency Management Deprecated Detection Engineering DevOps DFIR DHS Differential Privacy Diffing Digital Advertising digital footprint Digital Footprint Digital Forensics Digital ID Digital Identity Digital Payments digital risk assessment Digital Risk Management Digital Signatures Digital Surveillance Digital Transformation Diplomacy Diplomats Disaster Recovery as a Service (DRaaS) Disclosure Discord Disinformation Disk Encryption DLL Injection DLL Side-Loading DLL Sideloading DNS DNS Failure DNS Spoofing Docker Compose Docker Desktop Dolby UDC Domain Migration Domain Registration Downloader DPRK Driver Updates Drone Drones DShield Duo Desktop Dynamic Analysis Dynamic Binary Instrumentation (DBI) DynamoDB DynamoRIO Eavesdropping eBPF ECDSA Economic Downturn Economic Security Edge Browser EFF Elderly Users election security Election Security Electronic Passport Elevation of Privilege ELF Email Hacking Email Security Emergency Directive Emergency Patch EMF Employee Data eMRTD EMV encryption Encryption End of Life End of Support End-of-Life Software End-to-End Encryption End-to-End Encryption (E2EE) Endpoint Detection and Response (EDR) Endpoint Management Endpoint Protection Platform Enhanced Safe Browsing Entra ID ESAFENET CDG Espionage Ethereum EtherHiding ETW Unhooking European Union Europol Evasion Techniques Evil Corp Exception Handling Exchange Server Exfiltration Experian exploit Exploit Exploit Chain Exploit Chains Exploit Mitigation Exploitation Export Controls Exposure Management Extended Access Control (EAC) Extended Security Updates (ESU) Extension Vulnerability Extensions Extortion Extortion Campaign Extortion-as-a-Service (EaaS) EY F5 F5 BIG-IP Facade Pattern Facebook Messenger Facial Recognition Fade In FakeUpdates False Positive Famous Chollima FBI FCC Federal Government Federal Hiring Freeze Figma File Descriptor Exhaustion File Explorer File Overwriting File Parsing File Sharing Fileless Malware FIN11 Financial Account Information Financial Crime Financial Data Financial Fraud Financial Impact Financial Malware Financial Motivation Financial Sanctions Financial Services Find My Fines Fines and Penalties Firefox Firewall Firewall Configuration Firmware Firmware Extraction Firmware Patch Firmware Updates First Amendment Five-Year Plan (FYP) Flax Typhoon Fluoride FOIA Forensics Format String Vulnerability Fortnite FPGA Framework France fraud Fraud Fraud Detection Fraud Prevention Freemium FreePBX fsmonitor futures report Fuzzing Game Hacks Gaming Gaming Community Gatekeeper GDPR Generative AI Geo-Blocking Geopolitics Germany Ghost Network Ghost RAT GhostCall GhostHire Gift Cards Git Github GitHub GitHub Actions Gladinet CentreStack Gmail GoAnywhere MFT Gokcpdoor Golang GOLDVEIN.JAVA google Google Google Ads Google Chrome Google SecOps GOV.UK One Login governance Governance Government Government Digital Service (GDS) Government Policy Government Shutdown Government Surveillance GPT-5 Graphics Device Interface Group Policy GTFOBins Guardrails Gun Detection System Hacktivism Hacktivist Hardware Attacks Hardware Hacking Hardware Root of Trust Hardware Security hardware_hacking Have I Been Pwned HaveIBeenPwned Havoc Headless CMS Healthcare Healthcare Cybersecurity Healthcare Privacy Healthcare Sector Heap Corruption Heap Mitigations Heap Overflow Heap Shaping Hidden Links Hidden Text Salting HiddenLayer HIPAA Hiron HMI Honeypot Honeypots Host Card Emulation (HCE) HTTP HTTP Headers HTTP Request HTTP Request Smuggling HTTP/2 HTTPS Huddle01 Human Rights Human Trafficking Human-Machine Interface (HMI) Huntress HVNC Hybrid Identity Hybrid Key Exchange HyperGuard Hypervisor IAM ICO ICO Fine ICS Security ICS/OT Security ICS/SCADA ICTBroadcast Identity and Access Management identity attacks Identity Governance and Administration (IGA) identity management Identity Management identity theft Identity Theft identity verification IIS IMEI Blacklist IMEI Blocking Immutability Immutable Storage Impersonation Incident Response Incogni IND-CCA Indicators of Compromise Indie Games Industrial Control Systems Industrial Control Systems (ICS) Inertial Sensors Infineon Inflation Refund Information Commissioner's Office Information Commissioner's Office (ICO) Information Disclosure Information Operations Information Sharing Information Stealer Information Stealing Infostealer Infrastructure as Code (IaC) initial access Initial Access Broker initial-access insider threat Insider Threat Instagram Security Integer Overflow Integer Overflow/Underflow Intel SGX Intent-based Permissions International Cooperation Internet Explorer Mode Intrusion Detection System (IDS) Intrusion Prevention System (IPS) Inverters Investment Scam Invisible Characters INVISIBLEFERRET IOC IOCs IOGPUFamily iOS IoT Devices IoT Security IoT_security ip-intel Iran Iranian Hackers JADESNOW Jaguar Land Rover (JLR) Jailbreaking Japan Java JavaScript JavaScript Injection Jemalloc Jen Easterly Jenkins Jewelbug Job Displacement Job Posting Scam Just Works Kafka Broker Kaspersky KB5065789 KB5066835 Keitaro TDS Kernel Kernel exploitation Kernel-Mode Driver Kestrel Kestrel Web Server kev KEV Key Encapsulation Mechanism (KEM) Key Vaults Keylogging Known Issue Rollback (KIR) ksmbd Kubernetes Security L3Harris LANSCOPE Lapsus$ LAPSUS$ Large Language Models Large Language Models (LLMs) Laser Attack LastPass Lateral Movement Law Enforcement Law Enforcement Action Lawful Access Lawsuit Lazarus Group LD_PRELOAD Least Privilege Legacy Systems Legal Ruling Legislation Liability Protection linux Linux Linux Kernel Living off the Land LLM LLM Grooming LLM Privacy LLM Security LLMNR LM Studio LNK Files Local File Inclusion (LFI) Local Privilege Escalation localhost Localhost LockBit LockBit 5.0 Lockdown Mode Log Poisoning LUKS2 Lumma Stealer macOS mactime Magento Malvertising malware Malware Malware Analysis Malware Development Malware Distribution Malware Vaccines Malware-as-a-Service Malwarebytes Malwarebytes Scam Guard manage user access Managed Detection and Response (MDR) Managed Security Service Provider (MSSP) Managed Service Provider (MSP) Managed Service Providers (MSPs) Mandiant manufacturing Manufacturing Disruption Mark of the Web Mark of the Web (MotW) mat2 Matrix (protocol) Max Schrems MAYBEROBOT MDR Medical Devices Medusa Ransomware Meduza Infostealer Meduza Stealer Memory corruption Memory Corruption memory forensics Memory Integrity Enforcement Memory Leak MENA Mental Health Mercenary Spyware Mermaid Diagrams Messaging Apps Messaging Platforms Meta Metadata Manipulation Metadata Removal Tool MFA MFA Abuse MFA Bypass Mic-E-Mouse Microsoft Microsoft 365 Microsoft 365 Copilot Microsoft 365 Education Microsoft Defender Microsoft Defender for Endpoint Microsoft Digital Defense Report Microsoft Edge Microsoft Exchange Microsoft Exchange Server Microsoft Patch Tuesday Microsoft Teams Military Militia Training MIME Encoding Mimikatz Ministry of Defence (MoD) Ministry of State Security (MSS) Minor Suspects Misconfiguration Misinformation Mitigation Mitigation Strategies MITRE ATT&CK Mobile Security ModbusTCP Model Context Protocol (MCP) Model Theft MOIS Monero Money Laundering Mongolia Monitoring MonsterV2 Motex MOVEit Mozilla MuddyWater Multi-Factor Authentication Multi-Factor Authentication (MFA) Multi-Factor Authentication (MFA) Bypass Multi-Stage Fileless Malware Mustang Panda MXDR Myanmar N-day Exploits Nagios Nation-State Actor nation-state actors Nation-State Actors Nation-State Attack Nation-State Attacker Nation-State Attackers National Cyber Director National Cyber Director (NCD) National Science Foundation National Security National Security Threat NATO NBT-NS NCSC Netherlands Network Security Network Segmentation Networking New York Newport Wafer Fab Nexperia Nezha NFC Relay Malware NHS NICE Framework NIST AI Risk Management Framework (AI RMF) NIST Guidelines Node.js Nokia Beacon 1 NordVPN NOROBOT North Korea North Korean Hackers Notification noyb Noyb npm NPM Packages NSA NSF Grant NSFW Content NTLM Hash NTLM Hashes NTP Nuclei Null Cipher Nvidia OAuth OAuth Attack OAuth Token Theft obfuscation Obfuscation Observability OCI Artifacts Odyssey Stealer Ofcom Office 2016 Office 2019 Office 2024 Office LTSC 2024 Office of Personnel Management Omada Omnibox Online Safety Online Safety Act Open Source Open Source Security Open Source Software Open-source Open-Source Intelligence (OSINT) Open-Source Security Tools Open-Source Software OpenAI OpenAI Atlas OpenInfra Foundation OpenPLC OpenStack Operation Cronos Operation DreamJob Operation Endgame Operation Zero Operational Disruption Operational Technology (OT) Security Opt-Out Oracle E-Business Suite Oracle E-Business Suite (EBS) OS Command Injection OT (Operational Technology) OT Security OT/ICS OtterCookie Out-of-Band Update Out-of-bounds Read Out-of-bounds write Out-of-bounds Write Out-of-Bounds Write Outage Outlook Outsourcing OWASP Top 10 PACE Package Manager Paging Parrot TDS PassGAN Passive Authentication (PA) Passkeys Password Complexity Password Cracking Password Length Password Management Password Manager Password Managers Password Policy Password Reset Password Reuse Password Security Password Vault Passwordless Passwordless Authentication passwords Passwords Patch Patch Management Patch Release Patch Tuesday Patching Patchstack Path Traversal Payload Delivery Payment Payment Fraud Payroll Fraud Payroll Pirate PCI penetration testing Penetration Testing People's Postcode Lottery (PPL) Peripheral Security Permissions Perplexity AI Persistence Personal Data Personal Information Personalization Personally Identifiable Information Personally Identifiable Information (PII) PhantomRaven phishing Phishing Phishing Campaign Phishing-as-a-Service (PhaaS) Phone Theft Photoshop Physical Attacks PII ping Pixel Manipulation Planet WGR-500 PLC Plugin Vulnerability PlugX PlugX RAT Pointer Authentication Code (PAC) Pointwise Maximal Leakage (PML) Poland Polymorphic pool.ntp.org Post-Quantum Cryptography Powershell PowerShell Prime Video Privacy Privacy Concerns Privacy Engineering Privacy Erosion Privacy Risks privacy settings Privacy Settings Privilege Escalation Privileged Access Management Privileged Access Management (PAM) Pro-Russia Information Operations Proactive Security Process Hollowing Procurement Prompt Injection Proof of Concept Proof-of-Concept Prosper Proton PsExec PureRAT Pwn2Own PyInstaller Python Qakbot Qilin Qilin Ransomware QNAP Qualcomm Qualys Quantum Computing Quantum Readiness Quantum-Safe Cryptography Race Condition Ransom RansomHub ransomware Ransomware Ransomware Affiliate Ransomware Protection Ransomware Recovery Ransomware-as-a-Service (RaaS) RAR Archives Rare Earth Metals RAT Ravin Academy Real-time Intelligence Recorded Future Recruitment Red Teaming Redirection RedTail RedTiger Regulation Regulations Regulatory Compliance Remediation Remote Access Trojan Remote Access Trojan (RAT) Remote Attestation remote code execution Remote Code Execution Remote Code Execution (RCE) Remote Dynamic Dependencies (RDD) Remote Exploitation Remote Hacking Reputation Management Reputation Systems Request Smuggling Resilience Responder Responsible Disclosure Responsible Disclosure Failure Return-Oriented Programming (ROP) reverse engineering Reverse Engineering Reverse Shell Rewards Rhadamanthys Rhysida risk risk management Risk Management Risk Prioritization Risk Quantification RMM Robinhood Robocalls Robotics ROI Roku RondoDox Root Access Rootkit Router Hacking Russia Russian Broker Russian Drones Russian State Media rust Rust SafePay Safety Check Salaries Salesforce Salesloft Salt Typhoon SAMR Samsung Galaxy S25 Sanctions Sandboxing SAST (Static Application Security Testing) Satellite Communication Satellite Communications Satellite Security SB 2420 SCADA Scam Scam Centers Scam Guard scams Scams Scanning Scattered Lapsus$ Hunters Scattered Spider Scheduled Task Scholarship for Service ScoringMathTea Scudo Search Secrets Leakage Secure Boot Secure by Design Security Security Awareness Training Security Baselines Security Best Practices Security Bypass Security Gaps Security Headers Security Isolation Security Keys Security Tools Security Update Security Updates Security Validation security.txt Selenium Self-Compiling Malware Self-Modifying Code Self-Service Password Reset (SSPR) Semiconductor Semiconductor Industry Sentencing SEO Poisoning Service Disruption Service Health Dashboard Session Hijacking Session Token Expiration Sextortion Shadow AI Shadow IT Shadowserver Foundation SharePoint ShinyHunters SHINYSP1D3R Side-Channel Attack Sideloading SIEM Silent Push SIM Box SIM Farms SIM Swapping Single Sign-On (SSO) Sitecore Skills Gap Slack Sleuth Kit Slider Revolution Slopsquatting Small Business Security Smart Contracts SMB SMB (Small and Medium-sized Businesses) SMBs Smishing SMS Authentication SMS Scam Snapchat SNAPPYBEE SNMP Snort Snort Rules SocGholish social engineering Social Engineering Social Media Social Media Influence Operations Social Media Monitoring Social Media Privacy Social Media Surveillance Social Security Number Social Security Numbers SOE Exploitation Soft Hyphen SoftEther VPN Software Cracks Software Development Software Update Software Updates Software Vulnerabilities Solar Power SolarWinds Solvers SonicWall Sotheby's Source Code South Korea Southeast Asia Sovereignty Space-Based Threats Spam Spam Filtering Spamware Spear Phishing Spearphishing Spoofing spotlight report Spyware SQL Injection SQL Server SquareX SquareX Labs SSH SSRF Stack Overflow Stack-based Buffer Overflow Starlink STARVESPAM State-sponsored Actors Static Analysis Stealer Steganography STIR/SHAKEN Storm-1175 Storm-2603 Student Debt Superinjunction Supply Chain Attack Supply Chain Attacks Supply Chain Disruption Supply Chain Impact Supply Chain Security Suricata Surveillance Surveillance State Synology Synthetic Identity Fraud Syscall TA569 TA585 Target Flags Tax Refund Scam Tax Scam TCP/UDP Technical Error Technology Transfer Telecommunications Telegram Telegram Bot Telegram Bot API Telnet template-injection Termux Third-Party Access Third-Party Audit Third-Party Breach Third-Party Investigation Third-Party Risk Third-Party Risk Management Third-Party Security Third-Party Security Experts Third-Party Services Third-Party Software Third-Party Support Threat Actor Threat Analysis Threat Detection Threat Hunting Threat Intelligence Threat Intelligence Sharing Threat Model Threats to Life TikTok TikTok Scam Time Synchronization TLB (Translation Lookaside Buffer) tmpfs Tokenization tokio-tar Toll Fraud ToolShell TP-Link tracking Tracking Pixel Trade Secret Theft Trade Secrets Trade Secrets Theft Trade War Traffic Distribution System Training Training Programs Transaction Relay Layer Transparency Trenchant Trend Micro Trickbot Triofox TruffleHog Trust Seal Trusted Agent Protocol Trusted Execution Environment (TEE) TTPs Tunneling Two-Factor Authentication Two-Factor Authentication (2FA) Two-Factor Authentication Bypass TwoNet Typosquatting UAC Bypass UART Ubuntu 22.04 UEFI UK UK Cybersecurity UK Government UK Government Intervention UK Home Office Ukraine Ukraine War unauthenticated Unauthenticated Vulnerability Unauthorized Access UNC5142 UNC5291 UNC5342 UNC6229 UNC6384 Underground Forums Unified Exposure Management Platforms (UEMPs) Union United Nations Unity Engine Unpatched Vulnerability Unprotected Server Upgrade to Windows 11 URL Spoofing US-EAST-1 USB Use-After-Free User Privacy V2X Communications Vanilla Tempest Veeam Velociraptor Vendor Patch Veterans Vibration Analysis Vidar Virtual Kidnapping Virtual Memory VirusTotal Visa VMware Voice Cloning Volume Shadow Copy Service (VSS) Volumetric Attacks voter data Voter Data Voter Fraud Voter ID voter purge VPN VPN Router VPN Vulnerabilities VS Code VS Code Extension vShell VTOL VulnCheck Canaries Vulnerabilities vulnerability Vulnerability Vulnerability Analysis Vulnerability Assessment Vulnerability Disclosure Vulnerability Exploitation Vulnerability Management Vulnerability Patch Vulnerability Replication Vulnerability Report Vulnerability Research Vulnerability Reward Program Vulnerability Scanning Vulnerability Validation WAAP WAF (Web Application Firewall) Wallet Security Warlock Water Treatment Watering Hole Attack Web Application Firewall (WAF) Web Application Security Web Hosting Security Web Shell Web.config webctrl.cgi Webhook.site WebKit WebRTC Webshell Website Security WhatsApp Whisper 2FA Wi-Fi Mapping WinDbg Windows Windows 10 Windows 10 End-of-Life Windows 11 Windows Internals Windows Kernel Windows Recovery Environment (WinRE) Windows Security Windows Server Windows Update Wingtech Technology Wire Wordfence WordPress WordPress Plugin Vulnerability WordPress Security Workday Worm WSUS X (formerly Twitter) XDR XML Parser XSLT XSS XWiki Yandex Cloud YARA Rule YESROBOT YouTube YubiKey ZachXBT ZDI-CAN-25373 Zendesk zero trust Zero Trust Zero Trust Architecture Zero-Click Exploit Zero-Click Vulnerability Zero-Day Zero-day Exploit Zero-Day Exploit Zero-day Exploits Zero-Day Exploits Zero-Day Vulnerabilities Zero-day Vulnerability Zero-Day Vulnerability Zero-Knowledge Proofs Zip File Vulnerability Zip64
Categories All Access Control Account Security Advanced Persistent Threat (APT) AI Governance AI in Cybersecurity AI Security Application Security Application Security (AppSec) APT APT (Advanced Persistent Threat) APT Analysis APT Groups Artificial Intelligence Artificial Intelligence (AI) and Machine Learning (ML) Security Artificial Intelligence (AI) Security Artificial Intelligence in Cybersecurity Artificial Intelligence Security Attack Campaigns Authentication Authentication and Access Control Authentication and Access Management Authentication Security Authentication Technologies Availability Backup and Recovery Banking Security Blockchain Security Bot Detection and Mitigation Botnet Analysis Breach Notification Browser Security Bug Bounty Bug Bounty Programs Business Continuity Business Impact Career and Skills Chip Industry Cloud Computing Cloud Computing Security Cloud Security Command and Control (C2) Compliance and Regulation Container Security Content Moderation Credential Theft Critical Infrastructure Security Cryptography Cyber Attack Reports Cyber Espionage Cyber Insurance Cyber Law and Regulation Cyber Policy Cyber Resilience Cyber Threat Intelligence Cyber Warfare Cyber-Physical Systems Security Cyberattack Cybercrime Cybercrime Ecosystem Analysis Cybercrime Investigation Cybercrime Investigations Cybercrime Trends Cybersecurity Cybersecurity Awareness Cybersecurity Best Practices Cybersecurity Defense Cybersecurity Education Cybersecurity Frameworks Cybersecurity Guidance & Best Practices Cybersecurity Incident Response Cybersecurity Incidents Cybersecurity Law and Compliance Cybersecurity News Cybersecurity Policy Cybersecurity Policy and Compliance Cybersecurity Research and Development Cybersecurity Solutions Cybersecurity Strategy Cybersecurity Threats Cybersecurity Training Cybersecurity Workforce Development Data Backup and Recovery Data Breach Data Breach Analysis Data Breach and Identity Theft Data Breach Intelligence Data Breach Investigation Data Breach Investigation and Response Data Breach Notification Data Breach/Incident Response Data Breaches and Leaks Data Exfiltration Data Governance Data Leak Data Loss Prevention (DLP) Data Privacy Data Privacy and Compliance Data Protection Data Protection Law Data Protection Regulation Data Security Data Security and Privacy Data Security Incident Data Security Incident Management Data Sovereignty Defense Industry Cybersecurity Detection and Prevention Detection and Response Device Security Device_Modification DevSecOps Digital Currency Digital Forensics Digital Forensics and Incident Response Distributed Denial-of-Service (DDoS) Distributed Systems Dynamic Analysis E-commerce Security Economic Impact Email Threat Analysis Email-borne Threats Embedded Device Security Embedded Systems Security Encryption Endpoint Detection and Response (EDR) Endpoint Security Energy Sector Cybersecurity Exploit Exploit Analysis Exploit Development Exploit Mitigation Exploit Prevention Extended Detection and Response (XDR) Facial Recognition Technology Financial Crime Financial Regulation Fraud and Scams Fraud Detection and Prevention Fraud Prevention Geopolitics Global Cyber Attack Reports Governance, Risk, and Compliance (GRC) Government Government & Policy Government Cybersecurity Government Policy & Regulation Government Regulation Government Surveillance Government Technology Hardware Hacking Hardware Security Healthcare Cybersecurity Human Resources Security Identity and Access Management Identity and Access Management (IAM) Identity Management Incident Management Incident Response Incident Response and Management Incident Response and Recovery Industrial Control Systems (ICS) Security Industrial Control Systems Security Industrial Cybersecurity Information Warfare Infrastructure as a Service (IaaS) Infrastructure Security Insider Threat Insider Threat Detection and Prevention International Law Enforcement International Relations International Relations/Geopolitics Intrusion Detection Intrusion Detection/Prevention IoT Security Job Market Kernel Security Key Management Law Enforcement Law Enforcement Actions Legal Legal and Regulatory Legal and Regulatory Compliance Legal Issues Linux Security Malware Malware Analysis Malware Analysis and Reverse Engineering Managed Detection and Response (MDR) Managed Security Services Memory Forensics Mergers and Acquisitions (M&A) Military Modernization Military Technology Misinformation/Disinformation Mobile Device Security Mobile Malware Mobile Security Nation-State Actors Nation-State Attack Nation-State Threat Actors National Security National Security Policy Network Monitoring Network Security Network Security Monitoring Online Fraud Online Privacy Online Reputation Management Online Safety Open Source Open Source Security Operating System Security Operating Systems OT Security Password Management Security Password Security Patch Management Payment Security Penetration Testing Phishing and Social Engineering Phishing Attacks Phishing Awareness Phishing Awareness and Education Phishing Awareness and Prevention Phishing Defense Phishing Detection and Prevention Phishing Prevention Phishing Prevention and Detection Policy and Governance Policy and Regulation Post-Quantum Security Privacy Privacy Analysis Privacy and Surveillance Privacy Compliance Privacy Enhancing Technologies Privacy Incident Privacy Management Privacy Regulation Privacy Regulations Privacy Violations Ransomware Ransomware Attacks Ransomware Defense Ransomware Protection and Recovery Regulatory Compliance Regulatory Enforcement Remote Code Execution (RCE) Remote Monitoring and Management (RMM) Security Reverse Engineering Risk Management Rootkit Analysis Router Security Satellite Security Search Engine Optimization (SEO) Security Secure Communications Security Automation Security Awareness Security Awareness Training Security Best Practices Security Information and Event Management (SIEM) Security Management Security Operations Security Operations Center (SOC) Skills and Competencies Small and Medium Business (SMB) Security Social Engineering Social Engineering Attacks Software Development Software Development Security Software Lifecycle Management Software Patch/Update Software Security Software Supply Chain Security Software Testing Software Updates State-Sponsored Cybercrime Supply Chain Security System Administration Telecommunications Security Third-Party Risk Threat Actor Threat Actor Adaptations Threat Detection Threat Detection and Analysis Threat Detection and Prevention Threat Detection and Response Threat Hunting Threat Intelligence Threat Landscape Analysis Threat Mitigation Threat Modeling Threat Research UAS (Unmanned Aircraft Systems) Security Unmanned Systems Vendor Risk Management Vulnerability Analysis Vulnerability and Exploit Vulnerability and Patch Management Vulnerability and Risk Management Vulnerability Assessment Vulnerability Assessment and Management Vulnerability Detection and Prevention Vulnerability Disclosure Vulnerability Exploitation Vulnerability Exploits Vulnerability Management Vulnerability Mitigation Vulnerability Research Web Application Security Web Browser Security Web Security Zero Trust Architecture Zero Trust Security
Threat Actor All 764 Actors in possession of the CSCA private key Advanced adversaries Advanced nation-state threat actors Akira Akira Affiliate Akira ransomware group Alleged Criminal (Cryptocurrency Stockpiler) Antiy Technology Group cyber militia APT37 APT43 Automated Scanners Babuk 2.0 Bharat Singh Chand Bitter Black Basta BlueNoroff BRONZE BUTLER Chen Zhi China China-based ransomware threat actor China-based threat actor China-linked cluster China-linked hackers China-nexus APT group Chinese 'Salt Typhoon' Chinese crime groups Chinese cyber espionage group Chinese gangs Chinese megacorp Chinese security services Chinese state-backed hackers Chinese state-sponsored threat actors Chinese-speaking criminal syndicates Cl0p CL0P ClayRat Operators Clearview AI Clop Coldriver COLDRIVER Conti Conti Ransomware Group Criminal Gangs Criminal network smuggling phones criminals Crimson Collective Cryptex Cryptex Operators CryptoChameleon Cyber actor believed to be associated with the Islamic Republic of Iran Cyber criminals CyberAv3ngers Cybercrime groups Decentralized Online Crime Networks and Loosely Affiliated Individuals Doppelganger DPRK Dragon Force Ransomware Group Emotet Emotet Authors Evil Corp Fake customer support scammers Famous Chollima FIN11 Financially motivated threat cluster operating from Vietnam Flax Typhoon Foreign criminals Former Trenchant General Manager ForumTroll Fraudsters Fraudulent candidates/employees G0027:Threat Group-3390 G0034:Sandworm Team G0128:ZIRCONIUM G0129:Mustang Panda G0150:Water Galura G1015:Scattered Spider G1033:Star Blizzard G1048:UNC3886 G1049:AppleJeus G1051:Medusa Group G1052:Contagious Interview G1053:Storm-0501 Gafgyt gangs of cybercriminals GOLD LEAPFROG GXC Team Hacktivist groups Hainan State Security Department Hamas High-end cybercriminals Hiron HP Initial-access brokers Iran IronHusky Jewelbug Just Evil Kochava Konni Lapsus$ Large Criminal Syndicates Latvian nationals Lazarus Lazarus group Lazarus Group Leonidas Varagiannis Librarian Ghouls Linen Typhoon LockBit LummaC2 Malware Operator Matthew Lane Medusa Ransomware Group Meduza Developers Meduza Stealer Operators Memento Labs Mercenary Spyware Actors Mercenary spyware industry Mercenary Spyware Vendors Mirai Mozi MuddyWater Mustang Panda Mysterious Elephant Nation State Actors Nation-state Nation-state actor Nation-State Actor Nation-state actors Nation-state attacker Nation-state attackers Nation-state threat actor Nation-states NDP NFT Minting Bots North Korea North Korean cybercriminals North Korean hackers North Korean IT workers North Korean threat actor North Korean threat actors NSO Group Obscura Organized crime groups Peter Williams PhantomRaven PhantomRaven Threat Actor PLA Unit 61398 Play Portal Kombat Prasan Nepal PureCoder PXA Stealer Qakbot Operators Qilin RansomHub Ransomware Operators RedHotel Redline RedMike RedTiger Operators REvil REvil Threat Actors Romance Scammers and Sextortionists RondoDox Russia Russian broker Russian buyer Russian construction technology company Russian government supplier Russian hackers Russian state-attributed sources Russian state-sponsored threat actors linked to the Russian Federal Security Service’s (FSB) Center 16 Russian-speaking criminal groups Russian-speaking cybercriminals SafePay Safepay ransomware gang Salt Typhoon scammers Scammers Scattered Lapsus$ Hunters Scattered LAPSUS$ Hunters Scattered Spider Shanghai State Security Bureau (SSSB) Shiny Hunters Shiny Lapsus$ Hunters ShinyHunters SideWinder SIMCARTEL SIMCARTEL Network Smishing Campaign Actors Smishing Triad Sophisticated Social Engineers Spammers Spies SpyEye State-backed hackers Static Tundra Storm-1175 Storm-2603 Storm-2657 Street thieves on e-bikes TA569 TA585 Taliban Thallium The Com The thieves thieves Threat actors exploiting CVE-2025-61882 Threat Actors Exploiting NTLM Hash Leaks Threat actors involved in credential abuse Threat actors using free VPN apps Threat Actors who performed brute force attacks on SonicWall cloud backup API service Trickbot TrickBot Trickbot Group Trump administration Trump Administration TwoNet UAT4356 Unauthorized party UNC5142 UNC5291 UNC5342 UNC5936 UNC6040 UNC6240 UNC6384 UNC6512 Unemployed tech workers Unidentified Actor Exploiting CVE-2025-11371 Unidentified Actors Exploiting CVE-2025-11371 Unnamed Threat Actor Unspecified Attackers Unspecified Threat Actors Unspecified Threat Actors Exploiting NTLM Hash Leakage Vanilla Tempest Vidar Vidar Developer(s) Violet Typhoon Volt Typhoon Vulnerability researchers WannaCry WannaCry threat actor Zeus
Actor Aliases All @LoneNone Agenda Angelo APT1 APT15 APT34 APT40 attackers BAITSWITCH Barlati BARLATI Beijing Bentley Bjorka Spirit (Ransomware) Brickstorm Byex Exchange Callisto Catch and Revoke China's Salt Typhoon cyber-espionage group Chinese gangs ChuongDong CL-CRI-1040 CL-STA-0049 Cl0p CL0P CL0P^_- LEAKS ClayRat CLEARFAKE Company 3 Contagious Interview Crimefluencers CyberTroops DPRK nation state threat actor Earth Alux Earth Estries Embargo Ransomware FakeUpdates FIN11 ForumTroll Fyodor Aleksandrovich Andreev GhostEmperor Golden Fortune Resorts World Ltd Golem GoogleXcoder Hackers Hacking Team Hafnium Huione Group Inactive inactivecx Inactivee0 IntelBroker Jin Bei Group Kimsuky Klopatra Korplug Kremlin LAPSUS$ Lazarus LeetAgent Loadbaks LockBit Black Lumma Stealer MadeYouReset Manhattan-headquartered Clearview AI Medusa Medusa Ransomware Meduza Meduza virus MegaMedusa Machine Mustang Panda MysterySnail MysterySnail RAT OilRig Operation DreamJob Operation Zero payroll pirate Pegasus Phishers Pompompurin Pravda network Pravda Network President Donald Trump Prince Group Prince Holding Group Qilin Ransomware Qilin.B QUICLEAK RalfHacker Raptor Train RedTail REF7707 Salt Typhoon Sanyo Scattered Lapsus$ Hunters Scattered LAPSUS$ Hunters Seedworm Shai-Hulud Shamel ShinyHunters SHINYSP1D3R SIMPLEFIX SLSH SmokeLdr SocGholish SOGU SOGU.SEC Spamouflage Star Blizzard Stern support@pubstorm.com support@pubstorm.net TA450 TA505 TEMP.Hex The Debt Relief Team Tick TIGERPLUG ToolShell Trinity of Chaos Twill Typhoon UNC2286 UNC4057 UNC5356 UNC6229 UNC6240 Vice Society VICE SPIDER Vitali Nikolaevich Kovalev Warlock ransomware Yellow Nix
Exploit Method All 2FA Bypass 3CX Supply Chain Attack (C0057) Abuse of Cyberduck for data exfiltration Abuse of Linked Devices (T1676) Abuse of Microsoft cdb.exe Abuse of Monitoring and Data Sharing by Authoritarian Regimes Abuse of SSH Login on VMWare ESXi Abuse of Velociraptor for Persistence Access to Firewall Configuration Backup Files Accidental Data Exposure via Hidden Spreadsheet Cells Account Hijacking via Weak Password and Lack of 2FA Account Takeover AdaptixC2 Misuse Adminer SSRF Exploit Adversarial Manipulation of AI Models Adversary-in-the-Middle (AiTM) Phishing for MFA Bypass Adversary-in-the-Middle (AITM) Phishing for MFA Bypass Agent Impersonation/Privilege Escalation (Potential) Agent-Mediated Data Exposure Agentic AI Misconfiguration/Breach Leading to Lateral Movement Agere Modem Driver EoP Agere Modem Driver Exploitation AI Agent Misuse AI Forgetting Guardrails AI Misidentification Exploit AI model compromise/weaponization AI Model Poisoning via Trigger Phrase AI Sidebar Spoofing AI_Training_Data_Scraping AI-Assisted Cheating in Recruitment AI-Based Malware Obfuscation AI-Driven Attacks AI-driven scams preying on Gen Z’s digital lives AI-Generated Code Vulnerabilities AI-Generated Forgery AI-Powered Attack Simulation for Security Validation AI-Powered Geolocation from Images AI-Powered Malware and Phishing AI-powered Phishing and Social Engineering AI-Powered Phishing Kits AI-powered Voice Cloning AiTM Update Attack AMSI Patching and Event Log Clearing and Inclusion Initiatives and Misconfigured Perimeter Systems Android Infostealer via Termux Android Malware for SMS/OTP Interception ANPR Data Misuse Apex Attacker/Nation-State Actors App Sandbox Escape Application Impersonation and Social Engineering Arbitrary Command Execution via Gemini CLI Arbitrary File Read via Insufficient Validation of File Paths ArcaneDoor Campaign ArcGIS SOE Webshell Argument Injection via `git show --format --output` and `rg --pre` Argument Injection via `go test -exec` Argument Injection via Facade Pattern with `fd -x` ARP Spoofing ASLR Bypass via SDP Discovery Callback Leak ASN.1 Integer Overflow in _A_DecodeType ASN.1 Record Integer Underflow Leading to Out-of-Bounds Read ASN.1 Record Stack Overflow Audio Deepfake Attack Automated Bot Attacks on APIs and Web Applications Automated Vulnerability Scanning Automatic Download of Malware via Malicious Link Autonomous Malware AWS CloudControl API as an Attack Tool AWS Credential Exposure in NextJS SSR AWS Credential Harvesting and Privilege Escalation by Crimson Collective AWS Credential Theft AWS Service Dependency Exploit AWS X-Ray as Command & Control Channel Azure Front Door Capacity Loss Leading to Service Outage BAC Tracing via Oracle Attacks Backdoor Creation for Lawful Access BadCandy Webshell Bait-and-Switch Employment Basic Access Control (BAC) Offline Brute-Force Battering RAM BIG-IP Cookie Leakage Vulnerability BIG-IP Source Code Theft Bitstream Modification via Unauthorized Access Blockchain Spam Attacks Bluetooth Root Access via Universal Credentials Botnet Creation Brash Brickstorm Backdoor Brickstorm Malware Deployment Broad unauthorized iCloud access Broken Authorization in APIs via Autoswagger Brute Force Attack on SonicWall Cloud Backup API Brute-Force Attack on Cloud Backup Service Brute-Force Attacks via XML-RPC Brute-Force SSH Login BSOD Triggered by Incompatible Driver Budget and Personnel Cuts Impacting Cybersecurity Posture Bug Bounty Scanner Identification Business Email Compromise (BEC) Business Logic Errors Bypassing Multi-Factor Authentication (MFA) via Mobile Wallet Abuse Celebrity Baiting Chained MCP Exploits (SQL Injection, Prompt Injection, Supply Chain Attacks) Chained_Oracle_E-Business_Suite_Exploit Chaining low- and medium-impact flaws Chakra JavaScript Engine Zero-Day Exploit Chakra_and_Entry_Point_Abuse ChatGPT Authentication Piggybacking/Remote Code Execution ChatGPT for Social Media Surveillance Planning ChatGPT used for malware development ChatGPT used for phishing lure generation and target automation Chinese Cyberattacks on US Critical Infrastructure Cisco Firewall Attack Spree Citrix NetScaler Gateway Vulnerability Cl0p Ransomware Exploit of Oracle E-Business Suite Zero-day Claude File API Data Exfiltration via Indirect Prompt Injection ClayRat_SMS_Handler_Abuse ClayRat_Social_Engineering_Phishing ClickFix ClickFix Social Engineering ClickFix/Paste and Run Client-Side Scanning Vulnerabilities Clipboard Picture Exfiltration via Python Infostealer Clop-linked EBS Exploit Chain Cloud Bucket Misconfiguration Cloud Misconfiguration Leading to Data Exposure Cloudflare Pages Abuse Cobalt Strike Code Execution via Overwriting SDP Discovery Callback COLDCOPY "ClickFix" Lure with Rundll32 Collusion Command Injection Command Injection in Exiftool Command Injection via Fallback Mechanism Command Injection via WAN Interface Name Communication Interception via Lasers Communications Jamming Complex Cyber Threat Exploitation Compromised Account Phishing Compromised Administrator Credentials Compromised Backup Admin Account Compromised Credentials leading to Account Takeovers Compromised Credentials leading to Chat History Exposure Compromised Github Action Compromised npm Packages Compromised Password Exploitation Compromised Smart Alarm Systems Compromised Support Agent Account Compromised WordPress Plugin Compromised WordPress Website Compromised WordPress Websites Compromising the Hosting Provider Contagious Interview Social Engineering Campaign Content Cloaking for AI Manipulation Conti Ransomware Cookie Replay Attacks Copilot Email/File Access Crafted Packet Remote Code Execution Credential Abuse Credential and Cryptocurrency Wallet Theft Credential Dumping Credential Harvesting using TruffleHog Credential Harvesting via Phishing Credential Leaks Credential Phishing via Social Engineering (LastPass 'Death Certificate' Scam) Credential Stealing Credential Stealing via Fake Application Credential Stuffing Credential Stuffing Attack Credential Stuffing Attacks on DraftKings Credential Stuffing/Account Takeover via Leaked Credentials Credential Stuffing/Password Reuse Credential Theft via Browser Password Pilfering Credential Theft via Infostealer Logs Credential Theft via Social Engineering Credential Theft via Stealer Logs Credentialed Access & Data Exfiltration Criminalization of legitimate cybersecurity research Cross-border Data Access Cross-Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) in ChatGPT Cross-Site Scripting (XSS) Cryptocurrency Wallet Phishing via Fake Website CSS Hidden Text Salting CVE-2024-1086 Local Privilege Escalation CVE-2025-59287_EXPLOIT CVSS-based Prioritization Cyber Incident Affecting Click & Collect Cyber Militia Offensive Operations Cyber-attacks Cyber-enabled Financial Fraud Cyberattack leading to production halt Cyberstalking DanaBot Memory Leak Vulnerability Data Aggregation for Personal Profiling Data Aggregation for User Identification Data and Model Poisoning Data Breach Data Breach at Third-Party Age Verification Provider Data Breach Leading to Financial Data Exposure Data Breach Leading to Physical Harm and Threats Data Breach on Ravin Academy's Online Platform Data Breach via Third-Party Data Collection and Potential Misuse for Voter Purging Data Collection and Profiling Data Collection and Sale of Children's Data Data Collection for Advertising and Training AI Models Data Consolidation and Misuse Data Exfiltration Data Exfiltration and Potential Ransomware Data Exfiltration and Public Disclosure Data Exfiltration from BIG-IP Product Development and Engineering Knowledge Management Platform Data exfiltration from Toys R Us Canada Data exfiltration related to WhatsApp Data Exfiltration related to WhatsApp Data Exfiltration to China Data Exfiltration via Copy-Pasting and File Uploads to Generative AI Data Exfiltration via SystemBC and Rclone Data Exfiltration via Unauthorized Access Data Exposure via 'Work with Apps' Integration on macOS Data Exposure via Company Knowledge Feature Data Exposure via Personalized AI Model Data Exposure via Third-Party Integrations Data Exposure via Third-Party Service Connections Data Exposure via Unauthorized AI Tools Data Exposure Vulnerabilities Data Harvesting from Fake Casting Calls and Websites Data Harvesting Post-Credential Theft Data Leak Site Defacement Data Leak Through Age Verification Suppliers Data Leak via Publicly Indexed Chatbot Conversations Data Leak via Shared Chat Link Data Leak via Technical Error Data Leakage via AI Systems Data Poisoning Data Poisoning and Model Manipulation Data Poisoning of LLMs Data Scraping Data Scraping and Unconsented Use of Facial Recognition Data Data Scraping for Commercial Gain Data Scraping for Social Engineering and Targeted Attacks Data Scraping of Public Sources Data Staging/Exfiltration in Memory-Only Filesystems Data Theft and Extortion via CVE-2025-61882 Data Theft via Discord support vendor Data Theft via GitLab breach Data Theft via Unauthorized Access Data_Exfiltration_Using_PowerShell Database Misconfiguration Leading to Data Leakage DCSync/DCShadow DDoS Attack DDoS via IoT Botnets Deepfake Impersonation Deepfake Phishing Deepfake Scams Deepfakes and Synthetic Identity Attacks Default Credentials Default Credentials Abuse Default Credentials Exploit Default_Credential_Exploitation Defense Evasion via File Deletion Denial of Service via Malicious Metafiles Dependence on Amazon Web Services (AWS) for Signal Dependency on Hyperscale Providers Digital Wallet Theft Direct Prompt Injection in OpenAI's Atlas Browser via URL Manipulation Disabled TLS Certificate Checks in WebRTC Client Discord Game Scam - Malware Loader Disinformation Campaigns Distributed Denial-of-Service (DDoS) Attacks and Phone Calls DLL Hijacking using DroneEXEHijackingloader.dll DLL Side-Loading DLL Sideloading with SNAPPYBEE DLLInjectionInDockerDesktopInstaller DNS Hijacking DNS Rebinding DNS Tunneling via Non-Standard BASE64 Encoding DNS_Race_Condition_Leading_to_IP_Address_Deletion DockerComposePathTraversal Dolby Digital Plus Audio Decoder Integer Overflow Domain Impersonation Double Extortion Doxing and Harassment via Data Breach Information Dynamic Code Compilation Eavesdropping via Unencrypted Satellite Communication eBPF Rootkit - LinkPro ECScape Privilege Escalation via IMDS Electronic Surveillance Powers Abuse Email Account Compromise Email BCC Misconfiguration Emotet Kill Switch Bypass Employment Fraud Encrypted Command and Control (C2) End-of-Life Unpatched Systems Equity ESAFENET CDG V5 Scans EternalBlue EtherHiding ETW Unhooking Eucleak ECDSA Key Extraction via EM Side-Channel Evolving Privacy Assumptions Excessive Agency Executable Neutering Executive Impersonation Exfiltration of WhatsApp Data Exploit chaining WebKit’s WebContent code execution + sandbox escape + unsigned code execution with arbitrary entitlements Exploit chaining WebKit's WebContent code execution with a sandbox escape exploit_shotgun Exploitation of AI Infrastructure Debt via Unpatched Vulnerabilities and Weak Security Controls Exploitation of Common Vulnerabilities Exploitation of Critical Infrastructure by Cyber Militia Exploitation of exposed HMIs Exploitation of leaked Source Code and Builders Exploitation of Legacy Systems Exploitation of Legacy Vulnerabilities in Edge Devices Exploitation of Monitoring Schemes Exploitation of Stolen VPN Credentials Exploitation of Unpatched Web Assets Exploitation of Vulnerabilities for Initial Access Exploitation of Zero-Day Vulnerabilities in Network Appliances by RedMike (Salt Typhoon) Exploiting CMS Vulnerabilities Exploiting Encrypted Kubernetes Environments Exploiting Exposed S3 Bucket with Hardcoded Credentials Exploiting IoT/OT Devices Exploiting Lack of Robust Anti-Theft Measures Exploiting Unpatched Web Assets Exploiting Unpatched/End-of-Life Network Devices Exposed .env file Exposed .git folder via GitHack Exposed Remote Services Extortion via Crowdsourcing Extortion-as-a-Service (EaaS) F5 BIG-IP Source Code Theft Failure to Fix Known Vulnerabilities Fake AI Interface (Spoofed AI Sidebars) Fake Customer Support Impersonation Fake Job Offer Social Engineering Fileless Malware via Syscall Obfuscation Fileless Rootkit Installation via Guest Shell Find My Circumvention via Foil Wrapping Firewall Configuration Data Theft Firewall Configuration File Exfiltration Flawed Persistence Mechanism Forced Alteration of Ownership Structure format_string_memory_corruption Fraudulent Scheme Automation via AI Full Gatekeeper bypass with no user interaction Gafgyt Botnet Gatekeeper Bypass GATT Heap Overflow Exploit GDPR Non-Compliance Leading to Data Misuse GDPR Non-Compliance via Data Collection and Processing Geo-blocking Bypass via VPN Ghost RAT Deployment and Persistence GitHub Actions Workflow Backdoor GitLab CI/CD Pipeline Exploitation via Instance Runners Gladinet CentreStack and Triofox Exploitation Gladinet CentreStack/Triofox Exploit Gladinet CentreStack/Triofox Exploitation GOLDVEIN.JAVA Loader and GOLDTOMB Backdoor Google Ads Misuse for Malicious Redirection Governance Failures Leading to Technology Transfer GPO_Modification_for_Defense_Evasion Hardware Modification for Noise Removal Heap_Corruption_via_Missing_XML_Tag Help Desk Social Engineering Hidden Communication Modules Exploit HMI Web Interface Queries HMI_PLC_Manipulation Home Depot Halloween Phish HTTP Flood HTTP Request Smuggling HTTP Traffic Interception/Alteration HTTP.sys Connection Reset Exploit HTTP/2 Localhost Connection Failure ICS Manipulation by Hacktivists ICS/OT Asset Identification at Scale ICTBroadcast Command Injection via BROADCAST Cookie IE Mode Spoofed Website Attack IGEL OS Secure Boot Bypass Illegal Implementation of Concentration of Undertakings IMEI Blacklist Bypass Impacket smbexec-style command execution Implant Installation and Data Exfiltration Improper Input Validation on Samsung Galaxy S25 Improper Output Handling Inaccurate End-of-Life Tagging of SQL Server Inconsistent Risk Logging and Tracking Inconsistent Security Baseline Enforcement Indirect Attribute Inference Indirect Prompt Injection in Fellou Browser Indirect Prompt Injection with Mermaid Diagrams for Data Exfiltration Information Asymmetry and Poor Communication Information Disclosure via Improper Email Handling Information Operations (IO) - Disinformation/Propaganda Information Stealers Infostealer Initial Access Infostealer Malware Initial Access via Malicious File and Lateral Movement Insecure KEM Combination via Concatenation Insider Threats Insufficient Observability for Threat Hunting Internal IT Shutdown Invisible Character Phishing InvisibleFerret Malware IOGPUFamily Out-of-Bounds Write IT Security Incident Leading to Data Exposure JADESNOW Downloader Jailbreaking via Role-Playing Just Works Authentication Bypass KB5066835 USB Device Unusability in WinRE Kerberoasting Keylogging and Screenshotting via OtterCookie Klopatra Android Banking Trojan and Remote Access Tool ksmbd_local_privilege_escalation Kubernetes Container Escape Lack of comprehensive Microsoft 365 backups Lack of Consistent Governance in AI Systems Lack of Granular Privacy Settings and Default Configurations Lack of Rate Limiting LANSCOPE Endpoint Manager Zero-Day Exploitation Lapse of Information Sharing Liability Protection Laser Dazzling/Blinding of Satellites Lateral Movement Lateral Movement and Privilege Escalation LD_PRELOAD Hijacking Leaked Secrets in VSCode Extensions Legacy System Operation LFI_MachineKey_RCE LFI_WebConfig_MachineKey_RCE Linux Rootkit Deployment Linux Rootkit Deployment via Cisco IOS/IOS XE Vulnerability Living off the Land Living-off-the-Land (LOTL) Techniques LLM Grooming LLMNR/NBT-NS Poisoning LNK File Command Injection LNK File Command-Line Argument Injection Local Vulnerability Scanning LockBit 3.0 Builder Leak LockBit 5.0 Ransomware Log Disablement Log Poisoning/Injection Leading to Web Shell Deployment LUKS2 Null Cipher Exploit MadeYouReset (HTTP/2 Rapid Reset) Malformed Audio File Exploitation Malicious Android Malware via Scam Facebook Groups Malicious ArcGIS SOE Webshell Malicious Automation/Rogue Bots Exploiting Agentic Commerce Malicious Campaign using RAR archives and BAT scripts Malicious Code Blocks in Free Templates Malicious Cryptocurrency Wallet Draining Extensions Malicious Downloads Malicious Git Repository with core.fsmonitor Malicious Macro Execution Malicious MCP Server Configuration Exploits Malicious MCP Server for Data Theft Malicious or Accidental Data Deletion Malicious PDF and Social Engineering Malicious Third-Party Clients/Mods Malicious VPNs Used for Botnet Creation Malicious Workflows Maliciously Signed Fake Teams Installers Malvertising campaign delivering Oyster backdoor Malware Delivery via Password-Protected Archives Malware Development and Refinement via AI Malware Distribution via Blockchain (EtherHiding) Malware Distribution via Fake Apps Manual Processing Bypass Mass Scanning of Encrypted Communications Mass Surveillance Matrix.org Homeserver Outage MCP Server Persistence Exploit Meduza Infostealer Meduza Stealer MFA Enrollment for Persistence Mic-E-Mouse Mic-E-Mouse - Eavesdropping through Computer Mice Microsoft Zero-Day Exploits Mimikatz WDigest Registry Modification Mirai Botnet Misconfigured Security Tools Misinformation Misinformation Campaign Model Switching/Routing for Sensitive Conversations Model Theft Money Laundering Money Laundering Through Front Businesses and Online Gambling Platforms Mozi Botnet Multi-Stage Exploit Chain Nation-State Actor Exploiting F5 Vulnerability Nation-state Actor Long-Term Persistent Access Nation-State Actor Network Breach Nation-State BIG-IP Source Code and Configuration Data Exfiltration Network Intrusion Network Scanning and Lateral Movement Nezha Agent for Remote Monitoring and Task Execution Nezha Open Interface Exposure NFC Relay Attack via Malicious Android Apps Notification Overload/Abuse NPM Token Stealing via GitHub Actions Cache Poisoning NTDS.dit dump NTLM Hash Leakage via File Explorer Preview Pane NTLM Hash Theft via File Explorer Preview NTP Pool IPv6 Scanning OAuth token abuse for Salesforce data theft OAuth Token Abuse in Salesloft Drift OAuth Token Exposure in ChatGPT Atlas OAuth Token Theft via Drift/SalesLoft Breach Obscura ransomware attack disrupting Michigan City Office Document Generation Omnibox Prompt Injection One-Click Remote Code Execution Chain OpenPLC ModbusTCP Denial-of-Service Oracle E-Business Suite Data Theft via Zero-Day Exploitation Oracle E-Business Suite Exploit Chain Oracle EBS Database Payload Storage OS Command Injection via webctrl.cgi Out-of-bounds Write via Malicious .fadein File Over-Permissioned Agents Overly Broad Permissions for AI Agents Oyster Backdoor Pass-the-Hash/Ticket Reuse Passive Satellite Data Interception Passkey Phishing Passkey-related Phishing and Social Engineering Passport Cloning via Passive Authentication Bypass Password Attacks/Credential Stuffing Password Extraction Through Human Intuition Password Guessing Password Reset Vulnerability Password Reuse on Vulnerable Platforms Password Spraying and Brute-Force Attacks Password Theft Path Traversal via Malicious OCI Artifacts Payroll Diversion via Phishing and Credential Theft Payroll Redirection via Account Takeover Pegasus Spyware Exploit via WhatsApp Flaw Persistence Mechanisms Persistence via Scheduled Task (NOROBOT) Persistent Data Allocation via CONFIG REJ and Congestion Phishing Phishing and Malicious Email Phishing and Social Engineering Phishing Attack Against Password Manager Users Phishing attack with weaponized Word document Phishing Attacks Targeting Firefox Add-ons Phishing attacks to harvest credentials and bypass MFA Phishing Campaign Phishing Campaigns Phishing Email Obfuscation Phishing Enablement Phishing for Credentials Phishing Kit Usage Phishing scams exploiting New York’s inflation refund program Phishing via Fake LastPass Inheritance Process Phishing/Smishing Campaign Phishing/Smishing/Vishing Phone Theft for Resale Physical Attacks Piggybacking on Scanning System Pixel-stealing “Pixnapping” attack targets Android devices Pixnapping Pixnapping - Stealing Data from Android Apps via Side Channel Planet WGR-500 Format String via HTTP Request Planet WGR-500 OS Command Injection via HTTP Request Planet WGR-500 OS Command Injection via Network Request Planet WGR-500 Stack Buffer Overflow via HTTP Request Play Ransomware social engineering campaign PLC Setpoint Manipulation PlugX Malware Deployment Policy Puppetry Polymorphic Code Mutation Post-Compromise Activities on BIG-IP Appliances Post-Exploitation Phishing Potential for Mass Surveillance PowerShell Obfuscation and Defense Evasion PowerShell One-Liner Execution Powershell_Fileless_Encryption PowerShell-based Malware Delivery Predictable Password Patterns Privacy Erosion via Transaction Tracking Privilege Escalation Privilege Escalation via Account Registration Privilege Escalation via Agere Modem Driver Privilege Escalation via AI Agent Evolution Privilege Escalation via Backdoor Accounts Privilege Escalation via Windows Remote Access Connection Manager Process Hollowing Programmable Money Restrictions Prompt Injection Prompt Injection and Data Manipulation in AI Systems Prompt Injection Attack Prompt Injection for Data Exfiltration via DNS requests Prompt Injection in ChatGPT to Output Specific Text Prompt Injection in OpenAI Atlas Omnibox Prompt Injection leading to Exploitation Prompt Injection to Poison Gemini's Mathematical Calculations ProxyLogon ProxyNotShell ProxyShell PsExec for Lateral Movement and Remote Execution PyInstaller Packaging for Evasion Qakbot Malware QUICLEAK/Malformed Packet quotes Ransomware Ransomware Attack Ransomware Attack (Medusa) Ransomware Attack and Data Exfiltration Ransomware Attack on Customer Shares Ransomware attack on Synnovis Ransomware Attack via Credential Compromise Ransomware Attacks via Exploited Exchange Flaws Ransomware Deployment Ransomware Deployment (Black Basta) Ransomware Targeting Veeam Backup and Replication (VBR) Rapid C2 Rotation RAR Archive and BAT Script Exploitation RayInitiator and LINE VIPER Deployment Redirect Chain Evasion Redirect Chain Exploitation RedTiger Infostealer Relative Read and Write Primitives via ERTM Fragments Relaying Active Authentication Signatures Remote Access Connection Manager Elevation of Privilege Remote Code Execution via Crafted Web Page Remote Code Execution via CVE-2025-10035 Remote Code Execution via Specially Crafted Packets Remote Dynamic Dependencies (RDD) Remote Tracking and Control via Dealer Portal Remote Vehicle Hack via CAN bus Remote_Dynamic_Dependencies_and_Lifecycle_Scripts Request Smuggling Resource Exhaustion Denial-of-Service via TCP Connection Flooding Responsibility Shifting to Schools Retrieval-Augmented Generation Privacy Leaks Return Address Corruption Rogue Actions Rollbacks of Diversity Rootkit Deployment via SNMP RCE Runtime Function Patching with drwrap Runway Dependence Salesforce Data Breach and Extortion Salesforce Data Export Salesforce Data Theft and Extortion Salt Typhoon and Volt Typhoon intrusions Scam Texts Targeting Americans Scheduled Task Persistence ScoringMathTea RAT Deployment Secure Boot Bypass via 'mm' command Secure_Boot_Bypass_IGEL_OS Selenium Browser Automation for Session Hijacking Self-Modifying Code via XORing Sendit Data Harvesting and Fake Messages Sensitive Data Exfiltration Sensitive Information Disclosure Session Hijacking via SessionReaper Session-Based Installation Bypass SessionReaper Sextortion Sexual Exploitation of a Minor Shadow AI and Unmanaged AI Agents Shadow AI Data Exfiltration Shadow IT usage of generative AI tools Shared Content Security Blind Spot SharePoint 0-day Exploitation SharePoint ToolShell Exploitation (C0058) Shellcode Injection Detection Short-lived Web Page Exploit SIM Box Exploitation SIM Box Fraud SIM-box facilitated mass mobile identity fraud SIM-Swapping Fraud Sitecore ViewState Deserialization Exploit SMB_Client_Coercion Smishing Smishing for Data Theft SMS Handler Abuse for Lateral Movement SMS Interception and Manipulation SMS Phishing via SIM Farms SMS Spam Campaign SMS-Based 2FA Interception SNMP Exploit for Remote Code Execution SocGholish Fake Update Exploit Social Engineering Social Engineering & Gamification for Radicalization Social Engineering and Anti-Detection Tactics Social Engineering and Confidence Scam Social Engineering and Financial Exploitation Social Engineering and Fraudulent Cryptocurrency Investment Schemes Social Engineering and Phishing Social Engineering and Sideloading of Malicious APKs Social Engineering for Account Access Social Engineering of Trusted Recovery Contacts Social Engineering Phishing Social Engineering via Fake Job Interviews Social Engineering via Fake Job Offers Social Engineering via Fake Job Offers (Operation DreamJob) Social Engineering via Fake Job Postings Social Engineering via Fake Websites Social Engineering via Job Offers Social Engineering via Malicious Distribution Network Social Engineering via Trojanized Software Social Media Influence Operations with AI-Generated Content Social Media Surveillance and Visa Revocation SolarWinds Supply Chain Attack Solver Compromise SonicWall Firewall Configuration Backup Compromise Source Code Theft and Potential Exploitation of Undisclosed Vulnerabilities Spear Phishing Spear Phishing with ClickFix-Style CAPTCHA Lure Spearphishing Enhancement via AI Spearphishing with Malicious LNK files Spectre and Meltdown Spyware Breach Exposing Sensitive Information SQL Injection SQL Injection via phpMyAdmin leading to Web Shell SQL_Injection_Cron_Job_Injection SSH Key Injection for Persistence Stack-based Buffer Overflow via counts Parameter Stack-based Buffer Overflow via ipaddr Parameter Stack-based Buffer Overflow via submit-url and ipaddr Combination Stack-based Buffer Overflow via submit-url Parameter Starlink Terminal Misuse for Cybercrime Startup Parameter Injection Steganography_for_malware_deployment_and_COVCOM Stolen BIG-IP Source Code and Undisclosed Vulnerability Exploitation Stolen Credentials via Infostealer Malware and Access Brokers Stolen Encrypted Vault Backups Stolen Source Code and Vulnerability Information leading to Potential Targeted Exploits Stopping Trace Logging Struts DevMode RCE via Authentication Bypass Supply Chain Attack Supply Chain Attack on Criminal Collaborationware Supply Chain Attack on Effortless Motors Supply Chain Attack via Compromised IT Service Provider Supply Chain Attack via Malicious NPM Package Supply Chain Attack via Malicious NPM Packages Supply Chain Attack via Malicious VS Code Extension Updates Supply Chain Attacks Supply Chain Disruption Supply Chain Disruption via Export Controls Supply Chain Risks due to Third-Party Providers Supply Chain Vulnerabilities Supply-Chain Attacks via PyPI Sybil Attacks in Multi-Chain Environments SyncServlet Exploit Chain Synthetic Identity Fraud System Prompt Leakage Tar Header Smuggling in async-tar Targeting of Microsoft Exchange Servers TCP SYN Flood Telegram API as C2 Channel Template Injection Leading to Coinminer Installation Third-party AI Model Risks Third-Party App Store Malware and Adware Distribution Third-Party Vendor Compromise Tile Tracker Security Weaknesses Time Manipulation Attack (Implied) TLS_Configuration_Issues Tool Poisoning Attacks and Exfiltration Channels in MCP Servers Tool Sprawl and Alert Fatigue ToolShell Training Data Exposure TrickBot Malware Trojanized Development Tool via Token Theft Trusted App Misuse Two-Face Binary Typosquatting_Slopsquatting_LLM_Hallucination UAC Bypass UAC Bypass for Privilege Escalation UDP Flood Amplification UiServlet Exploit Chain Unanticipated Chaining of Operations by AI Agents Unauthenticated Arbitrary File Upload Unauthorized Access to Cloud Storage Unauthorized Database Queries Unauthorized Third-Party Access and Data Exfiltration Unauthorized Workspace Merger/Enterprise Account Incorporation Unbounded Consumption UNC3886 Zero-Day Exploits on Routers and Virtualization Platforms (C0056) Understaffing of Digital Professionals Unencrypted DDS Traffic Unencrypted Satellite Communication Interception Unencrypted SQL Backup Uninterrupted Automated Vulnerability Scanning Universal Backdoor Universal Password Creation Unlawful Collection and Use of Personal Data for Credit Scoring Unpatched Software Vulnerability Unpatched Windows 10 Systems Becoming Attack Targets Unprotected Kafka Broker Unprotected Kafka Broker Access Unprotected VPN access Unspecified Cisco Firewall Bugs Unsupported Microsoft Exchange Exploitation URI Scheme Handler Attack USB Port Exploitation on Mobile Handsets Use of compromised certificates Use of Outdated Systems User Enumeration Vector and Embedding Weaknesses Velociraptor Abuse for Remote Access Velociraptor_Misuse Vidar Infostealer Video-Driven Impersonation Attack Virtual Kidnapping Scams Vishing and Modified Data Loaders VMware Tools Privilege Escalation Voice Cloning and Call Spoofing Voice-Scam Tools VPN Tunneling Protocol Misuse (Shadowsocks) VS Code Extension Attack Wallpaper Customization App Issues WannaCry Ransomware Attack WannaCry Ransomware Exploit (Windows XP as precedent) Watering Hole Attack Weak Backup Password Exploitation Weak Encryption of Configuration Files Weakened National Cyber Director Authority Weaponization of new flaws faster than defenders can respond Web Skimmer WebKit Exploit Chain Webkit Sandbox Escape WebSocket RAT WhatsApp Web Hijacking for Spam Campaigns WhatsApp Worm WhatsApp Zero-Click + Apple OOB Write Exploit Chain Whisper 2FA Phishing Kit Wi-Fi Network Mapping for Espionage/Cyberattacks Windows Remote Access Connection Manager EoP Windows Shortcut Vulnerability (LNK File Execution) Windows_Agere_Modem_Driver_Elevation_of_Privilege Windows_Remote_Access_Connection_Manager_Elevation_of_Privilege WIREGUARD_COMMAND_INJECTION Wireless Proximity Attack Wireless proximity exploit over all radio interfaces WireTap Workforce and Budget Cuts Hampering Cyber Defenses Workspace Isolation Bypass WSUS Exploit Delivering Skuld Infostealer WSUS Exploitation for Reconnaissance and Data Exfiltration WSUS Malicious Update Distribution WSUS PowerShell Data Exfiltration WSUS Vulnerability leading to Skuld Infostealer Deployment WSUS_RCE_via_Unsafe_Deserialization YouTube Ghost Network Malware Distribution Zero-click Dolby audio bug Zero-Click Exploit Chains Zero-Click Remote Code Execution Chain Zero-Click Remote Compromise Zero-Day Exploit Sale Zero-Day Exploit Sales Zero-day exploits Zero-Day Exploits Developed by Trenchant Zero-Day Vulnerability Exploitation Zip64 End-of-Central-Directory Record Manipulation
Vulnerabilities All CVE-2016-9535 CVE-2017-3881 CVE-2017-9841 CVE-2021-21311 CVE-2021-26829 CVE-2021-3129 CVE-2021-40351 CVE-2021-4122 CVE-2022-22947 CVE-2022-29072 CVE-2022-29303 CVE-2022-47945 CVE-2023-1389 CVE-2023-20198 CVE-2023-26801 CVE-2023-34362 CVE-2023-35673 CVE-2023-40129 CVE-2023-46747 CVE-2023-47565 CVE-2023-51833 CVE-2023-52163 CVE-2023-XXXXX CVE-2024-1086 CVE-2024-10914 CVE-2024-12847 CVE-2024-12856 CVE-2024-1709 CVE-2024-1781 CVE-2024-21827 CVE-2024-23897 CVE-2024-3721 CVE-2024-50623 CVE-2024-55956 CVE-2024-7029 CVE-2025-0033 CVE-2025-0785 CVE-2025-10035 CVE-2025-11371 CVE-2025-11492 CVE-2025-11493 CVE-2025-12036 CVE-2025-12428 CVE-2025-1829 CVE-2025-20333 CVE-2025-20352 CVE-2025-20362 CVE-2025-22224 CVE-2025-22225 CVE-2025-22226 CVE-2025-22905 CVE-2025-24052 CVE-2025-24257 CVE-2025-24893 CVE-2025-24990 CVE-2025-2611 CVE-2025-2783 CVE-2025-2884 CVE-2025-30406 CVE-2025-31324 CVE-2025-33073 CVE-2025-34033 CVE-2025-34037 CVE-2025-37947 CVE-2025-4008 CVE-2025-41244 CVE-2025-41251 CVE-2025-41252 CVE-2025-43300 CVE-2025-47827 CVE-2025-48561 CVE-2025-48826 CVE-2025-49704 CVE-2025-49706 CVE-2025-49708 CVE-2025-49844 CVE-2025-53109 CVE-2025-53476 CVE-2025-53690 CVE-2025-53770 CVE-2025-53771 CVE-2025-53786 CVE-2025-53967 CVE-2025-54135 CVE-2025-54236 CVE-2025-54253 CVE-2025-54399 CVE-2025-54400 CVE-2025-54401 CVE-2025-54402 CVE-2025-54403 CVE-2025-54404 CVE-2025-54405 CVE-2025-54406 CVE-2025-54795 CVE-2025-54957 CVE-2025-5504 CVE-2025-55177 CVE-2025-55247 CVE-2025-55284 CVE-2025-55315 CVE-2025-57819 CVE-2025-57822 CVE-2025-59230 CVE-2025-59234 CVE-2025-59236 CVE-2025-59246 CVE-2025-59287 CVE-2025-59489 CVE-2025-61882 CVE-2025-61884 CVE-2025-61932 CVE-2025-62518 CVE-2025-6264 CVE-2025-62725 CVE-2025-6325 CVE-2025-6327 CVE-2025-7414 CVE-2025-7850 CVE-2025-7851 CVE-2025-9217 CVE-2025-9491 ZDI-CAN-25373
MITRE ATT&CK TTP All "A threat actor has claimed responsibility for stealing 1.3TB of compressed data and demanding ransom "context": "The article describes a scenario where a blockchain network (Solana) experienced a service disruption due to a flood of spam transactions "context": "The article discusses spam attacks on blockchain networks like Ethereum "context": "The article mentions ransomware groups (Qilin, XWorm) encrypting data after exfiltration "context": "The Oracle E-Business Suite vulnerability allows unauthenticated remote code execution (RCE) through a public-facing application (EBS apps) "context": null "contradictions": "The article doesn't explicitly state that the attackers intentionally stopped the service. The disruption might be a consequence of resource exhaustion or network congestion caused by the flood of transactions. Nevertheless "contradictions": "The article focuses on mitigating spam at the transaction relay layer "contradictions": "The article provides limited context on the exact method of exploiting the vulnerability." "contradictions": "While the data is said to be unreadable "contradictions": null } "Each node monitors the behavior of its peers over time and assigns a reputation score based on factors like transaction rate "Exploit Public-Facing Application: T1190 "File and Directory Discovery: T1083 "independent_analysis": "The description details a specific CVE that affects a publicly accessible component of Oracle E-Business Suite. The fact that it allows unauthenticated RCE makes it directly applicable to T1190." "independent_analysis": "The detail about Solana going offline for seven hours strongly suggests that the spam attack led to a denial-of-service situation. The overload of transactions caused the system to crash "independent_analysis": "The mention of 'unreadable without proprietary tools' suggests encryption "independent_analysis": "While the article doesn't explicitly mention specific application layer protocols "independent_analysis": null "Ingress Tool Transfer: T1105 "Obfuscated Files or Information: T1027 "Phishing: T1566 "Proxy: T1090 "Researchers have discovered that XWorm RAT has resurfaced with 35 plugins and an upgraded ransomware module for file encryption "Service Stop: T1489 "Spearphishing Link: T1192 "Valid Accounts: T1078 300 files totaling 27GB of sensitive data allowing data theft from internet-exposed EBS apps." ] and also demanding ransom for the decryption keys. Avnet's data breach involved 1.3TB of data stolen and held for ransom and although not intentionally brought down and fee patterns." ] and internal reports." and ransom notes." ] and Solana and Solana. These networks operate using application layer protocols for transaction submission and propagation. The monitoring of transaction rate and fee patterns falls under the application layer protocol analysis." and the context of ransomware attacks and ransom demands further supports the Data Encrypted for Impact technique." and the total number of affected individuals remains unknown." anyone can send transactions as long as they pay the required fee." Application Layer Protocol: T1071 Bitcoin Brute Force: T1110 Brute Force: T1118 but most data is reportedly unreadable without proprietary tools Cloud Accounts: T1078.004 Command and Scripting Interpreter: T1059 Compromised Data: T1565 Content Injection: T1659 contracts Credentials from Password Stores: T1555 Data Encrypted for Impact: T1486 Data Exfiltration: T1041 Denial of Service: T1499 Deobfuscate/Decode Files or Information: T1140 Drive-by Compromise: T1189 duplication effectively halting block production." Email Forwarding Rule: T1114.003 employee IDs enabling data theft Exfiltration Over C2 Channel: T1041 Exploit Public-Facing Application: T1190 Exploitation for Client Execution: T1203 Exploitation for Privilege Escalation: T1068 Exploitation of Remote Services: T1210 Expolit Public-Facing Application: T1190 External Remote Services: T1133 failure rate File and Directory Discovery: T1083 Impair Defenses: T1562 including financial documents Indicator Removal: T1070 Ingress Tool Transfer: T1105 Inhibit System Recovery: T1490 Input Capture: T1056 Lateral Movement: T1021 Lateral Tool Transfer: T1570 Modify Registry: T1112 Native API: T1106 Network Segmentation: T1071 Non-Application Layer Protocol: T1095 Obfuscated Files or Information: T1027 OS Credential Dumping: T1003 Phishing: T1566 PowerShell: T1059.001 Process Injection: T1055 Proxy: T1090 quotes": [ "One well-known example occurred in 2022 when Solana went offline for seven hours after bots submitted millions of NFT minting transactions per second." ] quotes": [ "Oracle E-Business Suite zero-day CVE-2025-61882 enables unauthenticated RCE via the BI Publisher Integration component with a single low-complexity HTTP request quotes": [ "The attack resulted in the exfiltration of over 9 quotes": [ "When blockchain networks get flooded In open networks like Ethereum quotes": [] Remote Services: T1021 Scheduled Task/Job: T1053 Service Stop: T1489 Social Engineering: T1566 Spearphishing Attachment: T1193 Spearphishing Link: T1192 Spearphishing: T1566 Supply Chain Compromise: T1195 System Information Discovery: T1082 the context of blockchain networks implies the use of such protocols for communication and transaction processing. The monitoring of transaction characteristics is indicative of interaction with the application layer." the end result was a complete service interruption." the specific details of monitoring transaction rate and fee are tied to how the application layer protocol is utilized." this does not necessarily mean the data was encrypted. It could simply mean that the data was in a proprietary format that can't be easily viewed by outside parties." this resulted in an unintended service stop." Trusted Relationship: T1199 ttp": { "items": { "Application Layer Protocol: T1071 ttp": { "items": { "Data Encrypted for Impact: T1486 Unsecured Credentials: T1552 Valid Accounts: T1078 wallpaper changes Web Shell: T1505.003 which could involve some aspects of network layer protocols. However which directly relates to exploiting a public-facing application to gain unauthorized access." Windows Command Shell: T1059.003 Windows Management Instrumentation: T1047 with the data being reportedly unreadable without proprietary tools."
Exploited Software All 1Password 23andMe Login API 3X VPN – Smooth Browsing Accellion FTA Acronis Action1 Active Directory AdaptixC2 Adminer Adobe Commerce (Magento) Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE) Adobe Experience Manager (AEM) Forms on JEE Adobe Photoshop Agere Modem driver (ltmdm64.sys) Agere Windows Modem Driver AI AI companion apps AI Models AI Systems AI tools AI Tools Akira ransomware Albanian government infrastructure All devices running BIG-IP (F5OS), BIG-IP (TMOS), Virtual Edition (VE), BIG IP Next, BIG-IQ, and BIG-IP Next for Kubernetes (BNK) / Cloud-Native Network Functions (CNF) Amazon DynamoDB's DNS management system AMD SEV-SNP Android Android (Samsung and Pixel devices) Android Applications Android Applications (Malicious APKs) Android Applications (Specifically targeting Signal, Google Authenticator, Venmo, and Google Maps) Android Apps (specifically princess.apk) Android Bluetooth stack (Fluoride) Android Devices Android Host Card Emulation (HCE) Android Malware Android OS Android Phones Anthropic Claude's Code Interpreter Anthropic MCP Inspector Anthropic's MCP server (CVE-2025-53109) AOL Account APIs APIs (Application Programming Interfaces) APM Apple iOS, iPadOS, and macOS Apple iPhones Apple Wallets Arc ArcGIS Asahi Systems Askul Website and Systems ASP.NET Core Kestrel Web Server ASP.NET Core's Kestrel web server async-tar async-tar Rust library and forks Atlas Aura Stealer AVTECH Base44 platform BazarBackdoor BeaverTail BEAVERTAIL malware BIG-IP BIG-IP iSeries, rSeries, or any other F5 appliance that has reached end of support BIG-IP Next for Kubernetes BIG-IQ Binance Blue Angel Software Suite BMW vehicles Botnet malware Brave BreachForums database backups Browsers Browsers (Chrome, Brave, Firefox, Edge, and Opera) BSAFE Crypto-C 7.5 Bumblebee Calendar Canon printer assistant utility Capita Systems CentreStack Chakra JavaScript engine ChatGPT ChatGPT Atlas Chattee Chat – AI Companion Chessfi Chrome Chrome extensions Chrome Web Store Chromium Chromium_Stealer Cisco 3750G series devices Cisco 9300 series devices Cisco 9400 series devices Cisco 9400, 9300, and legacy 3750G series devices Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Cisco ASA 5500-X Cisco ASA 5500-X firewalls Cisco Devices Cisco firewall Cisco firewalls Cisco IOS and IOS XE Cisco IOS and IOS XE (Cluster Management Protocol) Cisco IOS and IOS XE (SNMP) Cisco IOS XE Cisco IOS/IOS XE Cisco IOSd Cisco SNMP Citrix NetScaler Gateway Citrix Virtual Delivery Agent Claude Code agent (CVE-2025-55284) Cleo file transfer ClubWPT Gold CMS platforms and plugins Cobalt Strike Coinbase COLDCOPY Comet Comet Browser Comet Browser (Perplexity) Computer information protection tools Conduent Network Conduent's systems ConnectWise Automate Conti CosmicDoor CountLoader Critical Infrastructure Systems cross-fetch Cryptocurrency Investment Schemes Cryptocurrency wallets Cryptocurrency Wallets cryptsetup csc.exe (.NET Framework Compiler) csc.exe (Visual C# Compiler) Cursor (CVE-2025-54135) CVE-2021-26829 CVE-2021-26829 (HMI Login Page Vulnerability) Cyberduck Cybersecurity Providers D-Link D-Link NAS units, TVT and LILIN DVRs, Fiberhome, ASMAX, and Linksys routers, Brickcom cameras DanaBot Dante (commercial spyware developed by Memento Labs - formerly known as Hacking Team) DDR4 standard memory modules DeepSeek Dell BSAFE Crypto-C Dell BSAFE Crypto-C RSA 6.4 Dia Diffie-Hellman Digiever Discord Discord Supplier Docker Docker Compose Docker Desktop Installer.exe Dolby audio Dolby Digital Plus audio decoder Dolby Unified Decoder Component (UDC) DownTroy Drift Drive Duo MFA DVRs, NVRs, CCTV, web servers (multiple vendors) E-mail clients Edge Edimax Electronic Passports Electronic Passports using Basic Access Control (BAC) ELF Emotet Enrichlead ESAFENET CDG V5 ESXi EternalBlue Ethereum EtherHiding ExaGrid Tiered Backup Storage Exchange Online Exchange Server 2016 Exchange Server 2019 F5 F5 BIG-IP F5OS Facebook Facebook Messenger fd Fellou Browser Ferrari vehicles File Explorer FileFix Firefox add-ons Firefox extensions FL Studio Four-Faith Framelink Figma MCP Server Framework 13 (11th Gen Intel) Framework 13 (12th Gen Intel) Framework 13 (13th Gen Intel) Framework 13 (AMD Ryzen 7040) Framework 13 (AMD Ryzen AI 300) Framework 13 (Intel Core Ultra) Framework 16 (AMD Ryzen 7040) Framework Desktop (AMD Ryzen AI 300 MAX) Framework UEFI Shell FreePBX Garden Solver GCC Productions Inc. Fade In Gemini Gemini Apps Gemini command-line interface General Atomics MQ-9B GiMe Chat – AI Companion Git git show GitHub Actions workflows GitHub MCP GitHub Notification System GitLab GitLab Instance Runners Gladinet CentreStack Gladinet CentreStack/Triofox Gladinet Triofox Gmail go test GoAnywhere MFT Google Ads Google Authenticator Google Chrome Google Maps Google Pay Google Photos Google Search GPT 3.5-Turbo Grammarly GraphQL-JS Grok HMIs (Human Machine Interfaces) Home Assistant Green Homebrew HP OneAgent HPE Integrated Lights-Out (iLO) / Integrated Dell Remote Access Computer (iDRAC) / Intelligence Platform Management Interface (IPMI) HTTP traffic Huddle01 Human Machine Interface (HMI) Human-Machine Interface (HMI) Human-Machine Interface (HMI) with default credentials IcedID iCloud ICS/OT Protocols (Modbus, DNP3, Siemens S7, BACnet) ICTBroadcast IGEL OS Industrial Control Systems (ICS) Devices Infected browsers Infineon secure element Infostealer malware Infostealers Instagram Intel SGX Internet Explorer mode in Edge Internet Explorer Mode within Edge Internet Explorer's JavaScript engine (Chakra) Inverters InvisibleFerret INVISIBLEFERRET INVISIBLEFERRET malware IOGPUFamily iOS IoT Devices iPhone JadeSnow JADESNOW JADESNOW malware Jaguar Land Rover IT systems Jeep Cherokee Jenkins JLR's internal IT environment Kafka broker Kafka Broker KEM_Y (Hypothetical KEM with collisions) Kia vehicles King Addons for Elementor KPU Telecommunications Kraken ksmbd Lanscope Endpoint Manager Lanscope Endpoint Manager On-Premise Laravel Ignition Large Language Models (LLMs) LastPass LB-LINK LibTIFF LinkPro Linksys Linux Linux kernel Llama 3.1 LLMs LockBit LogMeIn LUKS2 Lumma Stealer LummaC2 macOS macOS Finder extensions Magento Malware MariaDB Marks & Spencer Click & Collect service MAYBEROBOT mcp-remote Meduza infostealer Meduza Stealer Mercedes vehicles Merkle Servers Meteobridge Microsoft Microsoft 365 Copilot Microsoft 365 Education Microsoft Active Directory Microsoft ASP.NET Core Kestrel web server Microsoft cdb.exe Microsoft Copilot Microsoft Edge Microsoft Entra ID Microsoft Exchange Online Microsoft Exchange Online Protection (EOP) Microsoft Exchange Server Microsoft Exchange Server CVE-2025-53786 Microsoft Graph APIs and OneDrive Microsoft Intune Microsoft Office Microsoft Outlook Microsoft Partner Program data stores Microsoft SharePoint Microsoft Teams Microsoft Teams installers Microsoft Windows Microsoft Windows SMB client Microsoft Word Mimikatz Misconfigured Services Mobdro Pro IP TV + VPN Monday MonsterV2 Motex LANSCOPE Endpoint Manager Mouse Firmware and Drivers MOVEit MOVEit Transfer MuPDF MVPower DVR MySonicWall cloud backup feature Netgear Network appliances Next.js NextJS SSR website Nezha node-nvm-ssh Node.js runtime Nokia Beacon 1 NOROBOT npm packages npm Packages NPM Packages Nx platform development tool OAuth and JWT (JSON Web Token) Office 2016 Office 2019 Okrum malware Okta old, likely vulnerable message board platform OneDrive Online Gambling Platforms Online platform hosted by Ravin Academy open-source Pythia models OpenAI Atlas OpenAI Atlas Web Browser OpenAI Guardrails OpenAI's Atlas OpenAI's Atlas Browser OpenPLC OpenPLC_v3 a931181e8b81e36fadf7b74d5cba99b73c3f6d58 Opera Oracle Configurator Oracle E-Business Suite Oracle E-Business Suite (EBS) OtterCookie Outdated software Outdated Software Outlook Outlook Account Outlook Web Access 2019 Outlook Web Access 2019 or earlier Oyster backdoor Paragon PayPal's Friends and Family option PDQ Pegasus Spyware Perplexity Perplexity AI Perplexity Comet Phoenix backdoor v4 phpMyAdmin PHPUnit Pikabot Planet WGR-500 Planet WGR-500 router PLCs, remote terminal units, human-machine interfaces, SCADA systems, safety controllers, building management setups, and other industrial IoT gear PlugX PlugX Remote Access Trojan PowerSchool PowerShell Predator Spyware Project 2016 Project 2019 Prosper Databases PureRAT PyPI Python Python 3.8 Python RAT Python Wheel files Python's zipfile implementation Qakbot Qilin Ransomware (encryptor_1.exe and encryptor_2.exe) QNAP QNAP TS-453E NAS device Rclone React Native Aria and GlueStack RealTimeTroy Redis Redline RedTail Remote Access Services Remote Access Software Remote Access Trojans (RATs) Remote Desktop Protocol (RDP) Remote Monitoring Devices Rhadamanthys Rhadamanthys infostealer Rhysida ransomware ripgrep Robinhood Roblox RooTroy Routers and other network devices Routers, VPNs, and Firewalls Rust async-tar (and forks e.g. tokio-tar) Salesforce Salesforce PersonAccount exports Salesloft Drift Salesloft Drift (Salesforce plugin) Samsung Galaxy S25 Satellites ScoringMathTea ScreenConnect Selenium Server Message Block (SMB) SharePoint Sheets Shipped Software Signal SimonMed Imaging Systems Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) Skype for Business 2016 Skype for Business 2019 Slider Revolution Smaller AI Models (<= 13 billion parameters) Smart alarm systems SmokeLoader SMS Snapchat SocGholish Social Media and Communications Platforms SoftEther VPN Bridge Solana Solar Monitoring System (Lithuania's Ignitis Group) SolarWinds Orion SolarWinds Serv-U FTP SonicWall SonicWall cloud backup service SonicWall firewall devices SonicWall Firewalls Sotheby's Website South Korean software products Special Software (Mic-E-Mouse Attack) Spectre and Meltdown Spring Cloud Gateway SpyEye SQL SQL Server SSH Starlink Terminals Synology ActiveProtect Appliance DP320 NAS drive Synology CC400W camera Synology DiskStation DS925+ NAS Systematic Alien Verification for Entitlements (SAVE) SystemBC T-Mobile TBK TBK DVR tcrond Teams Telecommunications edge devices and critical infrastructure Telegram TelMex Telnet Tenda Termux ThinkPHP Third-party clients/mods of messaging apps TightVNC Viewer TikTok tokio-tar TOTOLINK Toys “R” Us customer database TP-Link Archer AX21 Wi-Fi router TP-Link Festa VPN routers TP-Link Omada ER605v2 router TP-Link Omada routers TradingView TRENDnet Trickbot TrickBot Trojanized PDF reader trojanized PDF readers Truffle Security Co. TruffleHog Turbo VPN Twitter U.S. Military sea vessels UN aviation agency recruitment database Unitree G1 Humanoid Robot Unity Runtime Unknown Malware Unpatched Software Vulnerabilities V8 JavaScript Engine Veeam Veeam Backup and Replication (VBR) Velociraptor Velociraptor 0.73.4.0 Venmo Vidar Visio 2016 Visio 2019 Vivaldi VMWare ESXi VMware vSphere VPN VPN Proxy Master VS Code extension VS Code Extensions VSCode Extensions vShell Web Applications Web Assets Web Browsers (general) webctrl.cgi WebKit WebKit's WebContent WhatsApp WhatsApp for iOS and Mac WhatsApp Web Whisper 2FA WiBo win32kbase_rs.sys Windows Windows 10 Windows 11 23H2 Home and Pro editions Windows 7 Windows Active Directory Windows Agere Modem Driver Windows Defender Windows File Explorer Windows LLMNR and NBT-NS Windows LNK files Windows Remote Access Connection Manager Windows Remote Management (WinRM) Windows Server (2012 through 2025) Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019 Windows Server 2022 Windows Server 2025 Windows Server Update Service (WSUS) Windows Server Update Services (WSUS) Windows Server, version 23H2 Windows SMB Client Windows XP WordPress WordPress Core WordPress plugins WordPress Plugins Workday WSUS X XWiki XY VPN YESROBOT YouTube Zendesk Zeus Zoom ZoomClutch/TeamsClutch
Involved Countries All Afghanistan Africa Albania Algeria Argentina Arizona Australia Austria Baltic States Belarus Belgium Brazil Britain British Virgin Islands Bulgaria California Cambodia Canada China Colombia Commonwealth of Independent States (CIS) Cyprus Czech Republic Democratic People's Republic of Korea (DPRK) Democratic Republic of the Congo Denmark DPRK Estonia EU Europe European Economic Area European Union Finland France Georgia Germany Greece Guatemala Hong Kong Hungary India Iran Ireland Israel Italy Jakarta Japan Johannesburg Kazakhstan Laos Latvia Lithuania Luxembourg Malaysia Mauritius Mexico Mongolia Mumbai Myanmar Nepal Netherlands New Zealand North America North Korea Northern Ireland Norway Pennsylvania People's Republic of China (PRC) Peru Philippines Poland Portugal Qatar Romania Russia Russian Federation Serbia Singapore Slovakia South Africa South Korea Spain Sri Lanka Sweden Switzerland Taiwan Texas Thailand U.S. Ubuntu UK Ukraine United Arab Emirates United Kingdom United States United States of America US USA Vietnam
Affected Industries All Academia Accounting Adult Entertainment Advanced Manufacturing Advertising Aerospace Agriculture AI Development Air Transport Aircraft Component Manufacturing Airline Airlines Application Security Art Auction Artificial intelligence Artificial Intelligence Asset Management Auction Houses Automotive Automotive Manufacturing Aviation Banking Blockchain Services Blockchain/Cryptocurrency Brewing Business Business Process Outsourcing (BPO) Businesses Cloud Backup Cloud Computing Cloud Storage Commercial Commercial Security Communications Communications Services Community Sites Computer Hardware Computing Confidential Computing Construction Construction Technology Consulting Consumer Electronics Corporate Corporate Offices Critical Infrastructure Critical National Infrastructure Crypto Industry Cryptocurrency Cryptocurrency Exchange Cryptocurrency Exchanges Customer Relationship Management (CRM) Customer Support Cyber Insurance Cybersecurity Data Brokerage Data Storage/Backup Debt Solutions Defense Defense Contracting Defense Manufacturing Digital Advertising Diplomatic Diplomatic Services e-commerce E-commerce Education Elections Electronic Document Security Management Electronics Manufacturing Email Marketing Email Security Emergency Response Emergency Services Encrypted Messaging Services Energy Energy Saving Grants Engineering Entertainment File Hosting Services File-Sharing Services Finance Financial Financial Industry Financial Institutions Financial Sector Financial Services Financial Services (Credit Monitoring) Food and Beverage Formula One Racing Gambling Gambling/Casino Gambling/Lottery Gaming Geospatial Mapping Government Government Agencies Government Buildings Government Services Government/Military Government/Politics Government/Public Sector Hardware Manufacturing Health care Healthcare Hospitality Hospitals Hosting Providers Human Resources Human Resources (HR) Software Humanitarian Aid Industrial Industrial Automation Industrial Control Systems (ICS) Industrial Routers Information Technology Information Technology (IT) Infrastructure Insurance Intelligence Intelligence and Investigative Services Internet of Things (IoT) Internet Service Providers (ISPs) IT IT (Information Technology) IT and Cyber Software IT Companies IT Providers IT Services Job Recruitment/Employment Labor Unions Law Enforcement Legal Local Governments Logistics Luxury Goods Managed Service Providers (MSPs) Management Consultancies Manufacturing Marketing Media Media and entertainment Media and Journalism Media Streaming Medical Medical Device Manufacturing Messaging Apps Metal Engineering Military Mobile App Development Mobile Device Manufacturing Mobile Telecommunications Modeling Multi-Party Data Collaboration Municipal Water National Government Networking NFT (Non-Fungible Token) Market NGO Non-Governmental Organizations (NGOs) Oil and Gas Online Gambling Online Message Boards Operational Technology (OT) Outsourcing Password Management Software Payment Card Industry (PCI) Payments Pensions Perimeter Security Pharmaceuticals Pornography Services Postal Service Private AI Inference Private Blockchains Processor Manufacturing Professional and Scientific Services Professional Services Public Administration Public Sector Publishing Rare Earth Metals Real Estate Recruiting Research Research and Academia Research Institutions Retail Retail and wholesale trade Robotics Security Security Software Security Vendors Semiconductor Semiconductors Shipping Shipping and Logistics Small and Medium Businesses (SMBs) Small Businesses Smart TV and Streaming Devices Social Media Software Software as a Service (SaaS) Software Development Software Development (Video Conferencing) Software Distribution Solar Power Space Spyware Supply Chain Tech Technology Technology (Consumer Electronics) Technology (Networking Equipment) Technology providers Telecommunications Toll Road Services Trading Transportation Transportation and Logistics Travel Unmanned Aerial Systems (UAS) Utilities Video Game Development Video Hosting Virtual Desktop Infrastructure Virtual Private Network (VPN) Water Water Treatment Web Hosting Web Hosting Services Web Services Web-hosting Webmail Services Wholesale Trade