Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
Cisco
Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.
Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.
Dassault Systèmes
Dassault Systèmes DELMIA Apriso contains a deserialization of untrusted data vulnerability that could lead to a remote code execution.
Linux
Linux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.
Android
Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
mikehubers/Awesome-AI-For-Security
🛡️ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.
RepiFahmiSidiq/Onchain-Security-Suite
🛡️ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.
prashantshukla01/Network_Security
This project aims to detect malicious network activity using Machine Learning-based Intrusion Detection. It focuses on analyzing network traffic data to classify whether behavior is normal or attack-related, helping organizations strengthen their cybersecurity posture.
PeterHovng/HUTECH_DACN.CyberSecurity
Đồ án chuyên ngành - ngành An ninh mạng "Hệ thống phát hiện tấn công mạng trên AWS bằng Machine Learning (Network Intrusion Detection System - NIDS)"
polymons/MCP-Security-Proxy
A project to test MCP voulnerabilities and defense strategies in a cloud-native Dockerized environment. This repository is part of my Bsc thesis in computer engineering at Óbuda University.
AyoubElmortaji/Cloud-Security
Analysis and Detection of Threats in Cloud Environments Using Machine Learning Developed an anomaly detection model achieving 80% accuracy with Random Forest. This academic project, completed during my Cybersecurity & Cloud Computing studies at ENSAM Casablanca, focuses on identifying suspicious activities and threats in cloud logs using machine l
