Threat Surface Pulse
Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.
- Recent KEV additions
- Exec-ready talking points
Kentico
Kentico contains a failure to validate security headers. This deserialization can led to unauthenticated remote code execution.
Jenkins
Jenkins Matrix Project plugin contains a vulnerability which can allow users to escape the sandbox, opening opportunity to perform remote code execution.
Microsoft
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system.
Microsoft
A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths.
Microsoft
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer.
AI/ML Signal Tracker
Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.
- Top moving repos
- Signal strength
Rizwan723/MCP-Security-Proxy
🔒 Implement a security proxy for Model Context Protocol using ensemble anomaly detection to classify requests as benign or attack for enhanced safety.
mikehubers/Awesome-AI-For-Security
🛡️ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.
RepiFahmiSidiq/Onchain-Security-Suite
🛡️ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.
zimingttkx/Network-Security-Based-On-ML
基于机器学习的网络安全检测系统 | 集成Kitsune/LUCID算法 | 支持ML/DL/RL模型 | 99.58%攻击检测准确率 | 19913 QPS | Docker/K8s部署
hmshujaatzaheer/federated-scion-security-framework
Formally Verified Federated Learning Framework for Privacy-Preserving Anomaly Detection in Path-Aware Networks (PhD Research)
Mohamed-Tamer-Nassr/Network-Security-Model
A machine-learning–based phishing detection system that analyzes URL and network features to identify malicious sites, built with Python, FastAPI, Scikit-Learn, MongoDB, and Docker.
