TechAni
Dark mode

Insights Lab

Live Signals

Threat surface, AI/ML signals.

Live

Threat Surface Pulse

Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.

  • Recent KEV additions
  • Exec-ready talking points
CVE-2025-2776Due 8/12/2025

SysAid

SysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.

CVE-2025-6558Due 8/12/2025

Google

Google Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

CVE-2025-54309Due 8/12/2025

CrushFTP

CrushFTP contains an unprotected alternate channel vulnerability. When the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS.

CVE-2025-49704Due 7/23/2025

Microsoft

Microsoft SharePoint contains a code injection vulnerability that could allow an authorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-49706. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.

CVE-2025-49706Due 7/23/2025

Microsoft

Microsoft SharePoint contains an improper authentication vulnerability that allows an authorized attacker to perform spoofing over a network. Successfully exploitation could allow an attacker to view sensitive information and make some changes to disclosed information. This vulnerability could be chained with CVE-2025-49704. CVE-2025-53771 is a patch bypass for CVE-2025-49706, and the updates for CVE-2025-53771 include more robust protection than those for CVE-2025-49706.

← PrevPage 20 / 297Next →
Live

AI/ML Signal Tracker

Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.

  • Top moving repos
  • Signal strength
12/20/20250

RepiFahmiSidiq/Onchain-Security-Suite

🛡️ Strengthen Web3 security with our AI-driven token auditor and reputation engine, ensuring safer transactions and reliable smart contracts.

12/20/20252

mikehubers/Awesome-AI-For-Security

🛡️ Discover essential tools and resources that leverage AI for enhancing cybersecurity, focusing on modern technologies and their applications in security operations.

12/19/202543

Western-OC2-Lab/AutoML-and-Adversarial-Attack-Defense-for-Zero-Touch-Network-Security

This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis" published in IEEE Transactions on Network and Service Management.

12/18/20251

prashantshukla01/Network_Security

This project aims to detect malicious network activity using Machine Learning-based Intrusion Detection. It focuses on analyzing network traffic data to classify whether behavior is normal or attack-related, helping organizations strengthen their cybersecurity posture.

12/14/20250

PeterHovng/HUTECH_DACN.CyberSecurity

Đồ án chuyên ngành - ngành An ninh mạng "Hệ thống phát hiện tấn công mạng trên AWS bằng Machine Learning (Network Intrusion Detection System - NIDS)"

12/13/20252

polymons/MCP-Security-Proxy

A project to test MCP voulnerabilities and defense strategies in a cloud-native Dockerized environment. This repository is part of my Bsc thesis in computer engineering at Óbuda University.

← PrevPage 1 / 9Next →