Threat Intelligence

Real-time security threats and vulnerabilities affecting your environment

Latest Security Threats
Recent vulnerabilities and security advisories from CVE, MITRE ATT&CK, CISA KEV, and OWASP

This feed aggregates threat intelligence from multiple authoritative sources to keep you informed about emerging security risks. Threats are automatically matched to technologies used in your assessments.

Total Threats
7
Critical
3
Active Exploits
5
Filters
Severity:
Critical
CVE
CVE-2024-12345
CVSS: 9.8
Exploit Available
In the Wild
Critical SQL Injection in PostgreSQL Extension

Published: November 11th, 2025

A critical SQL injection vulnerability has been discovered in popular PostgreSQL extensions that could allow attackers to execute arbitrary SQL commands.

Affected Technologies

PostgreSQL
Database

Recommended Mitigations

  • Upgrade to PostgreSQL 15.5 or later
  • Apply vendor security patches immediately
  • Implement input validation and parameterized queries
  • Review and restrict database user permissions
Critical
CVE
CVE-2024-34567
CVSS: 9.1
Exploit Available
MongoDB Authentication Bypass

Published: November 3rd, 2025

Authentication bypass vulnerability in MongoDB versions prior to 7.0.5 allows unauthorized access to databases.

Affected Technologies

MongoDB
Database
NoSQL

Recommended Mitigations

  • Upgrade MongoDB to version 7.0.5 or later
  • Enable authentication and use strong credentials
  • Implement network segregation for database servers
  • Use MongoDB Atlas with built-in security features
  • Enable audit logging
Critical
CISA KEV
CVE-2021-44228
CVSS: 10
Exploit Available
In the Wild
Log4j Vulnerability Still Being Actively Exploited

Published: September 29th, 2025

CISA confirms continued active exploitation of Log4j vulnerability (Log4Shell) in production environments.

Affected Technologies

Java
Log4j
Java (Spring Boot)

Recommended Mitigations

  • Update Log4j to version 2.17.1 or later immediately
  • Remove JndiLookup class if update not possible
  • Implement network segmentation
  • Monitor for indicators of compromise
  • Review all Java applications for Log4j usage
High
CVE
CVE-2024-23456
CVSS: 8.1
Node.js Remote Code Execution Vulnerability

Published: November 8th, 2025

A vulnerability in Node.js allows remote code execution through malformed HTTP requests in certain configurations.

Affected Technologies

Node.js
JavaScript

Recommended Mitigations

  • Update to Node.js 20.11.0 LTS or later
  • Configure reverse proxy with request validation
  • Implement rate limiting and request size limits
  • Enable security headers
High
MITRE ATT&CK
Exploit Available
In the Wild
Exploit Public-Facing Application

Published: October 14th, 2025

Adversaries may attempt to exploit weaknesses in internet-facing applications. Common targets include web servers, databases, and APIs.

Affected Technologies

Web Application
API
Internet-facing

Recommended Mitigations

  • Deploy Web Application Firewall (WAF)
  • Implement robust input validation
  • Regular vulnerability scanning and penetration testing
  • Keep all software components updated
  • Use API gateways with rate limiting
High
MITRE ATT&CK
Exploit Available
In the Wild
Valid Accounts - Credential Compromise

Published: September 14th, 2025

Adversaries may obtain and abuse credentials to gain access to systems. Weak authentication is a primary attack vector.

Affected Technologies

Authentication
MFA
SSO
Active Directory

Recommended Mitigations

  • Implement Multi-Factor Authentication (MFA) everywhere
  • Use strong password policies and password managers
  • Monitor for anomalous authentication attempts
  • Implement conditional access policies
  • Regular credential rotation and privileged access management
High
OWASP
Exploit Available
In the Wild
Injection Vulnerabilities in Web Applications

Published: August 15th, 2025

Injection flaws remain one of the most critical security risks. SQL, NoSQL, OS, and LDAP injection can lead to data loss and server compromise.

Affected Technologies

Web Application
Database
API

Recommended Mitigations

  • Use parameterized queries and prepared statements
  • Implement input validation with allow-lists
  • Use ORM frameworks properly
  • Conduct regular code reviews and SAST scanning
  • Apply principle of least privilege for database access