Overview
Description
Statistics
- 10 Posts
- 3 Interactions
Fediverse
Cisco Talos is tracking active exploitation of CVE-2026-20127 affecting Cisco Catalyst SD-WAN Controllers. Customers are strongly advised to review our latest threat advisory (https://cs.co/9001hs79z) and follow the published guidance (https://cs.co/9001hs7aL) to protect your environment.
Cisco SDWAN Controller vulnerability in the wild and at the network edge. CVE-2026-20127 by UAT-8616. Heads up. https://blog.talosintelligence.com/uat-8616-sd-wan/ #threatintelligence #cybersecurity #cisco
Bluesky
Overview
- Juniper Networks
- Junos OS Evolved
Description
Statistics
- 5 Posts
Fediverse
Juniper Networks has released an update for its Junos OS Evolved to fix a critical vulnerability (CVE-2026-21902) affecting PTX series routers. This flaw, if exploited by an unauthenticated attacker, could allow for arbitrary code execution with root privileges, potentially giving an attacker complete control over the device.
https://www.securityweek.com/juniper-networks-ptx-routers-affected-by-critical-vulnerability/
The security issue is identified as CVE-2026-21902 and is caused by incorrect permission assignment in the ‘On-Box Anomaly Detection’ framework, which should be exposed to internal processes only over the internal routing interface. bleepingcomputer.com/news/security/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/
Bluesky
Overview
- anthropics
- claude-code
Description
Statistics
- 2 Posts
- 17 Interactions
Fediverse
Bluesky
Overview
Description
Statistics
- 5 Posts
Fediverse
Bluesky
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
On a recent engagement, we exploited a previously disclosed privilege escalation bug in Tenable's Nessus Agent. No public PoC was available, so we made one; check it out here https://github.com/atredispartners/proof-of-concept/tree/main/cve-2025-36632
Description
Statistics
- 1 Post
- 7 Interactions
Overview
Description
Statistics
- 1 Post
- 3 Interactions
Fediverse
Veritasium covers the #xz compromise. This is well done. It starts off explaining open source. It explains encryption and compression. It explains software dependencies. It explains how the back door would have worked. Good watch.
#Backdoor #Veritasium #CVE #CVE20243094
https://youtu.be/aoag03mSuXQ
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Overview
- Web-ofisi
- Firma Rehberi
Description
Statistics
- 1 Post
- 1 Interaction
Overview
Description
Statistics
- 1 Post
- 1 Interaction