Need Deeper Insights

Get comprehensive protection with our fully automated threat intelligence platform

Threat Intelligence Hub

Real-time insights and curated threat intelligence

Live

Rising Attack Trends

CVEs, Malware, TTPs, APTs & Vendors

12 Active
+120%

RANSOMWARE

TTP

This week:22
Prev:10
+183%

MICROSOFT

Vendor

This week:17
Prev:6
+88%

IMPACT

TTP

This week:15
Prev:8
NEW

OPERATION

TTP

This week:11
Prev:0
⚡ New Emerging Threat
+100%

GOOGLE

Vendor

This week:10
Prev:5
+200%

ZERO-DAY

TTP

This week:9
Prev:3
+80%

SPYWARE

TTP

This week:9
Prev:5
+200%

VPN

TTP

This week:6
Prev:2
NEW

CVE-2025-14733

CVE

This week:6
Prev:0
⚡ New Emerging Threat
NEW

SONICWALL

Vendor

This week:4
Prev:0
⚡ New Emerging Threat
+300%

EXECUTION

TTP

This week:4
Prev:1
NEW

BACKDOOR

TTP

This week:4
Prev:0
⚡ New Emerging Threat
Auto-detected from Daily Pulse articles • Click any threat for details

Technique Activity

Showing techniques actively observed in threat intelligence

No Activity
Low
Medium
High

Reconnaissance

3 active

Resource Development

1 active

Initial Access

4 active

Execution

2 active

Persistence

4 active

Privilege Escalation

4 active

Defense Evasion

4 active

Credential Access

4 active

Discovery

3 active

Lateral Movement

3 active

Collection

1 active

Command and Control

3 active

Exfiltration

2 active

Impact

5 active

Check for a breach

Check if accounts or domains have been compromised

Free Tier: 1 of 1 check remaining today

Sign in or subscribe for unlimited access

Top 10 CVEs

Most critical vulnerabilities right now

Last updated: 1 day ago
1

Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 11.0.x <= 11.0.3 fail to properly validate OAuth state tokens during OpenID Connect authentication which allows an authen

CVSS:9.9
EPSS:0.00%
Published:11/27/2025
2

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication f

CVSS:9.9
EPSS:0.00%
Published:11/27/2025
3

The FindAll Listing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.5. This is due to the 'findall_listing_user_registration_additional_params' fun

CVSS:9.8
EPSS:0.00%
Published:11/27/2025
4

The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This is due to the plugin not properly logging in a user with the data t

CVSS:9.8
EPSS:0.00%
Published:11/27/2025
5

The Tiare Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2. This is due to the 'tiare_membership_init_rest_api_register' function not res

CVSS:9.8
EPSS:0.00%
Published:11/27/2025
6

The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the 'paypal-submit.php' file not restricting what user roles a user ca

CVSS:9.8
EPSS:0.00%
Published:11/27/2025
7

Permission control vulnerability in the memory management module. Impact: Successful exploitation of this vulnerability may affect confidentiality.

CVSS:9.3
EPSS:0.00%
Published:11/28/2025
8

The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the plugin allowing a user to update the user role through the $user->

CVSS:8.8
EPSS:0.00%
Published:11/27/2025
9

The Blubrry PowerPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 11.15.2. This is due to the plugin va

CVSS:8.8
EPSS:0.00%
Published:11/27/2025
10

SQL Injection vulnerability in last usage logs in Devolutions Server.This issue affects Devolutions Server: through 2025.2.20, through 2025.3.8.

CVSS:8.8
EPSS:0.00%
Published:11/27/2025

ThreatInsights Threat Analysis Reports

Premium ThreatInsights Content

Locked

Exclusive Professional Reports

Deep-dive analysis and curated intelligence from security experts

Visit ThreatInsights

Community Submissions

Pro Feature - Submit Intelligence

Locked

Premium Intelligence Sharing

Contribute and share threat intelligence with the community

Visit ThreatInsights