Threat Intelligence
Real-time security threats and vulnerabilities affecting your environment
This feed aggregates threat intelligence from multiple authoritative sources to keep you informed about emerging security risks. Threats are automatically matched to technologies used in your assessments.
Published: November 11th, 2025
A critical SQL injection vulnerability has been discovered in popular PostgreSQL extensions that could allow attackers to execute arbitrary SQL commands.
Affected Technologies
Recommended Mitigations
- Upgrade to PostgreSQL 15.5 or later
- Apply vendor security patches immediately
- Implement input validation and parameterized queries
- Review and restrict database user permissions
Published: November 3rd, 2025
Authentication bypass vulnerability in MongoDB versions prior to 7.0.5 allows unauthorized access to databases.
Affected Technologies
Recommended Mitigations
- Upgrade MongoDB to version 7.0.5 or later
- Enable authentication and use strong credentials
- Implement network segregation for database servers
- Use MongoDB Atlas with built-in security features
- Enable audit logging
References
Published: September 29th, 2025
CISA confirms continued active exploitation of Log4j vulnerability (Log4Shell) in production environments.
Affected Technologies
Recommended Mitigations
- Update Log4j to version 2.17.1 or later immediately
- Remove JndiLookup class if update not possible
- Implement network segmentation
- Monitor for indicators of compromise
- Review all Java applications for Log4j usage
Published: November 8th, 2025
A vulnerability in Node.js allows remote code execution through malformed HTTP requests in certain configurations.
Affected Technologies
Recommended Mitigations
- Update to Node.js 20.11.0 LTS or later
- Configure reverse proxy with request validation
- Implement rate limiting and request size limits
- Enable security headers
References
Published: October 14th, 2025
Adversaries may attempt to exploit weaknesses in internet-facing applications. Common targets include web servers, databases, and APIs.
Affected Technologies
Recommended Mitigations
- Deploy Web Application Firewall (WAF)
- Implement robust input validation
- Regular vulnerability scanning and penetration testing
- Keep all software components updated
- Use API gateways with rate limiting
Published: September 14th, 2025
Adversaries may obtain and abuse credentials to gain access to systems. Weak authentication is a primary attack vector.
Affected Technologies
Recommended Mitigations
- Implement Multi-Factor Authentication (MFA) everywhere
- Use strong password policies and password managers
- Monitor for anomalous authentication attempts
- Implement conditional access policies
- Regular credential rotation and privileged access management
Published: August 15th, 2025
Injection flaws remain one of the most critical security risks. SQL, NoSQL, OS, and LDAP injection can lead to data loss and server compromise.
Affected Technologies
Recommended Mitigations
- Use parameterized queries and prepared statements
- Implement input validation with allow-lists
- Use ORM frameworks properly
- Conduct regular code reviews and SAST scanning
- Apply principle of least privilege for database access