Need Deeper Insights

Get comprehensive protection with our fully automated threat intelligence platform

Threat Intelligence Hub

Real-time insights and curated threat intelligence

Live

Rising Attack Trends

CVEs, Malware, TTPs, APTs & Vendors

12 Active
+1200%

SPYWARE

TTP

This week:13
Prev:1
+300%

PATCH

TTP

This week:12
Prev:3
+300%

WORM

TTP

This week:12
Prev:3
+100%

ZERO-DAY

TTP

This week:10
Prev:5
NEW

CVE-2025-55182

CVE

This week:10
Prev:0
⚡ New Emerging Threat
+67%

EXECUTION

TTP

This week:10
Prev:6
+300%

SHAI-HULUD

Malware

This week:8
Prev:2
NEW

CISCO

Vendor

This week:5
Prev:0
⚡ New Emerging Threat
NEW

SONICWALL

Vendor

This week:4
Prev:0
⚡ New Emerging Threat
+300%

APT24

APT

This week:4
Prev:1
NEW

SAMSUNG

Vendor

This week:3
Prev:0
⚡ New Emerging Threat
+50%

VPN

TTP

This week:3
Prev:2
Auto-detected from Daily Pulse articles • Click any threat for details

Technique Activity

Showing techniques actively observed in threat intelligence

No Activity
Low
Medium
High

Reconnaissance

3 active

Resource Development

2 active

Initial Access

5 active

Execution

4 active

Persistence

2 active

Privilege Escalation

3 active

Defense Evasion

6 active

Credential Access

3 active

Discovery

4 active

Lateral Movement

2 active

Collection

3 active

Command and Control

3 active

Exfiltration

2 active

Impact

6 active

Check for a breach

Check if accounts or domains have been compromised

Free Tier: 1 of 1 check remaining today

Sign in or subscribe for unlimited access

Top 10 CVEs

Most critical vulnerabilities right now

Last updated: Today
1

SQL Anywhere Monitor (Non-GUI) baked credentials into the code,exposing the resources or functionality to unintended users and providing attackers with the possibility of arbitrary code execution.This

CVSS:10.0
EPSS:0.00%
Published:11/11/2025
2

The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credenti

CVSS:10.0
EPSS:0.00%
Published:11/11/2025
3

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full

CVSS:9.9
EPSS:0.00%
Published:11/11/2025
4

The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and incl

CVSS:9.8
EPSS:0.00%
Published:11/11/2025
5

The EasyCommerce – AI-Powered, Fast & Beautiful WordPress Ecommerce Plugin plugin for WordPress is vulnerable to Privilege Escalation in versions 0.9.0-beta2 to 1.5.0. This is due to the /easycommerce

CVSS:9.8
EPSS:0.00%
Published:11/11/2025
6

The Holiday class post calendar plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.1 via the 'contents' parameter. This is due to a lack of sanitizatio

CVSS:9.8
EPSS:0.00%
Published:11/11/2025
7

Photo Station 5.4.1 & 5.2.7 include the security fix for the vulnerability related to the XMR mining programs identified by internal research.

CVSS:9.8
EPSS:0.00%
Published:11/11/2025
8

The Mementor Core plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.2.5. This is due to plugin not properly handling the user switch back function. Thi

CVSS:8.8
EPSS:0.00%
Published:11/11/2025
9

The Elastic Theme Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a dynamic code generation feature in the process_theme function in all versions up to, and including, 0.0.3

CVSS:8.8
EPSS:0.00%
Published:11/11/2025
10

The WP Go Maps (formerly WP Google Maps) WordPress plugin before 9.0.48 does not sanitize user input provided via an AJAX action, allowing unauthenticated users to store XSS payloads which are later r

CVSS:8.8
EPSS:0.00%
Published:11/11/2025

ThreatInsights Threat Analysis Reports

Premium ThreatInsights Content

Locked

Exclusive Professional Reports

Deep-dive analysis and curated intelligence from security experts

Visit ThreatInsights

Community Submissions

Pro Feature - Submit Intelligence

Locked

Premium Intelligence Sharing

Contribute and share threat intelligence with the community

Visit ThreatInsights