Dark | Light
# ![@transilienceai Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1771287613481132032.png) @transilienceai transilienceai

transilienceai posts on X about cybersecurity, more info, the latest, llm the most. They currently have [---] followers and [----] posts still getting attention that total [-----] engagements in the last [--] hours.

### Engagements: [-----] [#](/creator/twitter::1771287613481132032/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1771287613481132032/c:line/m:interactions.svg)

- [--] Week [-----] +75%
- [--] Month [------] -3.10%
- [--] Months [------] +27%
- [--] Year [-------] +24%

### Mentions: [--] [#](/creator/twitter::1771287613481132032/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1771287613481132032/c:line/m:posts_active.svg)

- [--] Months [-----] +7.20%
- [--] Year [-----] -34%

### Followers: [---] [#](/creator/twitter::1771287613481132032/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1771287613481132032/c:line/m:followers.svg)

- [--] Week [---] +1.30%
- [--] Month [---] +5.10%
- [--] Months [---] +37%
- [--] Year [---] +316%

### CreatorRank: [---------] [#](/creator/twitter::1771287613481132032/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1771287613481132032/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[currencies](/list/currencies)  [technology brands](/list/technology-brands)  [stocks](/list/stocks)  [finance](/list/finance)  [countries](/list/countries)  [social networks](/list/social-networks)  [cryptocurrencies](/list/cryptocurrencies)  [automotive brands](/list/automotive-brands)  [exchanges](/list/exchanges)  [travel destinations](/list/travel-destinations) 

**Social topic influence**
[cybersecurity](/topic/cybersecurity), [more info](/topic/more-info), [the latest](/topic/the-latest), [llm](/topic/llm) #694, [ai](/topic/ai), [microsoft](/topic/microsoft) #2471, [adobe](/topic/adobe) #1442, [ibm](/topic/ibm), [platform](/topic/platform), [github](/topic/github)

**Top accounts mentioned or mentioned by**
[@vulmonfeeds](/creator/undefined) [@iammuzaffar640](/creator/undefined) [@lmanchu](/creator/undefined) [@cvenew](/creator/undefined) [@komodosec](/creator/undefined) [@shashwat12304](/creator/undefined) [@huntermapping](/creator/undefined) [@ksg93rd](/creator/undefined) [@thehackerwire](/creator/undefined) [@vulntracker](/creator/undefined) [@rkreddyp](/creator/undefined) [@bubleqe](/creator/undefined) [@grok](/creator/undefined) [@threatsynop](/creator/undefined) [@mastermike88](/creator/undefined) [@pdnuclei](/creator/undefined) [@cybero51nt](/creator/undefined) [@vanisleinvestor](/creator/undefined) [@offseq](/creator/undefined) [@ingstructool](/creator/undefined)

**Top assets mentioned**
[Microsoft Corp. (MSFT)](/topic/microsoft) [IBM (IBM)](/topic/ibm) [Alphabet Inc Class A (GOOGL)](/topic/$googl) [Cenovus Energy Inc. (CVE)](/topic/$cve) [Broadcom, Inc. (AVGO)](/topic/broadcom) [Suncor Energy, Inc. (SU)](/topic/$su) [Cloudflare, Inc. (NET)](/topic/cloudflare) [Dell Technologies, Inc. (DELL)](/topic/dell) [QUALCOMM, Inc. (QCOM)](/topic/qualcomm) [Fortinet Inc (FTNT)](/topic/fortinet) [Bitcoin (BTC)](/topic/bitcoin) [Crowdstrike Holdings Inc (CRWD)](/topic/crowdstrike) [Jupiter (JUP)](/topic/jupiter)
### Top Social Posts
Top posts by engagements in the last [--] hours

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-11 Threats on Products and CVEs CVE-2024-2883 is a critical vulnerability in ANGLE affecting Google Chrome and Microsoft Edge. Learn how to protect your systems: https://blog.morphisec.com/cve-2024-2883 https://blog.morphisec.com/cve-2024-2883"  
[X Link](https://x.com/transilienceai/status/1789392642507202776)  2024-05-11T20:30Z [--] followers, [--] engagements


"Active CVEs targeted: CVE-2021-27876 CVE-2024-2883 CVE-2023-23397 CVE-2024-1313 CVE-2024-3094 CVE-2024-4671 CVE-2024-23204 CVE-2024-21412 CVE-2024-31497 CVE-2024-21793 CVE-2023-1389 CVE-2015-2051 CVE-2023-46805 CVE-2024-3400"  
[X Link](https://x.com/transilienceai/status/1789646747020447765)  2024-05-12T13:20Z [--] followers, [---] engagements


"Active CVE targets: Microsoft NATO/EU/US/UK LockBit Grafana XZ Utils Google Apple Trend Micro Apache PuTTY Chrome F5 TP-Link D-Link MITRE Palo Alto Cisco Mandiant LabHost Veriti Research. Stay updated on security"  
[X Link](https://x.com/transilienceai/status/1789646748853379564)  2024-05-12T13:20Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-12 Threats on Products and CVEs Apple's Shortcuts vulnerability CVE-2024-23204 poses increased info theft risks. Update now Details: https://www.bitdefender.com/blog/labs/details-on-apples-shortcuts-vulnerability-a-deep-dive-into-cve-2024-23204/ https://www.bitdefender.com/blog/labs/details-on-apples-shortcuts-vulnerability-a-deep-dive-into-cve-2024-23204/"  
[X Link](https://x.com/transilienceai/status/1789646750149427439)  2024-05-12T13:20Z [--] followers, [--] engagements


"Threat Actor Trends LockBitSupp breaches Europol's web portal no data stolen. Full story: https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/ https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/"  
[X Link](https://x.com/transilienceai/status/1789646753467117607)  2024-05-12T13:20Z [--] followers, [--] engagements


"Threat TTP Patterns Cyber operations escalate in the Middle East targeting Israel. More on the cyber conflict: https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target"  
[X Link](https://x.com/transilienceai/status/1789646755375563241)  2024-05-12T13:20Z [--] followers, [--] engagements


"Active CVEs targeted: CVE-2024-2883 CVE-2023-23397 CVE-2024-26026 CVE-2024-4671 CVE-2024-1234 CVE-2023-46805 CVE-2024-3400 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1790326120534905108)  2024-05-14T10:19Z [--] followers, [--] engagements


"Active CVE targets: NVD SentinelOne F5 Google macOS devices by NK APTs MITRE Corp Palo Alto Networks Cisco Microsoft Mandiant LabHost Cisco Systems Veriti Research. Stay alert"  
[X Link](https://x.com/transilienceai/status/1790326121751277612)  2024-05-14T10:19Z [--] followers, [--] engagements


""The following CVEs are being actively targeted: CVE-2024-2883 CVE-2023-23397 CVE-2024-26026 CVE-2024-4671 CVE-2023-46805 CVE-2024-3400 CVE-2024-20358 CVE-2023-1389 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396"  
[X Link](https://x.com/transilienceai/status/1790573067674292416)  2024-05-15T02:41Z [--] followers, [--] engagements


"The following CVEs are being actively targeted: CVE-2024-2883 CVE-2023-23397 CVE-2024-26026 CVE-2024-21793 CVE-2024-21412 CVE-2024-3094 CVE-2024-21388 CVE-2024-21338 CVE-2024-26304 CVE-2024-0001 CVE-2024-0002 CVE-2024-24576"  
[X Link](https://x.com/transilienceai/status/1790754236508078158)  2024-05-15T14:40Z [--] followers, [---] engagements


""Active CVE targets: ANGLE (Google Chrome Microsoft Edge) SentinelOne F5 Microsoft Uptycs Avast HPE Aruba Networking AhnLab SOC Prime Global orgs MITRE Corp Palo Alto Networks Cisco Various Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1790754237393051997)  2024-05-15T14:40Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-15 Threats on Products and CVEs 🚨 Check Point Research reveals Foxit PDF exploitation targeting Foxit Reader users. Stay safe More info: https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/ https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/"  
[X Link](https://x.com/transilienceai/status/1790754238278050191)  2024-05-15T14:40Z [--] followers, [--] engagements


"Threat Actor Trends State-sponsored hackers exploit Cisco zero-day vulnerabilities for espionage. Stay informed: https://thehackernews.com/2024/04/state-sponsored-hackers-exploit-two.html https://thehackernews.com/2024/04/state-sponsored-hackers-exploit-two.html"  
[X Link](https://x.com/transilienceai/status/1791116637736739162)  2024-05-16T14:40Z [--] followers, [--] engagements


"Threat TTP Patterns Cyber operations intensify in the Middle East with Israel as the main target. Read more: https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target"  
[X Link](https://x.com/transilienceai/status/1791116638898573663)  2024-05-16T14:40Z [--] followers, [--] engagements


"Threat TTP Patterns Taylor Swift fans targeted by ticket scams. Stay vigilant More info: https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams"  
[X Link](https://x.com/transilienceai/status/1791132545704235376)  2024-05-16T15:44Z [--] followers, [--] engagements


"'Actively targeted CVEs:' 'CVE-2024-30044' 'CVE-2021-44228' 'CVE-2024-001' 'CVE-2024-21338' 'CVE-2024-3400' 'CVE-2024-30051' 'CVE-2024-4761' 'CVE-2024-9999' 'CVE-2024-8888' 'CVE-2024-7777' 'CVE-2023-46805' 'CVE-2024-20358'"  
[X Link](https://x.com/transilienceai/status/1791136088460775534)  2024-05-16T15:58Z [--] followers, [---] engagements


""Actively targeted CVEs: CVE-2024-30044 CVE-2021-44228 CVE-2024-001 CVE-2024-21338 CVE-2024-3400 CVE-2024-30051 CVE-2024-4761 CVE-2024-9999 CVE-2024-8888 CVE-2024-7777 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1791297816301850711)  2024-05-17T02:40Z [--] followers, [---] engagements


"Threat Actor Trends Cyber Adversaries highlighted at RSAC [----]. New AI capabilities introduced by SentinelOne. Details: #RSAC2024 https://www.sentinelone.com/blog/rsac-2024-recap-advancing-the-power-of-possibility-through-community/ https://www.sentinelone.com/blog/rsac-2024-recap-advancing-the-power-of-possibility-through-community/"  
[X Link](https://x.com/transilienceai/status/1791297819988689286)  2024-05-17T02:40Z [--] followers, [--] engagements


"Threat TTP Patterns Ticket scams targeting Taylor Swift fans are on the rise. Stay safe More info: #CyberCrime https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams"  
[X Link](https://x.com/transilienceai/status/1791297820974272870)  2024-05-17T02:40Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-17 Threats on Products and CVEs A critical Atlassian flaw was exploited to deploy Cerber ransomware. Stay updated #CyberSecurity https://thehackernews.com/2024/04/critical-atlassian-flaw-exploited-to.html https://thehackernews.com/2024/04/critical-atlassian-flaw-exploited-to.html"  
[X Link](https://x.com/transilienceai/status/1791479013266849950)  2024-05-17T14:40Z [--] followers, [--] engagements


"Threats on Industries Banking Trojans like Metamorfo are on the rise targeting the banking sector. Stay vigilant #BankingSecurity https://www.forcepoint.com/blog/x-labs/exploring-metamorfo-banking-malware https://www.forcepoint.com/blog/x-labs/exploring-metamorfo-banking-malware"  
[X Link](https://x.com/transilienceai/status/1791479014529380642)  2024-05-17T14:40Z [--] followers, [--] engagements


"'Active CVEs: CVE-2024-3094 CVE-2024-21338 CVE-2024-3400 CVE-2024-4040 CVE-2015-2051 CVE-2023-1389 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396 CVE-2024-20359'"  
[X Link](https://x.com/transilienceai/status/1791528369353281780)  2024-05-17T17:57Z [--] followers, [--] engagements


"'Active CVEs targeting: XZ Utils XZ tools Avast SpiderLabs Palo Alto Networks Critical Infrastructure Orgs D-Link TP-Link MITRE Corp Cisco Microsoft Mandiant LabHost Veriti Research. Stay vigilant'"  
[X Link](https://x.com/transilienceai/status/1791528370368389443)  2024-05-17T17:57Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-17 Threats on Products and CVEs 🚨 New CVE-2024-21412 vulnerability found in LabHost Ensure your systems are patched to avoid exploitation. More info: https://www.trendmicro.com/en_us/research/24/d/labhost-takedown.html https://www.trendmicro.com/en_us/research/24/d/labhost-takedown.html"  
[X Link](https://x.com/transilienceai/status/1791528371387523319)  2024-05-17T17:57Z [--] followers, [--] engagements


"Threats on Industries Healthcare alert WebTPA data breach impacts [---] million insurance policyholders. Stay vigilant: https://www.bleepingcomputer.com/news/security/webtpa-data-breach-impacts-24-million-insurance-policyholders/ https://www.bleepingcomputer.com/news/security/webtpa-data-breach-impacts-24-million-insurance-policyholders/"  
[X Link](https://x.com/transilienceai/status/1791528372616429872)  2024-05-17T17:57Z [--] followers, [--] engagements


"Threat Actor Trends North Korean APT Kimsuky targets activists via Facebook Messenger malware. Details: https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/ https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/"  
[X Link](https://x.com/transilienceai/status/1791528373929304387)  2024-05-17T17:57Z [--] followers, [--] engagements


"Threats on Industries Generative AI is revolutionizing InsurTech by enhancing efficiency and automating claims. Learn more: https://thecyberexpress.com/generative-ai-impact-on-insurtech/ https://thecyberexpress.com/generative-ai-impact-on-insurtech/"  
[X Link](https://x.com/transilienceai/status/1792559402794311869)  2024-05-20T14:14Z [--] followers, [--] engagements


"Threat Actor Trends North Korean APT Kimsuky targets activists via fake Facebook accounts. Stay vigilant Details: https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/ https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/"  
[X Link](https://x.com/transilienceai/status/1792559404115542300)  2024-05-20T14:14Z [--] followers, [--] engagements


"Threat TTP Patterns Cyber operations intensify in the Middle East with Israel as the main target. Read more: https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target"  
[X Link](https://x.com/transilienceai/status/1792559405398896762)  2024-05-20T14:14Z [--] followers, [--] engagements


"'Active CVEs: CVE-2024-21412' 'CVE-2021-44228' 'CVE-2024-3094' 'CVE-2024-3400' 'CVE-2024-5678' 'CVE-2023-46805' 'CVE-2024-20358' 'CVE-2022-38028' 'CVE-2023-1389' 'CVE-2022-21587' 'CVE-2024-21887' 'CVE-2024-20353' 'CVE-2023-36396'"  
[X Link](https://x.com/transilienceai/status/1792740548119339515)  2024-05-21T02:13Z [--] followers, [--] engagements


""Active CVEs targeting: Microsoft Defender SmartScreen Aqua Security Public Sector MITRE Corporation Palo Alto Networks Cisco Microsoft Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1792740549041992011)  2024-05-21T02:13Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-21 Threats on Products and CVEs Critical vulnerability CVE-2024-3400 in Palo Alto Networks' products exposed. Stay updated https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html"  
[X Link](https://x.com/transilienceai/status/1792740549998321908)  2024-05-21T02:13Z [--] followers, [--] engagements


""Active CVEs: CVE-2024-3094 CVE-2021-44228 CVE-2024-21338 CVE-2024-3400 CVE-2024-4323 CVE-2024-30051 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1792921797303681381)  2024-05-21T14:14Z [--] followers, [--] engagements


""Active CVEs targeting: xz/liblzma (xz-utils) Avast Palo Alto Networks Fluent Bit Microsoft MITRE Corp Cisco Various Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1792921798897533170)  2024-05-21T14:14Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-21 Threats on Products and CVEs Hackers exploit Palo Alto Networks PAN-OS zero-day (CVE-2024-3400) to execute code with root privileges. Stay updated https://thehackernews.com/2024/04/hackers-deploy-python-backdoor-in-palo.html https://thehackernews.com/2024/04/hackers-deploy-python-backdoor-in-palo.html"  
[X Link](https://x.com/transilienceai/status/1792921800650723458)  2024-05-21T14:14Z [--] followers, [--] engagements


"Threats on Industries Ransomware and data breaches hit healthcare education and news sectors. Stay vigilant https://research.checkpoint.com/2024/20th-may-threat-intelligence-report/ https://research.checkpoint.com/2024/20th-may-threat-intelligence-report/"  
[X Link](https://x.com/transilienceai/status/1792921802370347380)  2024-05-21T14:14Z [--] followers, [--] engagements


"Threat Actor Trends Iranian threat actor Void Manticore targets Israel and Albania with data wipers. Details: https://thecyberexpress.com/void-manticore-iranian-threat-actor/ https://thecyberexpress.com/void-manticore-iranian-threat-actor/"  
[X Link](https://x.com/transilienceai/status/1792921804228448288)  2024-05-21T14:14Z [--] followers, [--] engagements


"'Active CVEs: CVE-2024-1313 CVE-2024-3094 CVE-2024-21338 CVE-2024-30051 CVE-2023-38831 CVE-2024-3400 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1793102952678224039)  2024-05-22T02:13Z [--] followers, [--] engagements


""Active CVE targets: Grafana XZ Utils GitHub Avast Microsoft Israel-Hamas Palo Alto Networks Indian Govt MITRE Corp Cisco Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1793102953756102994)  2024-05-22T02:13Z [--] followers, [--] engagements


""Active CVEs: CVE-2024-21388 CVE-2024-21338 CVE-2023-43208 CVE-2023-46805 CVE-2024-3400 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396 CVE-2024-20359""  
[X Link](https://x.com/transilienceai/status/1793284134917247149)  2024-05-22T14:13Z [--] followers, [--] engagements


"'Earth Hundun' 'Microsoft Windows' 'XZ Utils' 'GitHub' 'Google' 'Palo Alto Networks' 'MITRE Corporation' 'Cisco' 'Mandiant' 'LabHost' 'Veriti Research' are being actively targeted with active CVE IDs. Stay vigilant"  
[X Link](https://x.com/transilienceai/status/1793646544056357353)  2024-05-23T14:13Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-23 Threats on Products and CVEs 🚨 New vulnerability in PuTTY SSH Client ECDSA NIST-P521 keys are compromised. Revoke them ASAP More info: https://thehackernews.com/2024/04/widely-used-putty-ssh-client-found.html https://thehackernews.com/2024/04/widely-used-putty-ssh-client-found.html"  
[X Link](https://x.com/transilienceai/status/1793646545142775918)  2024-05-23T14:13Z [--] followers, [--] engagements


""Active CVEs: CVE-2024-23897 CVE-2024-3094 CVE-2022-27518 CVE-2024-1708 CVE-2024-21338 CVE-2024-3400 CVE-2023-38831 CVE-2024-5678 CVE-2024-9101 CVE-2015-2051 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587"  
[X Link](https://x.com/transilienceai/status/1793827739524386916)  2024-05-24T02:13Z [--] followers, [--] engagements


""Active CVEs targeting: Jenkins Uptycs XZ Utils Microsoft RedHat Google Palo Alto Networks Cisco Mandiant MITRE D-Link Avast Public Sector Israel South Korea North Korea's RGB Veriti Research LabHost.""  
[X Link](https://x.com/transilienceai/status/1793827740648427656)  2024-05-24T02:13Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-24 Threats on Products and CVEs Critical vulnerability CVE-2024-3400 in Palo Alto Networks' products exposed Stay updated: https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html"  
[X Link](https://x.com/transilienceai/status/1793827741843812649)  2024-05-24T02:13Z [--] followers, [--] engagements


"'Active CVEs: CVE-2022-27518' 'CVE-2024-21338' 'CVE-2024-4323' 'CVE-2024-3400' 'CVE-2024-24576' 'CVE-2023-46805' 'CVE-2024-20358' 'CVE-2022-38028' 'CVE-2023-1389' 'CVE-2022-21587' 'CVE-2024-21887' 'CVE-2024-21412' 'CVE-2024-20353'"  
[X Link](https://x.com/transilienceai/status/1794114632203792663)  2024-05-24T21:13Z [--] followers, [--] engagements


""Active CVEs targeting: Cybersecurity Defenders Avast Palo Alto Networks South Korean Orgs MITRE Corp Cisco Microsoft Various Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1794114633290162652)  2024-05-24T21:13Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-24 Threats on Products and CVEs Critical vulnerability CVE-2024-3400 in Palo Alto Networks' products exposed Stay updated: #CyberSecurity https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html"  
[X Link](https://x.com/transilienceai/status/1794114634468765968)  2024-05-24T21:13Z [--] followers, [--] engagements


"'Active CVEs: CVE-2024-30044 CVE-2024-2883 CVE-2024-3400 CVE-2024-4835 CVE-2024-5274 CVE-2024-21338 CVE-2024-5678 CVE-2024-9101 CVE-2023-38831 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887"  
[X Link](https://x.com/transilienceai/status/1794518974836748675)  2024-05-26T00:00Z [--] followers, [--] engagements


""Active CVEs targeting: Microsoft Morphisec Unit [--] GitLab Google Chrome Users Avast Palo Alto Networks Apache Tomcat Servers Google MITRE Corporation Cisco Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1794518976065630663)  2024-05-26T00:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-26 Threats on Products and CVEs Androxgh0st malware exploits CVE-2021-3129 & CVE-2024-1709 to deploy web shells on servers. Stay updated More info: https://www.hackread.com/androxgh0st-malware-servers-botnets-attacks/ https://www.hackread.com/androxgh0st-malware-servers-botnets-attacks/"  
[X Link](https://x.com/transilienceai/status/1794518977315475589)  2024-05-26T00:00Z [--] followers, [--] engagements


"'Active CVEs: CVE-2024-0011 CVE-2024-0012 CVE-2024-0013 CVE-2024-1708 CVE-2024-29849 CVE-2024-21338 CVE-2024-3400 CVE-2021-45046 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1794700163929473217)  2024-05-26T12:00Z [--] followers, [--] engagements


""Active CVEs: CVE-2024-30044 CVE-2024-3400 CVE-2024-4835 CVE-2024-3094 CVE-2024-21338 CVE-2024-5678 CVE-2023-38831 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1794881338752868807)  2024-05-27T00:00Z [--] followers, [---] engagements


""Active CVEs targeting: Microsoft Google Uptycs Avast Trustwave MITRE Corp Palo Alto Networks Cisco Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1794881339864285657)  2024-05-27T00:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-27 Threats on Products and CVEs 🚨 New CVEs CVE-2024-20353 & CVE-2024-20359 exploited in Cisco ASA devices Stay updated: https://www.darkreading.com/endpoint-security/cisco-zero-days-arcanedoor-cyberespionage-campaign https://www.darkreading.com/endpoint-security/cisco-zero-days-arcanedoor-cyberespionage-campaign"  
[X Link](https://x.com/transilienceai/status/1794881340946403642)  2024-05-27T00:00Z [--] followers, [--] engagements


""Active CVEs targeting: XZ Utils Microsoft North Koreas Reconnaissance General Bureau Public Sector Stark Industries Solutions Russian threat group COLDRIVER MITRE Palo Alto Networks Cisco Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1795062538465350080)  2024-05-27T12:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-27 Threats on Products and CVEs Critical vulnerability CVE-2024-4323 in Fluent Bit Update to versions above 3.0.3 to avoid potential RCE. More info: https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit"  
[X Link](https://x.com/transilienceai/status/1795062539375542455)  2024-05-27T12:00Z [--] followers, [--] engagements


"'Active CVEs: CVE-2024-3094 CVE-2024-21338 CVE-2024-3400 CVE-2024-20360 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396 CVE-2024-20359'"  
[X Link](https://x.com/transilienceai/status/1795243754821140707)  2024-05-28T00:00Z [--] followers, [--] engagements


""Active CVEs targeting: XZ Trojan Avast Palo Alto Networks Cisco MITRE Corporation Microsoft Various Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1795243755743887761)  2024-05-28T00:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-28 Threats on Products and CVEs 🚨 New critical vulnerability CVE-2024-4323 in Fluent Bit Affects versions 2.0.7-3.0.3. Patch now to avoid memory corruption risks. More info: https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit"  
[X Link](https://x.com/transilienceai/status/1795243756771512627)  2024-05-28T00:00Z [--] followers, [--] engagements


""Active CVEs targeting: GitLab Apple Veeam Backup xz-utils Fluent Bit Avast Palo Alto Networks Coinbase Cencora Check Point Sav-Rx GNOME Ivanti D-Link MITRE Cisco Microsoft Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1795425001782616419)  2024-05-28T12:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-28 Threats on Products and CVEs 🚨 New CVE-2024-3400 in PAN-OS exploited in the wild Critical flaw allows remote command execution. Patch now Details: https://thehackernews.com/2024/04/palo-alto-networks-discloses-more.html https://thehackernews.com/2024/04/palo-alto-networks-discloses-more.html"  
[X Link](https://x.com/transilienceai/status/1795425002969616443)  2024-05-28T12:00Z [--] followers, [--] engagements


"Threats on Industries 🌍 Cyber espionage campaign targets African and Caribbean governments. Sharp Dragon uses Cobalt Strike Beacon. Stay vigilant More info: https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/ https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/"  
[X Link](https://x.com/transilienceai/status/1795425004294979873)  2024-05-28T12:00Z [--] followers, [--] engagements


"Threat Actor Trends 🐉 Chinese threat actor Sharp Dragon targets African and Caribbean governments with Cobalt Strike Beacon. Full report: https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/ https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/"  
[X Link](https://x.com/transilienceai/status/1795425005813244391)  2024-05-28T12:00Z [--] followers, [--] engagements


"Threat TTP Patterns 🔍 UAE & Saudi Arabia's AI and nuclear investments attract cyber threats. Data security concerns rise. Read more: https://www.sentinelone.com/blog/pinnacleone-execbrief-the-digital-great-game-in-the-middle-east/ https://www.sentinelone.com/blog/pinnacleone-execbrief-the-digital-great-game-in-the-middle-east/"  
[X Link](https://x.com/transilienceai/status/1795425006991847478)  2024-05-28T12:00Z [--] followers, [--] engagements


"CVE-2024-2883 CVE-2024-4671 CVE-2024-1313 CVE-2024-23897 CVE-2022-54321 CVE-2024-3094 CVE-2024-29849 CVE-2024-3400 CVE-2023-1389 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1795606165981941852)  2024-05-29T00:00Z [--] followers, [--] engagements


""Active CVEs targeting: Morphisec Google Grafana Jenkins Cloudsek Uptycs Linux Veeam Backup Palo Alto Networks TP-Link MITRE Cisco Microsoft Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1795606167017988493)  2024-05-29T00:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-29 Threats on Products and CVEs New CVE-2023-0669 exploited by Sharp Dragon in cyber espionage campaign. Stay protected Details: https://research.checkpoint.com/2024/static-unpacking-for-the-widespread-nsis-based-malicious-packer-family/ https://research.checkpoint.com/2024/static-unpacking-for-the-widespread-nsis-based-malicious-packer-family/"  
[X Link](https://x.com/transilienceai/status/1795606168116904035)  2024-05-29T00:00Z [--] followers, [--] engagements


"Threats on Industries Tech alert Vulnerability in smart washing machines allows free cycles. Patch now More info: https://www.bitdefender.com/blog/hotforsecurity/millions-of-public-smart-washing-machines-let-anyone-run-washing-cycles-for-free-students-find/ https://www.bitdefender.com/blog/hotforsecurity/millions-of-public-smart-washing-machines-let-anyone-run-washing-cycles-for-free-students-find/"  
[X Link](https://x.com/transilienceai/status/1795606169651925377)  2024-05-29T00:00Z [--] followers, [--] engagements


""Active CVEs targeting: ANGLE Google Chrome Microsoft Edge Microsoft North Koreas Reconnaissance General Bureau Avast Nexus Repository Fortinet QNAP Palo Alto Networks D-Link Gartner MITRE Cisco Mandiant LabHost Veriti Research.""  
[X Link](https://x.com/transilienceai/status/1795787326943089016)  2024-05-29T12:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-29 Threats on Products and CVEs Check Point releases a fix for VPN vulnerability CVE-2024-1234. Ensure your systems are updated More info: https://thecyberexpress.com/preventing-malicious-access-check-point-vpn/ https://thecyberexpress.com/preventing-malicious-access-check-point-vpn/"  
[X Link](https://x.com/transilienceai/status/1795787328079761445)  2024-05-29T12:00Z [--] followers, [--] engagements


""Active CVEs: CVE-2023-39367 CVE-2023-0669 CVE-2024-23897 CVE-2024-3232 CVE-2017-11882 CVE-2024-0001 CVE-2024-0002 CVE-2023-38831 CVE-2024-3400 CVE-2024-3273 CVE-2022-22965 CVE-2015-2051 CVE-2023-46805 CVE-2024-20358"  
[X Link](https://x.com/transilienceai/status/1795968514798256175)  2024-05-30T00:00Z [--] followers, [--] engagements


"'Active CVEs: CVE-2023-0669 CVE-2024-2883 CVE-2024-21412 CVE-2024-21388 CVE-2024-4323 CVE-2024-3400 CVE-2023-38831 CVE-2024-3273 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1796149724413620314)  2024-05-30T12:00Z [--] followers, [--] engagements


"CVE-2023-39367"  
[X Link](https://x.com/transilienceai/status/1796241330726715845)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2023-0669"  
[X Link](https://x.com/transilienceai/status/1796241334019240307)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-3400"  
[X Link](https://x.com/transilienceai/status/1796241336586170699)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-23897"  
[X Link](https://x.com/transilienceai/status/1796241340260339879)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2017-11882"  
[X Link](https://x.com/transilienceai/status/1796241343049597346)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2023-38831"  
[X Link](https://x.com/transilienceai/status/1796241346992255055)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-3273"  
[X Link](https://x.com/transilienceai/status/1796241349907202382)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-1234"  
[X Link](https://x.com/transilienceai/status/1796241353661096219)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2022-22965"  
[X Link](https://x.com/transilienceai/status/1796241356362289339)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2015-2051"  
[X Link](https://x.com/transilienceai/status/1796241360267231714)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2023-46805"  
[X Link](https://x.com/transilienceai/status/1796241362859311149)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-20358"  
[X Link](https://x.com/transilienceai/status/1796241366638370975)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2022-38028"  
[X Link](https://x.com/transilienceai/status/1796241369503039739)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1796241373395341588)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2022-21587"  
[X Link](https://x.com/transilienceai/status/1796241375853265229)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-21887"  
[X Link](https://x.com/transilienceai/status/1796241378973757912)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1796241382362812839)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1796241385579798899)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2023-36396"  
[X Link](https://x.com/transilienceai/status/1796241388704550978)  2024-05-30T18:04Z [--] followers, [--] engagements


"CVE-2024-20359"  
[X Link](https://x.com/transilienceai/status/1796241391376298085)  2024-05-30T18:04Z [--] followers, [--] engagements


""Active CVEs targeting: NSIS-based Malicious Packer Family Tibetans Ukrainian speakers Uptycs Microsoft Veeam Backup Enterprise Manager Avast Palo Alto Networks SOC Prime Ghost Security Abstract Security FortiGuard Labs MITRE Cisco"  
[X Link](https://x.com/transilienceai/status/1796330893981721033)  2024-05-31T00:00Z [--] followers, [--] engagements


"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-31 Threats on Products and CVEs Fortinet FortiSIEM vulnerabilities expose systems to remote code execution. Apply patches now #CyberSecurity https://thecyberexpress.com/fortinet-fortisiem-vulnerability/ https://thecyberexpress.com/fortinet-fortisiem-vulnerability/"  
[X Link](https://x.com/transilienceai/status/1796330894937956765)  2024-05-31T00:00Z [--] followers, [--] engagements


"CISA advisory - CVE-2024-1275 https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-151-02 https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-151-02"  
[X Link](https://x.com/transilienceai/status/1796492488800383283)  2024-05-31T10:42Z [--] followers, [--] engagements


"CISA Advisory - CVE-2024-36080 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-04 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-04"  
[X Link](https://x.com/transilienceai/status/1796492655893103081)  2024-05-31T10:43Z [--] followers, [--] engagements


"CISA Advisory - CVE-2023-31468 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03"  
[X Link](https://x.com/transilienceai/status/1796492863087460498)  2024-05-31T10:44Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-2883"  
[X Link](https://x.com/transilienceai/status/1797813593083183278)  2024-06-04T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23108"  
[X Link](https://x.com/transilienceai/status/1797813595171930493)  2024-06-04T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"  
[X Link](https://x.com/transilienceai/status/1797813597038363093)  2024-06-04T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1708"  
[X Link](https://x.com/transilienceai/status/1797813599307432203)  2024-06-04T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"  
[X Link](https://x.com/transilienceai/status/1797813602436464761)  2024-06-04T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"  
[X Link](https://x.com/transilienceai/status/1797813604311343525)  2024-06-04T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"  
[X Link](https://x.com/transilienceai/status/1797813607947768020)  2024-06-04T02:12Z [--] followers, [--] engagements


"@attritionorg a human needs to vet in the end but it is saving us the initial hours of research. many roadmap items to make it better"  
[X Link](https://x.com/transilienceai/status/1797950977561305257)  2024-06-04T11:18Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"  
[X Link](https://x.com/transilienceai/status/1798176018131522030)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-6448"  
[X Link](https://x.com/transilienceai/status/1798176019985436696)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3094"  
[X Link](https://x.com/transilienceai/status/1798176021751140480)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"  
[X Link](https://x.com/transilienceai/status/1798176023479300442)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1798176025286934970)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2017-11882"  
[X Link](https://x.com/transilienceai/status/1798176027157704704)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"  
[X Link](https://x.com/transilienceai/status/1798176028961202560)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1086"  
[X Link](https://x.com/transilienceai/status/1798176030802555232)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"  
[X Link](https://x.com/transilienceai/status/1798176032597631200)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"  
[X Link](https://x.com/transilienceai/status/1798176034405396853)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1798176036137627908)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2015-2051"  
[X Link](https://x.com/transilienceai/status/1798176037840601106)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"  
[X Link](https://x.com/transilienceai/status/1798176039543476678)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"  
[X Link](https://x.com/transilienceai/status/1798176041296621765)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"  
[X Link](https://x.com/transilienceai/status/1798176043104395667)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"  
[X Link](https://x.com/transilienceai/status/1798176044920480083)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"  
[X Link](https://x.com/transilienceai/status/1798176046677954887)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"  
[X Link](https://x.com/transilienceai/status/1798176048460488986)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1798176050201190629)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"  
[X Link](https://x.com/transilienceai/status/1798176051987882358)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"  
[X Link](https://x.com/transilienceai/status/1798176053711761451)  2024-06-05T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"  
[X Link](https://x.com/transilienceai/status/1798538302481650176)  2024-06-06T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-6448"  
[X Link](https://x.com/transilienceai/status/1798538304738197591)  2024-06-06T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-2883"  
[X Link](https://x.com/transilienceai/status/1798538306629799997)  2024-06-06T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1708"  
[X Link](https://x.com/transilienceai/status/1798538309766881322)  2024-06-06T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2021-44228"  
[X Link](https://x.com/transilienceai/status/1798538311327486099)  2024-06-06T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"  
[X Link](https://x.com/transilienceai/status/1798538313336607030)  2024-06-06T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-2883"  
[X Link](https://x.com/transilienceai/status/1798900687709049107)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"  
[X Link](https://x.com/transilienceai/status/1798900690104070611)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23897"  
[X Link](https://x.com/transilienceai/status/1798900692062716207)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2017-11882"  
[X Link](https://x.com/transilienceai/status/1798900694323462153)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"  
[X Link](https://x.com/transilienceai/status/1798900696298971363)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2021-44228"  
[X Link](https://x.com/transilienceai/status/1798900698110886355)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"  
[X Link](https://x.com/transilienceai/status/1798900700421775662)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"  
[X Link](https://x.com/transilienceai/status/1798900702615654406)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"  
[X Link](https://x.com/transilienceai/status/1798900705077690601)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"  
[X Link](https://x.com/transilienceai/status/1798900707090674109)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"  
[X Link](https://x.com/transilienceai/status/1798900708823142425)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"  
[X Link](https://x.com/transilienceai/status/1798900710953955826)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1798900712815874269)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"  
[X Link](https://x.com/transilienceai/status/1798900715085046170)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"  
[X Link](https://x.com/transilienceai/status/1798900716880412926)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1798900718784651730)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1798900721024389268)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"  
[X Link](https://x.com/transilienceai/status/1798900722920308780)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"  
[X Link](https://x.com/transilienceai/status/1798900724723573092)  2024-06-07T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36845"  
[X Link](https://x.com/transilienceai/status/1799263074555203882)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"  
[X Link](https://x.com/transilienceai/status/1799263076035813384)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-27198"  
[X Link](https://x.com/transilienceai/status/1799263077390508138)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21388"  
[X Link](https://x.com/transilienceai/status/1799263080372646385)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"  
[X Link](https://x.com/transilienceai/status/1799263082394403223)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"  
[X Link](https://x.com/transilienceai/status/1799263084143362089)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"  
[X Link](https://x.com/transilienceai/status/1799263085699416243)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"  
[X Link](https://x.com/transilienceai/status/1799263087213563949)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"  
[X Link](https://x.com/transilienceai/status/1799263089134580066)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1799263090673938487)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"  
[X Link](https://x.com/transilienceai/status/1799263092355875203)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1799263094385860745)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1799263096466243882)  2024-06-08T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-49606"  
[X Link](https://x.com/transilienceai/status/1799444421878182308)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3094"  
[X Link](https://x.com/transilienceai/status/1799444424008913090)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"  
[X Link](https://x.com/transilienceai/status/1799444426194100469)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2017-11882"  
[X Link](https://x.com/transilienceai/status/1799444428400263648)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1708"  
[X Link](https://x.com/transilienceai/status/1799444430342308283)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"  
[X Link](https://x.com/transilienceai/status/1799444432380678415)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2018-20062"  
[X Link](https://x.com/transilienceai/status/1799444434423275969)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2019-9082"  
[X Link](https://x.com/transilienceai/status/1799444436495257808)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-33246"  
[X Link](https://x.com/transilienceai/status/1799444438542106686)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"  
[X Link](https://x.com/transilienceai/status/1799444440588980597)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"  
[X Link](https://x.com/transilienceai/status/1799444442728022448)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"  
[X Link](https://x.com/transilienceai/status/1799444444925833340)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"  
[X Link](https://x.com/transilienceai/status/1799444447333364058)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"  
[X Link](https://x.com/transilienceai/status/1799444449468240044)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"  
[X Link](https://x.com/transilienceai/status/1799444451863187545)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1799444454040055953)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"  
[X Link](https://x.com/transilienceai/status/1799444456338506096)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"  
[X Link](https://x.com/transilienceai/status/1799444458699981080)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1799444460612538431)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1799444462692970589)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"  
[X Link](https://x.com/transilienceai/status/1799444464701940099)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"  
[X Link](https://x.com/transilienceai/status/1799444466895642671)  2024-06-08T14:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1799625487829926353)  2024-06-09T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"  
[X Link](https://x.com/transilienceai/status/1799625489553768601)  2024-06-09T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"  
[X Link](https://x.com/transilienceai/status/1799625491168596144)  2024-06-09T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"  
[X Link](https://x.com/transilienceai/status/1799625492942745822)  2024-06-09T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"  
[X Link](https://x.com/transilienceai/status/1799625494654025770)  2024-06-09T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"  
[X Link](https://x.com/transilienceai/status/1799625496574967850)  2024-06-09T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"  
[X Link](https://x.com/transilienceai/status/1799625498395287960)  2024-06-09T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2021-44228"  
[X Link](https://x.com/transilienceai/status/1799987853314703625)  2024-06-10T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"  
[X Link](https://x.com/transilienceai/status/1799987855051108715)  2024-06-10T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"  
[X Link](https://x.com/transilienceai/status/1799987856544280679)  2024-06-10T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"  
[X Link](https://x.com/transilienceai/status/1799987858234552700)  2024-06-10T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"  
[X Link](https://x.com/transilienceai/status/1799987859874615727)  2024-06-10T02:12Z [--] followers, [--] engagements


"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"  
[X Link](https://x.com/transilienceai/status/1799987861560689091)  2024-06-10T02:12Z [--] followers, [--] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@transilienceai Avatar @transilienceai transilienceai

transilienceai posts on X about cybersecurity, more info, the latest, llm the most. They currently have [---] followers and [----] posts still getting attention that total [-----] engagements in the last [--] hours.

Engagements: [-----] #

Engagements Line Chart

  • [--] Week [-----] +75%
  • [--] Month [------] -3.10%
  • [--] Months [------] +27%
  • [--] Year [-------] +24%

Mentions: [--] #

Mentions Line Chart

  • [--] Months [-----] +7.20%
  • [--] Year [-----] -34%

Followers: [---] #

Followers Line Chart

  • [--] Week [---] +1.30%
  • [--] Month [---] +5.10%
  • [--] Months [---] +37%
  • [--] Year [---] +316%

CreatorRank: [---------] #

CreatorRank Line Chart

Social Influence

Social category influence currencies technology brands stocks finance countries social networks cryptocurrencies automotive brands exchanges travel destinations

Social topic influence cybersecurity, more info, the latest, llm #694, ai, microsoft #2471, adobe #1442, ibm, platform, github

Top accounts mentioned or mentioned by @vulmonfeeds @iammuzaffar640 @lmanchu @cvenew @komodosec @shashwat12304 @huntermapping @ksg93rd @thehackerwire @vulntracker @rkreddyp @bubleqe @grok @threatsynop @mastermike88 @pdnuclei @cybero51nt @vanisleinvestor @offseq @ingstructool

Top assets mentioned Microsoft Corp. (MSFT) IBM (IBM) Alphabet Inc Class A (GOOGL) Cenovus Energy Inc. (CVE) Broadcom, Inc. (AVGO) Suncor Energy, Inc. (SU) Cloudflare, Inc. (NET) Dell Technologies, Inc. (DELL) QUALCOMM, Inc. (QCOM) Fortinet Inc (FTNT) Bitcoin (BTC) Crowdstrike Holdings Inc (CRWD) Jupiter (JUP)

Top Social Posts

Top posts by engagements in the last [--] hours

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-11 Threats on Products and CVEs CVE-2024-2883 is a critical vulnerability in ANGLE affecting Google Chrome and Microsoft Edge. Learn how to protect your systems: https://blog.morphisec.com/cve-2024-2883 https://blog.morphisec.com/cve-2024-2883"
X Link 2024-05-11T20:30Z [--] followers, [--] engagements

"Active CVEs targeted: CVE-2021-27876 CVE-2024-2883 CVE-2023-23397 CVE-2024-1313 CVE-2024-3094 CVE-2024-4671 CVE-2024-23204 CVE-2024-21412 CVE-2024-31497 CVE-2024-21793 CVE-2023-1389 CVE-2015-2051 CVE-2023-46805 CVE-2024-3400"
X Link 2024-05-12T13:20Z [--] followers, [---] engagements

"Active CVE targets: Microsoft NATO/EU/US/UK LockBit Grafana XZ Utils Google Apple Trend Micro Apache PuTTY Chrome F5 TP-Link D-Link MITRE Palo Alto Cisco Mandiant LabHost Veriti Research. Stay updated on security"
X Link 2024-05-12T13:20Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-12 Threats on Products and CVEs Apple's Shortcuts vulnerability CVE-2024-23204 poses increased info theft risks. Update now Details: https://www.bitdefender.com/blog/labs/details-on-apples-shortcuts-vulnerability-a-deep-dive-into-cve-2024-23204/ https://www.bitdefender.com/blog/labs/details-on-apples-shortcuts-vulnerability-a-deep-dive-into-cve-2024-23204/"
X Link 2024-05-12T13:20Z [--] followers, [--] engagements

"Threat Actor Trends LockBitSupp breaches Europol's web portal no data stolen. Full story: https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/ https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/"
X Link 2024-05-12T13:20Z [--] followers, [--] engagements

"Threat TTP Patterns Cyber operations escalate in the Middle East targeting Israel. More on the cyber conflict: https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target"
X Link 2024-05-12T13:20Z [--] followers, [--] engagements

"Active CVEs targeted: CVE-2024-2883 CVE-2023-23397 CVE-2024-26026 CVE-2024-4671 CVE-2024-1234 CVE-2023-46805 CVE-2024-3400 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"
X Link 2024-05-14T10:19Z [--] followers, [--] engagements

"Active CVE targets: NVD SentinelOne F5 Google macOS devices by NK APTs MITRE Corp Palo Alto Networks Cisco Microsoft Mandiant LabHost Cisco Systems Veriti Research. Stay alert"
X Link 2024-05-14T10:19Z [--] followers, [--] engagements

""The following CVEs are being actively targeted: CVE-2024-2883 CVE-2023-23397 CVE-2024-26026 CVE-2024-4671 CVE-2023-46805 CVE-2024-3400 CVE-2024-20358 CVE-2023-1389 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396"
X Link 2024-05-15T02:41Z [--] followers, [--] engagements

"The following CVEs are being actively targeted: CVE-2024-2883 CVE-2023-23397 CVE-2024-26026 CVE-2024-21793 CVE-2024-21412 CVE-2024-3094 CVE-2024-21388 CVE-2024-21338 CVE-2024-26304 CVE-2024-0001 CVE-2024-0002 CVE-2024-24576"
X Link 2024-05-15T14:40Z [--] followers, [---] engagements

""Active CVE targets: ANGLE (Google Chrome Microsoft Edge) SentinelOne F5 Microsoft Uptycs Avast HPE Aruba Networking AhnLab SOC Prime Global orgs MITRE Corp Palo Alto Networks Cisco Various Mandiant LabHost Veriti Research.""
X Link 2024-05-15T14:40Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-15 Threats on Products and CVEs 🚨 Check Point Research reveals Foxit PDF exploitation targeting Foxit Reader users. Stay safe More info: https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/ https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/"
X Link 2024-05-15T14:40Z [--] followers, [--] engagements

"Threat Actor Trends State-sponsored hackers exploit Cisco zero-day vulnerabilities for espionage. Stay informed: https://thehackernews.com/2024/04/state-sponsored-hackers-exploit-two.html https://thehackernews.com/2024/04/state-sponsored-hackers-exploit-two.html"
X Link 2024-05-16T14:40Z [--] followers, [--] engagements

"Threat TTP Patterns Cyber operations intensify in the Middle East with Israel as the main target. Read more: https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target"
X Link 2024-05-16T14:40Z [--] followers, [--] engagements

"Threat TTP Patterns Taylor Swift fans targeted by ticket scams. Stay vigilant More info: https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams"
X Link 2024-05-16T15:44Z [--] followers, [--] engagements

"'Actively targeted CVEs:' 'CVE-2024-30044' 'CVE-2021-44228' 'CVE-2024-001' 'CVE-2024-21338' 'CVE-2024-3400' 'CVE-2024-30051' 'CVE-2024-4761' 'CVE-2024-9999' 'CVE-2024-8888' 'CVE-2024-7777' 'CVE-2023-46805' 'CVE-2024-20358'"
X Link 2024-05-16T15:58Z [--] followers, [---] engagements

""Actively targeted CVEs: CVE-2024-30044 CVE-2021-44228 CVE-2024-001 CVE-2024-21338 CVE-2024-3400 CVE-2024-30051 CVE-2024-4761 CVE-2024-9999 CVE-2024-8888 CVE-2024-7777 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389"
X Link 2024-05-17T02:40Z [--] followers, [---] engagements

"Threat Actor Trends Cyber Adversaries highlighted at RSAC [----]. New AI capabilities introduced by SentinelOne. Details: #RSAC2024 https://www.sentinelone.com/blog/rsac-2024-recap-advancing-the-power-of-possibility-through-community/ https://www.sentinelone.com/blog/rsac-2024-recap-advancing-the-power-of-possibility-through-community/"
X Link 2024-05-17T02:40Z [--] followers, [--] engagements

"Threat TTP Patterns Ticket scams targeting Taylor Swift fans are on the rise. Stay safe More info: #CyberCrime https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams https://www.malwarebytes.com/blog/news/2024/05/desperate-taylor-swift-fans-defrauded-by-ticket-scams"
X Link 2024-05-17T02:40Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-17 Threats on Products and CVEs A critical Atlassian flaw was exploited to deploy Cerber ransomware. Stay updated #CyberSecurity https://thehackernews.com/2024/04/critical-atlassian-flaw-exploited-to.html https://thehackernews.com/2024/04/critical-atlassian-flaw-exploited-to.html"
X Link 2024-05-17T14:40Z [--] followers, [--] engagements

"Threats on Industries Banking Trojans like Metamorfo are on the rise targeting the banking sector. Stay vigilant #BankingSecurity https://www.forcepoint.com/blog/x-labs/exploring-metamorfo-banking-malware https://www.forcepoint.com/blog/x-labs/exploring-metamorfo-banking-malware"
X Link 2024-05-17T14:40Z [--] followers, [--] engagements

"'Active CVEs: CVE-2024-3094 CVE-2024-21338 CVE-2024-3400 CVE-2024-4040 CVE-2015-2051 CVE-2023-1389 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396 CVE-2024-20359'"
X Link 2024-05-17T17:57Z [--] followers, [--] engagements

"'Active CVEs targeting: XZ Utils XZ tools Avast SpiderLabs Palo Alto Networks Critical Infrastructure Orgs D-Link TP-Link MITRE Corp Cisco Microsoft Mandiant LabHost Veriti Research. Stay vigilant'"
X Link 2024-05-17T17:57Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-17 Threats on Products and CVEs 🚨 New CVE-2024-21412 vulnerability found in LabHost Ensure your systems are patched to avoid exploitation. More info: https://www.trendmicro.com/en_us/research/24/d/labhost-takedown.html https://www.trendmicro.com/en_us/research/24/d/labhost-takedown.html"
X Link 2024-05-17T17:57Z [--] followers, [--] engagements

"Threats on Industries Healthcare alert WebTPA data breach impacts [---] million insurance policyholders. Stay vigilant: https://www.bleepingcomputer.com/news/security/webtpa-data-breach-impacts-24-million-insurance-policyholders/ https://www.bleepingcomputer.com/news/security/webtpa-data-breach-impacts-24-million-insurance-policyholders/"
X Link 2024-05-17T17:57Z [--] followers, [--] engagements

"Threat Actor Trends North Korean APT Kimsuky targets activists via Facebook Messenger malware. Details: https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/ https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/"
X Link 2024-05-17T17:57Z [--] followers, [--] engagements

"Threats on Industries Generative AI is revolutionizing InsurTech by enhancing efficiency and automating claims. Learn more: https://thecyberexpress.com/generative-ai-impact-on-insurtech/ https://thecyberexpress.com/generative-ai-impact-on-insurtech/"
X Link 2024-05-20T14:14Z [--] followers, [--] engagements

"Threat Actor Trends North Korean APT Kimsuky targets activists via fake Facebook accounts. Stay vigilant Details: https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/ https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-5/"
X Link 2024-05-20T14:14Z [--] followers, [--] engagements

"Threat TTP Patterns Cyber operations intensify in the Middle East with Israel as the main target. Read more: https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target"
X Link 2024-05-20T14:14Z [--] followers, [--] engagements

"'Active CVEs: CVE-2024-21412' 'CVE-2021-44228' 'CVE-2024-3094' 'CVE-2024-3400' 'CVE-2024-5678' 'CVE-2023-46805' 'CVE-2024-20358' 'CVE-2022-38028' 'CVE-2023-1389' 'CVE-2022-21587' 'CVE-2024-21887' 'CVE-2024-20353' 'CVE-2023-36396'"
X Link 2024-05-21T02:13Z [--] followers, [--] engagements

""Active CVEs targeting: Microsoft Defender SmartScreen Aqua Security Public Sector MITRE Corporation Palo Alto Networks Cisco Microsoft Mandiant LabHost Veriti Research.""
X Link 2024-05-21T02:13Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-21 Threats on Products and CVEs Critical vulnerability CVE-2024-3400 in Palo Alto Networks' products exposed. Stay updated https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html"
X Link 2024-05-21T02:13Z [--] followers, [--] engagements

""Active CVEs: CVE-2024-3094 CVE-2021-44228 CVE-2024-21338 CVE-2024-3400 CVE-2024-4323 CVE-2024-30051 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"
X Link 2024-05-21T14:14Z [--] followers, [--] engagements

""Active CVEs targeting: xz/liblzma (xz-utils) Avast Palo Alto Networks Fluent Bit Microsoft MITRE Corp Cisco Various Mandiant LabHost Veriti Research.""
X Link 2024-05-21T14:14Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-21 Threats on Products and CVEs Hackers exploit Palo Alto Networks PAN-OS zero-day (CVE-2024-3400) to execute code with root privileges. Stay updated https://thehackernews.com/2024/04/hackers-deploy-python-backdoor-in-palo.html https://thehackernews.com/2024/04/hackers-deploy-python-backdoor-in-palo.html"
X Link 2024-05-21T14:14Z [--] followers, [--] engagements

"Threats on Industries Ransomware and data breaches hit healthcare education and news sectors. Stay vigilant https://research.checkpoint.com/2024/20th-may-threat-intelligence-report/ https://research.checkpoint.com/2024/20th-may-threat-intelligence-report/"
X Link 2024-05-21T14:14Z [--] followers, [--] engagements

"Threat Actor Trends Iranian threat actor Void Manticore targets Israel and Albania with data wipers. Details: https://thecyberexpress.com/void-manticore-iranian-threat-actor/ https://thecyberexpress.com/void-manticore-iranian-threat-actor/"
X Link 2024-05-21T14:14Z [--] followers, [--] engagements

"'Active CVEs: CVE-2024-1313 CVE-2024-3094 CVE-2024-21338 CVE-2024-30051 CVE-2023-38831 CVE-2024-3400 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"
X Link 2024-05-22T02:13Z [--] followers, [--] engagements

""Active CVE targets: Grafana XZ Utils GitHub Avast Microsoft Israel-Hamas Palo Alto Networks Indian Govt MITRE Corp Cisco Mandiant LabHost Veriti Research.""
X Link 2024-05-22T02:13Z [--] followers, [--] engagements

""Active CVEs: CVE-2024-21388 CVE-2024-21338 CVE-2023-43208 CVE-2023-46805 CVE-2024-3400 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396 CVE-2024-20359""
X Link 2024-05-22T14:13Z [--] followers, [--] engagements

"'Earth Hundun' 'Microsoft Windows' 'XZ Utils' 'GitHub' 'Google' 'Palo Alto Networks' 'MITRE Corporation' 'Cisco' 'Mandiant' 'LabHost' 'Veriti Research' are being actively targeted with active CVE IDs. Stay vigilant"
X Link 2024-05-23T14:13Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-23 Threats on Products and CVEs 🚨 New vulnerability in PuTTY SSH Client ECDSA NIST-P521 keys are compromised. Revoke them ASAP More info: https://thehackernews.com/2024/04/widely-used-putty-ssh-client-found.html https://thehackernews.com/2024/04/widely-used-putty-ssh-client-found.html"
X Link 2024-05-23T14:13Z [--] followers, [--] engagements

""Active CVEs: CVE-2024-23897 CVE-2024-3094 CVE-2022-27518 CVE-2024-1708 CVE-2024-21338 CVE-2024-3400 CVE-2023-38831 CVE-2024-5678 CVE-2024-9101 CVE-2015-2051 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587"
X Link 2024-05-24T02:13Z [--] followers, [--] engagements

""Active CVEs targeting: Jenkins Uptycs XZ Utils Microsoft RedHat Google Palo Alto Networks Cisco Mandiant MITRE D-Link Avast Public Sector Israel South Korea North Korea's RGB Veriti Research LabHost.""
X Link 2024-05-24T02:13Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-24 Threats on Products and CVEs Critical vulnerability CVE-2024-3400 in Palo Alto Networks' products exposed Stay updated: https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html"
X Link 2024-05-24T02:13Z [--] followers, [--] engagements

"'Active CVEs: CVE-2022-27518' 'CVE-2024-21338' 'CVE-2024-4323' 'CVE-2024-3400' 'CVE-2024-24576' 'CVE-2023-46805' 'CVE-2024-20358' 'CVE-2022-38028' 'CVE-2023-1389' 'CVE-2022-21587' 'CVE-2024-21887' 'CVE-2024-21412' 'CVE-2024-20353'"
X Link 2024-05-24T21:13Z [--] followers, [--] engagements

""Active CVEs targeting: Cybersecurity Defenders Avast Palo Alto Networks South Korean Orgs MITRE Corp Cisco Microsoft Various Mandiant LabHost Veriti Research.""
X Link 2024-05-24T21:13Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-24 Threats on Products and CVEs Critical vulnerability CVE-2024-3400 in Palo Alto Networks' products exposed Stay updated: #CyberSecurity https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html"
X Link 2024-05-24T21:13Z [--] followers, [--] engagements

"'Active CVEs: CVE-2024-30044 CVE-2024-2883 CVE-2024-3400 CVE-2024-4835 CVE-2024-5274 CVE-2024-21338 CVE-2024-5678 CVE-2024-9101 CVE-2023-38831 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887"
X Link 2024-05-26T00:00Z [--] followers, [--] engagements

""Active CVEs targeting: Microsoft Morphisec Unit [--] GitLab Google Chrome Users Avast Palo Alto Networks Apache Tomcat Servers Google MITRE Corporation Cisco Mandiant LabHost Veriti Research.""
X Link 2024-05-26T00:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-26 Threats on Products and CVEs Androxgh0st malware exploits CVE-2021-3129 & CVE-2024-1709 to deploy web shells on servers. Stay updated More info: https://www.hackread.com/androxgh0st-malware-servers-botnets-attacks/ https://www.hackread.com/androxgh0st-malware-servers-botnets-attacks/"
X Link 2024-05-26T00:00Z [--] followers, [--] engagements

"'Active CVEs: CVE-2024-0011 CVE-2024-0012 CVE-2024-0013 CVE-2024-1708 CVE-2024-29849 CVE-2024-21338 CVE-2024-3400 CVE-2021-45046 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412"
X Link 2024-05-26T12:00Z [--] followers, [--] engagements

""Active CVEs: CVE-2024-30044 CVE-2024-3400 CVE-2024-4835 CVE-2024-3094 CVE-2024-21338 CVE-2024-5678 CVE-2023-38831 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412"
X Link 2024-05-27T00:00Z [--] followers, [---] engagements

""Active CVEs targeting: Microsoft Google Uptycs Avast Trustwave MITRE Corp Palo Alto Networks Cisco Mandiant LabHost Veriti Research.""
X Link 2024-05-27T00:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-27 Threats on Products and CVEs 🚨 New CVEs CVE-2024-20353 & CVE-2024-20359 exploited in Cisco ASA devices Stay updated: https://www.darkreading.com/endpoint-security/cisco-zero-days-arcanedoor-cyberespionage-campaign https://www.darkreading.com/endpoint-security/cisco-zero-days-arcanedoor-cyberespionage-campaign"
X Link 2024-05-27T00:00Z [--] followers, [--] engagements

""Active CVEs targeting: XZ Utils Microsoft North Koreas Reconnaissance General Bureau Public Sector Stark Industries Solutions Russian threat group COLDRIVER MITRE Palo Alto Networks Cisco Mandiant LabHost Veriti Research.""
X Link 2024-05-27T12:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-27 Threats on Products and CVEs Critical vulnerability CVE-2024-4323 in Fluent Bit Update to versions above 3.0.3 to avoid potential RCE. More info: https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit"
X Link 2024-05-27T12:00Z [--] followers, [--] engagements

"'Active CVEs: CVE-2024-3094 CVE-2024-21338 CVE-2024-3400 CVE-2024-20360 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353 CVE-2023-36396 CVE-2024-20359'"
X Link 2024-05-28T00:00Z [--] followers, [--] engagements

""Active CVEs targeting: XZ Trojan Avast Palo Alto Networks Cisco MITRE Corporation Microsoft Various Mandiant LabHost Veriti Research.""
X Link 2024-05-28T00:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-28 Threats on Products and CVEs 🚨 New critical vulnerability CVE-2024-4323 in Fluent Bit Affects versions 2.0.7-3.0.3. Patch now to avoid memory corruption risks. More info: https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit https://blog.aquasec.com/linguistic-lumberjack-understanding-cve-2024-4323-in-fluent-bit"
X Link 2024-05-28T00:00Z [--] followers, [--] engagements

""Active CVEs targeting: GitLab Apple Veeam Backup xz-utils Fluent Bit Avast Palo Alto Networks Coinbase Cencora Check Point Sav-Rx GNOME Ivanti D-Link MITRE Cisco Microsoft Mandiant LabHost Veriti Research.""
X Link 2024-05-28T12:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-28 Threats on Products and CVEs 🚨 New CVE-2024-3400 in PAN-OS exploited in the wild Critical flaw allows remote command execution. Patch now Details: https://thehackernews.com/2024/04/palo-alto-networks-discloses-more.html https://thehackernews.com/2024/04/palo-alto-networks-discloses-more.html"
X Link 2024-05-28T12:00Z [--] followers, [--] engagements

"Threats on Industries 🌍 Cyber espionage campaign targets African and Caribbean governments. Sharp Dragon uses Cobalt Strike Beacon. Stay vigilant More info: https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/ https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/"
X Link 2024-05-28T12:00Z [--] followers, [--] engagements

"Threat Actor Trends 🐉 Chinese threat actor Sharp Dragon targets African and Caribbean governments with Cobalt Strike Beacon. Full report: https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/ https://research.checkpoint.com/2024/27th-may-threat-intelligence-report/"
X Link 2024-05-28T12:00Z [--] followers, [--] engagements

"Threat TTP Patterns 🔍 UAE & Saudi Arabia's AI and nuclear investments attract cyber threats. Data security concerns rise. Read more: https://www.sentinelone.com/blog/pinnacleone-execbrief-the-digital-great-game-in-the-middle-east/ https://www.sentinelone.com/blog/pinnacleone-execbrief-the-digital-great-game-in-the-middle-east/"
X Link 2024-05-28T12:00Z [--] followers, [--] engagements

"CVE-2024-2883 CVE-2024-4671 CVE-2024-1313 CVE-2024-23897 CVE-2022-54321 CVE-2024-3094 CVE-2024-29849 CVE-2024-3400 CVE-2023-1389 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2022-21587 CVE-2024-21887 CVE-2024-21412 CVE-2024-20353"
X Link 2024-05-29T00:00Z [--] followers, [--] engagements

""Active CVEs targeting: Morphisec Google Grafana Jenkins Cloudsek Uptycs Linux Veeam Backup Palo Alto Networks TP-Link MITRE Cisco Microsoft Mandiant LabHost Veriti Research.""
X Link 2024-05-29T00:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-29 Threats on Products and CVEs New CVE-2023-0669 exploited by Sharp Dragon in cyber espionage campaign. Stay protected Details: https://research.checkpoint.com/2024/static-unpacking-for-the-widespread-nsis-based-malicious-packer-family/ https://research.checkpoint.com/2024/static-unpacking-for-the-widespread-nsis-based-malicious-packer-family/"
X Link 2024-05-29T00:00Z [--] followers, [--] engagements

"Threats on Industries Tech alert Vulnerability in smart washing machines allows free cycles. Patch now More info: https://www.bitdefender.com/blog/hotforsecurity/millions-of-public-smart-washing-machines-let-anyone-run-washing-cycles-for-free-students-find/ https://www.bitdefender.com/blog/hotforsecurity/millions-of-public-smart-washing-machines-let-anyone-run-washing-cycles-for-free-students-find/"
X Link 2024-05-29T00:00Z [--] followers, [--] engagements

""Active CVEs targeting: ANGLE Google Chrome Microsoft Edge Microsoft North Koreas Reconnaissance General Bureau Avast Nexus Repository Fortinet QNAP Palo Alto Networks D-Link Gartner MITRE Cisco Mandiant LabHost Veriti Research.""
X Link 2024-05-29T12:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-29 Threats on Products and CVEs Check Point releases a fix for VPN vulnerability CVE-2024-1234. Ensure your systems are updated More info: https://thecyberexpress.com/preventing-malicious-access-check-point-vpn/ https://thecyberexpress.com/preventing-malicious-access-check-point-vpn/"
X Link 2024-05-29T12:00Z [--] followers, [--] engagements

""Active CVEs: CVE-2023-39367 CVE-2023-0669 CVE-2024-23897 CVE-2024-3232 CVE-2017-11882 CVE-2024-0001 CVE-2024-0002 CVE-2023-38831 CVE-2024-3400 CVE-2024-3273 CVE-2022-22965 CVE-2015-2051 CVE-2023-46805 CVE-2024-20358"
X Link 2024-05-30T00:00Z [--] followers, [--] engagements

"'Active CVEs: CVE-2023-0669 CVE-2024-2883 CVE-2024-21412 CVE-2024-21388 CVE-2024-4323 CVE-2024-3400 CVE-2023-38831 CVE-2024-3273 CVE-2023-46805 CVE-2024-20358 CVE-2022-38028 CVE-2023-1389 CVE-2022-21587 CVE-2024-21887 CVE-2024-20353"
X Link 2024-05-30T12:00Z [--] followers, [--] engagements

"CVE-2023-39367"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2023-0669"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-3400"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-23897"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2017-11882"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2023-38831"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-3273"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-1234"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2022-22965"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2015-2051"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2023-46805"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-20358"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2022-38028"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2023-1389"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2022-21587"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-21887"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-21412"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-20353"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2023-36396"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

"CVE-2024-20359"
X Link 2024-05-30T18:04Z [--] followers, [--] engagements

""Active CVEs targeting: NSIS-based Malicious Packer Family Tibetans Ukrainian speakers Uptycs Microsoft Veeam Backup Enterprise Manager Avast Palo Alto Networks SOC Prime Ghost Security Abstract Security FortiGuard Labs MITRE Cisco"
X Link 2024-05-31T00:00Z [--] followers, [--] engagements

"Threat Intelligence and Product Vulnerability Attack Trends - Date: 2024-05-31 Threats on Products and CVEs Fortinet FortiSIEM vulnerabilities expose systems to remote code execution. Apply patches now #CyberSecurity https://thecyberexpress.com/fortinet-fortisiem-vulnerability/ https://thecyberexpress.com/fortinet-fortisiem-vulnerability/"
X Link 2024-05-31T00:00Z [--] followers, [--] engagements

"CISA advisory - CVE-2024-1275 https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-151-02 https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-151-02"
X Link 2024-05-31T10:42Z [--] followers, [--] engagements

"CISA Advisory - CVE-2024-36080 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-04 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-04"
X Link 2024-05-31T10:43Z [--] followers, [--] engagements

"CISA Advisory - CVE-2023-31468 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03 https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03"
X Link 2024-05-31T10:44Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-2883"
X Link 2024-06-04T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23108"
X Link 2024-06-04T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"
X Link 2024-06-04T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1708"
X Link 2024-06-04T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"
X Link 2024-06-04T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"
X Link 2024-06-04T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"
X Link 2024-06-04T02:12Z [--] followers, [--] engagements

"@attritionorg a human needs to vet in the end but it is saving us the initial hours of research. many roadmap items to make it better"
X Link 2024-06-04T11:18Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-6448"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3094"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2017-11882"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1086"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2015-2051"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"
X Link 2024-06-05T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"
X Link 2024-06-06T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-6448"
X Link 2024-06-06T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-2883"
X Link 2024-06-06T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1708"
X Link 2024-06-06T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2021-44228"
X Link 2024-06-06T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"
X Link 2024-06-06T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-2883"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23897"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2017-11882"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2021-44228"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"
X Link 2024-06-07T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36845"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-27198"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21388"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-38831"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"
X Link 2024-06-08T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-49606"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3094"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-23204"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2017-11882"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1708"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21338"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2018-20062"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2019-9082"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-33246"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-3400"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-1234"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"
X Link 2024-06-08T14:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"
X Link 2024-06-09T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-21587"
X Link 2024-06-09T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21887"
X Link 2024-06-09T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-21412"
X Link 2024-06-09T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20353"
X Link 2024-06-09T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-36396"
X Link 2024-06-09T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20359"
X Link 2024-06-09T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2021-44228"
X Link 2024-06-10T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-46805"
X Link 2024-06-10T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-28847"
X Link 2024-06-10T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2024-20358"
X Link 2024-06-10T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2022-38028"
X Link 2024-06-10T02:12Z [--] followers, [--] engagements

"Actively exploited CVE ID source in the thread (generated not vetted) CVE-2023-1389"
X Link 2024-06-10T02:12Z [--] followers, [--] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@transilienceai
/creator/twitter::transilienceai