AI Threat Intelligence

Threat intelligence, automated.

AI-researched threat write-ups, live IOC feeds, and MITRE ATT&CK mappings — human-reviewed before every publish. Built for defenders.

Threats tracked
IOCs published
MITRE techniques
Last updated
Latest Report
INFOthreat

CVE-2026-41091: Microsoft Defender Link Following Vulnerability

CVE-2026-41091 is a high-severity local privilege escalation vulnerability affecting Microsoft Defender. An authorized attacker can exploit improper link resolution to gain elevated privileges on a compromised system. This vulnerability poses a significant risk to endpoint security, allowing attackers to bypass security controls and achieve SYSTEM-level access.

Read full report →
Recent Threats
INFOthreat

CVE-2026-45498: Microsoft Defender Denial of Service Vulnerability

CVE-2026-45498 describes an unspecified denial of service vulnerability in Microsoft Defender. This vulnerability has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, indicating a significant risk that requires prompt attention. Exploitation could lead to the disruption of endpoint protection services.

Read report →
INFOthreat

Grafana GitHub Breach: Stolen Token Led to Codebase Theft

Grafana Labs disclosed a security incident where a stolen GitHub access token was used to breach their GitHub environment. Attackers downloaded private source code repositories, prompting immediate token revocation and security enhancements. No customer data or production environments were affected.

Read report →
INFOthreat

Leaked Shai-Hulud Malware Fuels New npm Infostealer Campaign

The recently leaked Shai-Hulud infostealer malware is now being actively used in new campaigns targeting the Node Package Manager (npm) ecosystem. Threat actors are distributing malicious npm packages to compromise developer systems and exfiltrate sensitive data, posing a significant supply chain risk.

Read report →
INFOthreat

New Malware Libraries Drive Signature Updates and Evasion Challenges

The continuous development of new malware libraries and obfuscation techniques necessitates constant updates to security product signatures. Defenders must ensure their detection mechanisms are current to identify evolving threats that leverage these new components, challenging traditional static signature-based defenses. This ongoing evolution highlights the importance of behavioral analysis alongside signature updates.

Read report →
INFOthreat

Pwn2Own Berlin Day 2: Zero-Days Demonstrated in Microsoft Exchange, Windows 11, and RHEL

During Pwn2Own Berlin 2026 Day 2, researchers successfully exploited 15 unique zero-day vulnerabilities across multiple products. Key targets included Microsoft Exchange, Windows 11, and Red Hat Enterprise Linux for Workstations, demonstrating critical security flaws in these widely deployed systems.

Read report →
INFOthreat

CVE-2026-42897: Microsoft Exchange Server Cross-Site Scripting Vulnerability

A high-severity cross-site scripting (XSS) vulnerability, CVE-2026-42897, has been identified in Microsoft Exchange Server, including versions 2016 and 2019. This flaw allows an unauthenticated attacker to execute arbitrary JavaScript in a user’s browser context via Outlook Web Access when certain interaction conditions are met, leading to high impact on confidentiality and integrity. CISA has added this CVE to its Known Exploited Vulnerabilities Catalog.

Read report →
INFOthreat

CVE-2026-42208: Critical SQL Injection in BerriAI LiteLLM AI Gateway

A critical SQL injection vulnerability (CVE-2026-42208) affects BerriAI LiteLLM versions 1.81.16 to before 1.83.7. This flaw allows unauthenticated attackers to read and potentially modify the proxy’s database by sending a crafted Authorization header, leading to unauthorized access to managed credentials. The vulnerability is actively exploited and listed in CISA’s KEV catalog.

Read report →
INFOthreat

CVE-2026-6973: Remote Code Execution in Ivanti EPMM

CVE-2026-6973 is an improper input validation vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows a remotely authenticated administrative user to achieve remote code execution. This vulnerability affects specific versions of EPMM and has been added to CISA’s Known Exploited Vulnerabilities Catalog, indicating active exploitation.

Read report →

Transparently AI-authored

Every report on this site is researched and drafted by an AI agent, then reviewed and approved by a human analyst before publication. The Agent Logbook shows every step — sources consulted, enrichment calls, tokens used, and approval status — in real time.