Intelligence · Updated daily

Security Intelligence

AI-analysed threats, vulnerabilities and campaigns. Not just what happened — what it means, who's affected, and what to do about it.

Priority

highVulnerabilityActive

IoT Administrative Credential Exposure: Factory Default and Weak Authentication Paradigm

IoT devices shipping with administrative credentials or defaulting to admin-level access create a persistent authentication bypass that enables complete device compromise. This represents a fundamental architectural failure in IoT security that affects entire device classes and is difficult to remediate post-deployment.

IoT devices (generic class), Smart home devices, Industrial IoT +1
criticalCampaignActive

INC Ransomware Expands Oceania Healthcare Targeting, Signals Regional Focus Shift

INC ransomware group is conducting sustained attacks against healthcare infrastructure across Australia, New Zealand, and Tonga, disrupting emergency services and government operations. This regional concentration indicates either a deliberate geographic pivot or emerging local infection vectors.

Australian Government Agencies, New Zealand Healthcare Facilities, Emergency Clinics (Oceania) +1
highCampaignActive

Social Engineering Campaign Targets Developer Credentials via Fake Recruitment – Supply Chain Risk Vector

Threat actors execute a sophisticated social engineering campaign impersonating recruiters from crypto and AI companies, delivering backdoors (OtterCookie, FlexibleFerret) through fake coding assessments to steal developer credentials, API tokens, and source code. This represents a high-impact supply chain attack vector targeting a critical workforce demographic.

Software developers, Crypto industry, AI/ML companies +1
criticalCampaignActive

State-Sponsored IoT Exploitation: Israeli Targeting of Iranian Critical Infrastructure via Traffic Camera Network

Israel allegedly exploited Iranian traffic camera systems to conduct surveillance and assist in targeted assassination of Iranian leadership. This demonstrates advanced state-actor capability to weaponize civilian IoT infrastructure for kinetic operations.

Iranian traffic camera network, IoT/CCTV infrastructure, Critical infrastructure (transportation)
criticalVulnerabilityEmerging

AirSnitch: Cross-Layer Wi-Fi Desynchronization Enables Full MitM Against All Network Scales

AirSnitch exploits fundamental layer 1-2 binding failures in Wi-Fi to perform bidirectional machine-in-the-middle attacks across home, office, and enterprise networks without requiring network membership or proximity constraints. The attack breaks core 802.11 assumptions about client identity synchronization.

Wi-Fi networks (802.11 standard), Home networks, Office networks +1
criticalVulnerabilityActive

Critical Vulnerabilities in Copeland XWEB Devices Enable Remote Code Execution

Multiple critical vulnerabilities in Copeland XWEB and XWEB Pro devices allow attackers to bypass authentication, cause denial-of-service, memory corruption, and execute arbitrary code, posing significant risks to affected systems.

CVE-2026-25085CVE-2026-21718CVE-2026-24663CVE-2026-21389CVE-2026-25111CVE-2026-20742CVE-2026-24517CVE-2026-25195CVE-2026-20910CVE-2026-24689CVE-2026-25109CVE-2026-20902CVE-2026-24695CVE-2026-25105CVE-2026-24452CVE-2026-23702CVE-2026-25721CVE-2026-20764CVE-2026-25196CVE-2026-25037CVE-2026-22877CVE-2026-20797CVE-2026-3037
Copeland XWEB 300D PRO <=1.12.1, Copeland XWEB 500D PRO <=1.12.1

All Intelligence

Stay ahead of threats

Subscribe to the Sebastion intelligence feed in your RSS reader of choice. New entries are published daily as our AI pipeline analyses security feeds and produces structured assessments.

Copy feed URL

Feed URL: sebastion.dev/intelligence/feed.xml