Intelligence · Updated daily

Security Intelligence

AI-analysed threats, vulnerabilities and campaigns. Not just what happened — what it means, who's affected, and what to do about it.

Page 8 of 17

176–200 of 403
criticalPolicyActive

Microsoft Exchange Online servicewide outage reveals continued reliability concerns in critical communication infrastructure

Microsoft Exchange Online experienced a widespread outage blocking mailbox and calendar access for customers globally. This incident underscores the operational risks of cloud-based email dependencies and the cascading business impact when a single provider experiences infrastructure failures.

Microsoft Exchange Online, Microsoft 365 subscribers
criticalCampaignContained

Destructive Microsoft Entra-based attack on Stryker demonstrates cloud identity compromise as primary attack vector for device-level destruction

Stryker suffered a destructive cyberattack that remotely wiped tens of thousands of employee devices through compromised Microsoft cloud credentials, requiring no malware payload and leveraging legitimate administrative access to cloud infrastructure.

Stryker Corporation, Microsoft Entra (Azure AD), Intune or similar MDM platforms
informationalPolicyEmerging

Android 17 Accessibility API Restrictions: Proactive Defense Against Malware Abuse of System Privileges

Google is implementing API restrictions in Android 17 to prevent non-accessibility apps from abusing the accessibility services API, a common malware technique for achieving privileged operations without proper permissions. This is a preventive security hardening measure rather than a response to active exploitation.

Android 17, Android Advanced Protection Mode (AAPM)
criticalSupply ChainActive

GlassWorm Supply-Chain Escalation: Transitive Dependency Injection via Open VSX Registry

GlassWorm threat actors are exploiting extensionPack and extensionDependencies features in Open VSX to achieve transitive malware propagation across 72+ extensions, significantly improving attack efficiency and evading detection. This represents a watershed moment in IDE-based supply-chain attacks targeting developer environments.

Open VSX Registry, Visual Studio Code Community, Open VSX Extension Developers +1
highCampaignContained

Opportunistic Probing of Critical Infrastructure: Poland's Nuclear Research Centre Targeted in Broader Campaign

Poland's National Centre for Nuclear Research (NCBJ) was targeted by cyberattackers who attempted to compromise its IT infrastructure, but intrusion detection systems successfully identified and blocked the attack before any material impact occurred. This incident underscores persistent adversarial interest in critical infrastructure sectors, particularly those with strategic national importance.

National Centre for Nuclear Research (NCBJ), Polish Critical Infrastructure
criticalVulnerabilityActive

Parse Server OAuth2 Singleton State Leakage - Concurrent Provider Token Validation Bypass

Parse Server's OAuth2 adapter uses a shared singleton instance across multiple providers, allowing concurrent authentication requests to cause token validation confusion where one provider's token may be validated against another provider's policy, potentially leading to unauthorized access.

CVE-2026-32242
Parse Community/Parse Server (versions < 8.6.37 and < 9.6.0-alpha.11)