Commander carried out physical assault in Lashkar [7 sources]
30d signal volume
By Threat Layer
Top Signals(showing 50 of 255)
View all signals →Commander reported tensions with Cargo Ship in Bandar Abbas [10 sources]
Look up signals and intelligence for any entity
30d signal volume
A critical security vulnerability (CVE-2026-3854, CVSS 8.7) has been disclosed affecting GitHub.com and GitHub Enterprise Server. The flaw is a command injection issue allowing authenticated users with repository push access to achieve remote code execution through a single git push command.
CISA has added four newly exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog: CVE-2024-7399 (Samsung MagicINFO path traversal), CVE-2024-57726 (SimpleHelp missing authorization), CVE-2024-57728 (SimpleHelp path traversal), and CVE-2025-29635 (D-Link DIR-823X command injection). CISA urges all organizations to prioritize remediation of these vulnerabilities as part of vulnerability management practices to reduce exposure to active cyberattacks.
Bitwarden CLI, the command-line interface for the password manager Bitwarden, has been compromised as part of a newly discovered Checkmarx supply chain campaign. The affected package version is @bitwarden/cli@2026.4.0, with malicious code published in 'bw1.js,' according to findings from JFrog and Socket.
A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign. The threat actor is leveraging legitimate cloud services for command and control and data exfiltration while deploying custom malware to compromise target systems.
A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks targeting TrueConf video conferencing servers in Russia since September 2025, according to Positive Technologies research. The threat actors are leveraging an exploit chain of three vulnerabilities to execute remote commands on vulnerable systems.
A threat actor has established multiple command and control channels leveraging popular legitimate services including Microsoft Outlook, Slack, Discord, and file.io for conducting online espionage operations. This approach provides redundancy and makes detection more difficult.