Threat Intelligence Dashboard

Real-time overview ·

analytics

Total Intel

2,989

update

Last 24h

+30

warning

Avg Risk

33

bug_report

CVEs in Feed

5

group_work

Actors

16 Active

health_metrics

Feed Health

94%

Threat Level Distribution

3 high-risk articles analysed

Critical

0%

High

0%

Medium

100%

Low

0%

Severity Breakdown

3 TOTAL

Intel by Category

8 TYPES

High-Risk Articles

View Feed

Latest CVEs

STER uses unencrypted TCP traffic to transmit data over the network. It allows an attacker to conduct a Man-In-The-Middl

Use of a weak password encoding algorithm in STER software allows the value of the password to be guessed after analyzin

A SQL injection vulnerability has been identified in STER. Improper neutralization of input provided by user into multip

Recent Malware Samples

Last 24h · loading…

View all

Loading samples…