Threat Intelligence Dashboard
Real-time overview ·
analytics
Total Intel
2,989
update
Last 24h
+30
warning
Avg Risk
33
bug_report
CVEs in Feed
5
group_work
Actors
16 Active
health_metrics
Feed Health
94%
Threat Level Distribution
3 high-risk articles analysed
Critical
0%
High
0%
Medium
100%
Low
0%
Severity Breakdown
3
TOTAL
Intel by Category
8
TYPES
High-Risk Articles
View FeedLatest CVEs
STER uses unencrypted TCP traffic to transmit data over the network. It allows an attacker to conduct a Man-In-The-Middl
Use of a weak password encoding algorithm in STER software allows the value of the password to be guessed after analyzin
A SQL injection vulnerability has been identified in STER. Improper neutralization of input provided by user into multip