🚨 This week’s CrowdSec Threat Alert: CVE-2026-21859, a critical SSRF vulnerability in Mailpit, is being actively exploited to map internal networks and access sensitive infrastructure.

See how the exploit works, what targeted reconnaissance reveals, and why exposed dev tools can become high-impact entry points in our latest article 👉 https://crowdsec.net/vulntracking-report/cve-2026-21859

#CVE #CVE202621859 #threatalert #cybersecurity

CVE-2026-21859: Critical SSRF in Mailpit Exposes Internal Networks

CVE-2026-21859 is a critical SSRF vulnerability in Mailpit actively exploited in targeted attacks. Learn how it exposes internal networks.

🚨 This week’s CrowdSec Threat Alert: CVE-2025-14528, a remotely exploitable vulnerability in end-of-life D-Link DIR-803 routers, is exposing admin credentials and opening the door to botnet recruitment.

Discover how the exploit works, what early scanning activity reveals, and why legacy routers remain prime low-level cybercriminal targets in our latest article 👉 https://crowdsec.net/vulntracking-report/cve-2025-14528

#CVE #CVE202514528 #threatalert #cybersecurity

CVE-2025-14528: Watch Next Week’s Botnet Being Built on D-Link Routers

CVE-2025-14528 is a vulnerability in EoL D-Link routers. Learn why and how it is used to build botnets.

🚨 This week’s CrowdSec Threat Alert: CVE-2025-56520, an actively exploited SSRF vulnerability in Dify, is enabling reconnaissance and internal network probing across exposed AI platforms.

Discover attack patterns, momentum trends, and mitigation steps in our latest article 👉 https://crowdsec.net/vulntracking-report/cve-2025-56520

#CVE #CVE202556520 #threatalert #Dify #cybersecurity

Dify Under Attack: Unfixed CVE-2025-56520 Exploited in the Wild

CVE-2025-56520 is actively exploited in Dify, exposing AI platforms to SSRF-driven reconnaissance, internal scanning, and potential credential theft.

🚨 This week’s CrowdSec Threat Alert: CVE-2026-1281, a pre-auth RCE in Ivanti EPMM, is actively exploited in the wild, putting Enterprise Mobile Management at risk worldwide.

Discover attack details, threat trends, and actionable mitigation steps in our latest article 👉 https://crowdsec.net/vulntracking-report/cve-2026-1281

#CVE #CVE20261281 #RCE #threatalert #cybersecurity

CVE-2026-1281 in Ivanti EPMM: Confirmed In-the-Wild Exploitation

CVE-2026-1281 is an actively exploited RCE vulnerability in Ivanti EPMM. Learn how to detect, mitigate, and protect your infrastructure.

🚨 This week’s CrowdSec Threat Alert article highlights CVE-2025-68645 (LFI) and CVE-2022-27926 (XSS), actively exploited in the wild against Zimbra Collaboration servers.

Explore attack details, threat trends, and mitigation steps in the article 👉 https://www.crowdsec.net/vulntracking-report/zimbra-collaboration-coordinated-attack

#CVE #threatalert #cybersecurity

🚨 This week’s CrowdSec Threat Alert highlights CVE-2025-34291, a critical LangFlow RCE actively exploited in the wild.

👀 Security teams: patch your LangFlow instances and harden configurations to prevent account takeovers and full AI workflow compromise.

Explore the attack details, threat patterns, and mitigation steps in the latest article: https://www.crowdsec.net/vulntracking-report/cve-2025-34291

#CVE #CVE202534291 #RCE #LangFlow #ThreatAlert #cybersecurity

🚨 This week’s CrowdSec Threat Alert article highlights CVE-2025-59287, a critical WSUS RCE being actively probed and exploited in real-world environments.

Dive into the data, attack patterns, and mitigation steps 👉 https://www.crowdsec.net/vulntracking-report/cve-2025-59287

#CVE #CVE202559287 #threatalert #cybersecurity

🚨In this week’s Threat Alert article (the first one of 2026), we break down an active exploitation spike targeting CVE-2024-20767 in Adobe ColdFusion, observed across the CrowdSec Network.

Read the full analysis and protect your systems 👉 https://crowdsec.net/vulntracking-report/cve-2024-20767

#CVE #CVE202420767 #ThreatAlert #ThreatIntel #cybersecurity

CVE-2024-20767 Active Exploitation in Adobe ColdFusion

CVE-2024-20767 is actively exploited in Adobe ColdFusion. CrowdSec observed a surge in attacks & explains impact, trends, & how to protect your systems.

⚠️ #FBI and #CISA alert on pro-Russian hacktivist attacks against critical infrastructure 🌐 VNC connections and desktop-sharing systems targeted 📊 DDoS campaigns coupled with exploitation attempts 🏥 #Healthcare identified as critical infrastructure at risk #CyberSecurity #ThreatAlert 👉 https://www.netsec.news/pro-russia-hacktivists-attacking-us-critical-infrastructure/
Pro-Russia Hacktivists are Strongly Attacking U.S. Critical Infrastructure Entities - NetSec.News

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Canadian Centre for Cyber Security, Department of Defense Cyber Crime Center (DC3), Europol, ... Read more

NetSec.News

🚨 In this week’s newsletter, we revisit React2Shell (CVE-2025-55182) as exploitation surged from hundreds to over 10K daily attackers. We break down what changed, how attackers shifted to mass automated campaigns, and what defenders can do to stay protected.

Read the full analysis and protect your systems 👉 https://crowdsec.net/vulntracking-report/cve-2025-55182-react2shell

#CVE #CVE202555182 #React2Shell #threatalert #cybersecurity

React2Shell Now Among the Most Exploited Vulnerabilities Worldwide

React2Shell (CVE-2025-55182) attacks surged from 500 to 10K+ daily. Learn what changed, attacker trends, and how to protect with CrowdSec.