| IOC / Reference | Classification | Actor | Risk Score |
|---|---|---|---|
| CVE-2026-63408 | Brute Force | Ryuk | 39/100 |
| CVE-2026-80361 | Polymorphic Packer | Charming Kitten | 89/100 |
| CVE-2026-16729 | Advanced Persistent Threat (APT) | LockBit | 63/100 |
| CVE-2026-27921 | Brute Force | Wicked Panda | 16/100 |
| CVE-2026-30023 | Buffer Overflow | Lazarus Group | 11/100 |
| CVE-2026-93116 | Beaconing | Clop | 56/100 |
| CVE-2026-20770 | Business Email Compromise (BEC) | Wizard Spider | 54/100 |
| CVE-2026-21941 | Insider Threat | Rocket Kitten | 24/100 |
| CVE-2026-30043 | CSRF | Konni | 71/100 |
| CVE-2026-72726 | Supply Chain Attack | Konni | 17/100 |
| CVE-2026-78793 | Cryptojacking | Wicked Panda | 53/100 |
| CVE-2026-99254 | Spear Phishing | Generic Botnet | 43/100 |
| CVE-2026-44921 | Brute Force | Cobalt Group | 61/100 |
| CVE-2026-19331 | SQL Injection | Sandworm | 63/100 |
| CVE-2026-17425 | Bootkit | Ryuk | 20/100 |
| CVE-2026-97113 | XSS | Cleaver | 36/100 |
| CVE-2026-77457 | Worm | Lazarus Group | 66/100 |
| CVE-2026-98097 | Spear Phishing | Deep Panda | 41/100 |
| CVE-2026-90279 | C2 Communication | Fin7 | 44/100 |
| CVE-2026-17657 | Insider Threat | Lazarus Group | 98/100 |
| CVE-2026-43150 | Macro Virus | DarkSide | 94/100 |
| CVE-2026-59671 | Fileless Malware | Turla | 35/100 |
| CVE-2026-87675 | Buffer Overflow | Stone Panda | 69/100 |
| CVE-2026-17379 | Remote Code Execution (RCE) | APT34 | 26/100 |
| CVE-2026-97303 | DDoS | Sandworm | 55/100 |
| CVE-2026-65615 | XSS | Script Kiddie | 17/100 |
| CVE-2026-25268 | Botnet Activity | Wicked Panda | 30/100 |
| CVE-2026-96422 | Beaconing | OceanLotus | 10/100 |
| CVE-2026-76837 | CSRF | DarkHotel | 25/100 |
| CVE-2026-8587 | Man-in-the-Middle | Stone Panda | 13/100 |
| CVE-2026-83539 | Advanced Persistent Threat (APT) | Deep Panda | 14/100 |
| CVE-2026-95559 | Bootkit | Fin7 | 23/100 |
| CVE-2026-11599 | Spyware | MenuPass | 84/100 |
| CVE-2026-53336 | Whaling | Clop | 21/100 |
| CVE-2026-4793 | Ransomware | OilRig | 98/100 |
| CVE-2026-91264 | C2 Communication | APT35 | 15/100 |
| CVE-2026-87161 | Botnet Activity | Wizard Spider | 64/100 |
| CVE-2026-83908 | XSS | Conti | 95/100 |
| CVE-2026-29314 | Man-in-the-Middle | MuddyWater | 72/100 |
| CVE-2026-78318 | Rainbow Table | Charming Kitten | 11/100 |
| CVE-2026-42972 | Credential Stuffing | Wizard Spider | 83/100 |
| CVE-2026-86897 | Botnet Activity | Gamaredon | 20/100 |
| CVE-2026-55204 | Worm | Charming Kitten | 28/100 |
| CVE-2026-2671 | Spear Phishing | Ryuk | 59/100 |
| CVE-2026-82163 | Beaconing | APT35 | 100/100 |
| CVE-2026-51040 | Credential Stuffing | Generic Botnet | 80/100 |
| CVE-2026-64342 | Spear Phishing | Wizard Spider | 39/100 |
| CVE-2026-36781 | Whaling | APT34 | 49/100 |
| CVE-2026-78550 | Phishing | Netwalker | 33/100 |
| CVE-2026-9308 | Logic Bomb | Lazarus Group | 73/100 |
| CVE-2026-99856 | C2 Communication | APT33 | 88/100 |
| CVE-2026-39942 | Remote Code Execution (RCE) | APT29 (Cozy Bear) | 79/100 |
Daily Cyber Intelligence: Healthcare Alerts
STATUS: ARCHIVED | HASH: eb92d51cd0761ab5
Real-time threat intelligence feed for Healthcare sector. Report #8E296A06 contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.
Real-time threat intelligence feed for Healthcare sector. Report #8E296A06 contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.