| IOC / Reference | Classification | Actor | Risk Score |
|---|---|---|---|
| CVE-2026-50772 | Rootkit | Gamaredon | 79/100 |
| CVE-2026-85301 | Domain Shadowing | APT35 | 13/100 |
| CVE-2026-98177 | Botnet Activity | Energetic Bear | 61/100 |
| CVE-2026-71968 | Buffer Overflow | LockBit | 66/100 |
| CVE-2026-67338 | Zero-Day Exploit | Fin7 | 32/100 |
| CVE-2026-66000 | Spear Phishing | Unknown Actor | 31/100 |
| CVE-2026-64444 | Buffer Overflow | Cleaver | 96/100 |
| CVE-2026-40825 | Domain Shadowing | Maze | 63/100 |
| CVE-2026-90822 | Bootkit | Wicked Panda | 95/100 |
| CVE-2026-83918 | Logic Bomb | Silence | 85/100 |
| CVE-2026-33779 | Dictionary Attack | LockBit | 45/100 |
| CVE-2026-48404 | Man-in-the-Middle | OilRig | 67/100 |
| CVE-2026-11308 | Cryptojacking | OilRig | 95/100 |
| CVE-2026-40382 | Trojan | Winnti Group | 46/100 |
| CVE-2026-49958 | Spear Phishing | Gamaredon | 21/100 |
| CVE-2026-85760 | Whaling | Kimsuky | 71/100 |
| CVE-2026-19687 | Adware | Silence | 71/100 |
| CVE-2026-46485 | Supply Chain Attack | Maze | 14/100 |
| CVE-2026-91044 | Botnet Activity | Cicada | 79/100 |
| CVE-2026-1696 | Phishing | Sandworm | 72/100 |
| CVE-2026-18663 | Privilege Escalation | Conti | 90/100 |
| CVE-2026-8483 | SQL Injection | Sandworm | 98/100 |
| CVE-2026-37529 | DNS Tunneling | MenuPass | 36/100 |
| CVE-2026-38363 | Polymorphic Packer | Energetic Bear | 95/100 |
| CVE-2026-83695 | Business Email Compromise (BEC) | Maze | 97/100 |
| CVE-2026-48530 | Ransomware | Carbanak | 28/100 |
| CVE-2026-86447 | Phishing | Netwalker | 83/100 |
| CVE-2026-56299 | Spyware | Wizard Spider | 21/100 |
| CVE-2026-55294 | Lateral Movement | Rocket Kitten | 67/100 |
| CVE-2026-40524 | XSS | Netwalker | 33/100 |
| CVE-2026-59748 | CSRF | Wicked Panda | 40/100 |
| CVE-2026-80855 | SQL Injection | Conti | 77/100 |
| CVE-2026-4565 | Brute Force | Unattributed Cluster | 29/100 |
| CVE-2026-70965 | Business Email Compromise (BEC) | Carbanak | 13/100 |
| CVE-2026-89986 | C2 Communication | Fin7 | 92/100 |
| CVE-2026-66580 | Remote Code Execution (RCE) | DarkSide | 72/100 |
| CVE-2026-41271 | Beaconing | Maze | 41/100 |
| CVE-2026-47585 | Keylogger | Deep Panda | 26/100 |
| CVE-2026-43204 | XSS | Clop | 59/100 |
| CVE-2026-92434 | CSRF | Script Kiddie | 55/100 |
| CVE-2026-44303 | XSS | Mustang Panda | 74/100 |
| CVE-2026-59280 | Brute Force | MuddyWater | 49/100 |
| CVE-2026-32358 | CSRF | APT35 | 42/100 |
| CVE-2026-33447 | XSS | Mustang Panda | 62/100 |
| CVE-2026-37823 | Polymorphic Packer | Ryuk | 29/100 |
| CVE-2026-94346 | SQL Injection | Netwalker | 75/100 |
| CVE-2026-80709 | Dictionary Attack | APT29 (Cozy Bear) | 92/100 |
| CVE-2026-72361 | Privilege Escalation | Generic Botnet | 10/100 |
| CVE-2026-22831 | Cryptojacking | APT35 | 63/100 |
| CVE-2026-98446 | C2 Communication | Konni | 47/100 |
| CVE-2026-83840 | Man-in-the-Middle | APT41 (Double Dragon) | 13/100 |
| CVE-2026-64280 | Buffer Overflow | Konni | 26/100 |
| CVE-2026-7385 | Botnet Activity | Turla | 18/100 |
| CVE-2026-31723 | Business Email Compromise (BEC) | Wizard Spider | 96/100 |
| CVE-2026-56372 | Brute Force | CopyKittens | 81/100 |
| CVE-2026-58799 | Botnet Activity | Netwalker | 77/100 |
| CVE-2026-80070 | Bootkit | MuddyWater | 18/100 |
| CVE-2026-82145 | Rootkit | Lazarus Group | 68/100 |
Daily Cyber Intelligence: Telecom Alerts
STATUS: ARCHIVED | HASH: 90d3ae897c4719ac
Real-time threat intelligence feed for Telecom sector. Report #6C8349CC contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.
Real-time threat intelligence feed for Telecom sector. Report #6C8349CC contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.