March 2026 (5)
RegPwn Windows Local Privilege Escalation Vulnerability
2 rules 1 TTPRegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.
Kubernetes Endpoint Permission Enumeration
2 rules 1 TTPA single user and source IP attempts to enumerate Kubernetes endpoints, issuing API requests across multiple endpoints to identify accessible resources for further exploitation.
Kubernetes Sensitive Role Creation or Modification
2 rules 2 TTPsThis rule detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs (e.g., bind, escalate, impersonate), potentially leading to privilege escalation or unauthorized access within the cluster.
Apache Artemis and ActiveMQ Artemis Authentication Bypass Vulnerability
2 rules 5 TTPsCVE-2026-27446 allows an unauthenticated remote attacker to inject malicious messages or exfiltrate data from Apache Artemis and ActiveMQ Artemis brokers due to a missing authentication check in the Core protocol.
AWS STS Role Assumption by User
2 rules 2 TTPsDetection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.
February 2026 (21)
Fortigate VPN CVE-2023-27997 Exploitation Attempt
2 rules 1 TTPIDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.
Maltrail IOCs Report: Tracking Multiple Threat Actors
3 rules 5 TTPs 27 IOCsThis brief analyzes IOCs aggregated by Maltrail on February 27, 2026, highlighting network activity associated with diverse threat actors including APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp campaigns targeting various sectors.
Critical Unauthenticated RCE Vulnerability in Junos OS Evolved
2 rules 3 TTPsA critical unauthenticated remote code execution vulnerability, CVE-2026-21902, exists in Juniper Networks Junos OS Evolved PTX Series, allowing a network-based attacker to execute code as root, requiring immediate patching and increased monitoring.
Critical Vulnerabilities in n8n Workflow Automation Platform
3 rules 3 TTPsMultiple critical vulnerabilities in n8n versions prior to 2.10.1, 2.9.3, and 1.123.22 enable authenticated users to execute arbitrary code and system commands, potentially leading to full system compromise.
Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)
2 rules 1 TTPA critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.
Mobility46 Charging Station Vulnerabilities Allow Unauthorized Control and Disruption
2 rules 3 TTPs 1 IOCMultiple vulnerabilities in Mobility46 charging stations allow attackers to gain unauthorized administrative control or disrupt charging services through missing authentication, improper authentication restrictions, insufficient session expiration, and exposed credentials.
Multiple Vulnerabilities in SWITCH EV Charging Stations
2 rules 7 TTPs 1 IOCMultiple vulnerabilities in SWITCH EV swtchenergy.com charging stations could allow attackers to impersonate stations, hijack sessions, cause denial of service, and manipulate backend data due to missing authentication, rate limiting issues, session expiration flaws, and exposed credentials.
Yokogawa CENTUM VP R6 and R7 Vulnerabilities Lead to Potential Denial of Service and Arbitrary Code Execution
2 rules 3 TTPsMultiple vulnerabilities in Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package can be exploited by sending maliciously crafted packets, leading to denial-of-service or arbitrary code execution.
Critical RCE Vulnerability in Cisco Catalyst SD-WAN Controller
2 rules 2 TTPsA critical remote code execution vulnerability exists in Cisco Catalyst SD-WAN Controllers (CVE-2026-20127) due to improper authentication, allowing unauthenticated remote attackers to bypass authentication and gain administrative privileges, potentially leading to network configuration manipulation.
EV2GO Charging Station Vulnerabilities Allow Impersonation and Denial of Service
2 rules 3 TTPs 1 IOCMultiple vulnerabilities in EV2GO charging stations, including missing authentication and session management flaws, could allow attackers to impersonate stations, hijack sessions, and cause denial-of-service conditions.
Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability
2 rules 1 TTPAn authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions <= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.
Copeland XWEB and XWEB Pro Multiple Vulnerabilities
2 rules 6 TTPsMultiple vulnerabilities in Copeland XWEB and XWEB Pro versions 1.12.1 and earlier could allow attackers to bypass authentication, inject commands, and execute arbitrary code, leading to complete system compromise.
Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution
2 rules 3 TTPsMultiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.
Johnson Controls Frick Controls Quantum HD Multiple Vulnerabilities
2 rules 4 TTPsMultiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions <=10.22 can lead to pre-authentication remote code execution, information leak, or denial of service.
Multiple Vulnerabilities in Chargemap Charging Stations
2 rules 5 TTPs 1 IOCUnauthenticated attackers can exploit multiple vulnerabilities in Chargemap's charging stations, including missing authentication, improper authentication attempt restrictions, insufficient session expiration, and unprotected credentials, potentially leading to unauthorized control and denial-of-service.
Multiple Vulnerabilities in EV Energy ev.energy Charging Stations
2 rulesMultiple vulnerabilities exist in EV Energy ev.energy that could allow an attacker to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.
Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent
3 rules 2 TTPsMultiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.
VMware Aria Operations Vulnerabilities Allow Remote Code Execution and Privilege Escalation
2 rules 2 TTPsMultiple vulnerabilities in VMware Aria Operations, Cloud Foundation, and Telco Cloud Platform/Infrastructure could allow unauthenticated remote code execution (CVE-2026-22719) and privilege escalation (CVE-2026-22720, CVE-2026-22721).
Critical Vulnerabilities in FreeScout Help Desk Allow Remote Code Execution
2 rules 2 TTPsCritical vulnerabilities, CVE-2026-27636 and CVE-2026-27637, exist in FreeScout Help Desk that could be exploited to achieve remote code execution, potentially leading to data exfiltration and system compromise.
Ongoing Exploitation of Cisco SD-WAN Systems
3 rules 4 TTPsMalicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.
Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)
2 rules 2 TTPsCVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.
December 2024 (3)
AWS SAML Provider Deletion Activity
2 rules 2 TTPsAn adversary may delete an AWS SAML provider to disrupt administrative access, hindering incident response and potentially escalating privileges within the AWS environment.
Suspicious AWS EC2 Key Pair Import Activity
2 rules 1 TTPThe import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.
Potential Web Shell ASPX File Creation
2 rules 1 TTPThe creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.