Skip to main content
 
Contact Page | Privacy Policy

Get real-time updates on the latest cyber threats and vulnerabilities.

Updated on 2026-03-12 07:22
Malicious IPs for last 24h 389    TXT CSV

Note: By leveraging our own security sensors, we gather valueable insights into the latest network activity, enabling proactive threat detection and response.

With Cyberstage, you can:

  • Process Windows Registry, Windows Event Logs (Evtx), and Windows MFT table.
  • Enrich data with geo data, sigma rules, and vulnerability insights.
  • Review processed data in the system.
  • Export data to Elasticsearch for advanced analysis.

Serve as an MCP Server: Act as a Managed Content Provider (MCP) server, delivering parsed and enriched data to AI agents for improved performance and insights.

Note: Any uploaded or extracted data will remain private and will not be processed or shared with public AI vendors.

Explore news and and reports on significant cyber incidents.

2026-03-12 | BleepingComputer
News
IOCs
Google fixes two new Chrome zero-days exploited in attacks
2026-03-12 | TheHackersNews
CTI
IOCs
Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
2026-03-12 | TheHackersNews
General
IOCs
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
2026-03-12 | BleepingComputer
News
Canadian retail giant Loblaw notifies customers of data breach
2026-03-12 | BleepingComputer
News
IOCs
England Hockey investigating ransomware data breach
2026-03-12 | BleepingComputer
News
AI-generated Slopoly malware used in Interlock ransomware attack
2026-03-12 | Cisco Talos Blog
CTI
IOCs
This one’s for you, Mom
2026-03-12 | TheHackersNews
CTI
IOCs
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
2026-03-12 | TheHackersNews
News
Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
2026-03-12 | Microsoft Security Blog
News
IOCs
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

Note: Articles are analyzed using AI to generate summaries, Indicators of Compromise (IOCs), and details on MITRE ATT&CK tactics and techniques.