CyberLeveling Logo

We're leveling your security

Through a cybersecurity intelligence and learning platform delivering in-depth coverage of data breaches, cyberattacks, vulnerabilities, and offensive/defensive security insights.

Latest Updates

CVE-2026-21902 Detail: Root Code Execution Risk in Junos OS Evolved (PTX Series)

CVE-2026-21902 Detail: Root Code Execution Risk in Junos OS Evolved (PTX Series)

Feb 28, 2026
Vulnerability / Network Infrastructure / Critical

An analysis of CVE-2026-21902, a critical vulnerability in Juniper's Junos OS Evolved allowing unauthenticated remote root code execution on PTX Series routers.

Understanding the Risks in Johnson Controls Frick Controls Quantum HD

Understanding the Risks in Johnson Controls Frick Controls Quantum HD

Feb 28, 2026
Vulnerability / Industrial Control Systems / OT

An analysis of four high-severity vulnerabilities (CVE-2026-21659, 21657, 21656, 21654) affecting Johnson Controls Frick Controls Quantum HD, including unauthenticated RCE and code injection.

RDP Exposure Across the EU: A Snapshot from Shodan Data

RDP Exposure Across the EU: A Snapshot from Shodan Data

Feb 28, 2026
Insights / OSINT

An analysis of RDP exposure on port 3389 across the 27 EU member states using Shodan data, highlighting risks and providing a hardening checklist.

SMB Exposure Across the EU: A Service That Should Never Be Public

SMB Exposure Across the EU: A Service That Should Never Be Public

Feb 28, 2026
Insights / OSINT

An analysis of SMB exposure on port 445 across the EU using Shodan data, highlighting the critical risks associated with exposing this internal protocol to the public internet.

Telnet Exposure Across the EU: A Legacy Protocol That Refuses to Die

Telnet Exposure Across the EU: A Legacy Protocol That Refuses to Die

Feb 28, 2026
Insights / OSINT

An analysis of Telnet exposure across the 27 EU member states using Shodan data, highlighting the risks of this unencrypted command-line protocol.

FTP Exposure Across the EU: A Snapshot from Shodan Data

FTP Exposure Across the EU: A Snapshot from Shodan Data

Feb 28, 2026
Insights / OSINT

An analysis of FTP exposure across all 27 EU member states using Shodan data, highlighting anonymous login rates and affected device types.

What Is AI Poisoning? A Practical Look From the Attacker and Defender Side

What Is AI Poisoning? A Practical Look From the Attacker and Defender Side

Feb 27, 2026
Insights / AI Security

An analysis of AI poisoning (data poisoning), exploring how attackers manipulate training data and how defenders can protect the integrity of machine learning models.

Over 12 Million Users Impacted: What Happened in the CarGurus Data Breach

Over 12 Million Users Impacted: What Happened in the CarGurus Data Breach

Feb 26, 2026
Data Breach / Automotive / Fintech

An analysis of the CarGurus data breach using the seven-level framework, exploring identity-based entry points and the impact of exposed finance pre-qualification data.

Understanding the Recent OpenEMR Vulnerabilities (CVE-2026-25127, CVE-2026-25131, CVE-2026-25135, CVE-2026-25124)

Understanding the Recent OpenEMR Vulnerabilities (CVE-2026-25127, CVE-2026-25131, CVE-2026-25135, CVE-2026-25124)

Feb 26, 2026
Vulnerability / Healthcare / Access Control

An analysis of several access control vulnerabilities in OpenEMR prior to version 8.0.0, highlighting the risks of broken authorization logic in healthcare software.

Developers, Air-Gapped Systems, and Zoom Meetings

Developers, Air-Gapped Systems, and Zoom Meetings

Feb 26, 2026
Insights / Threat Intelligence

An analysis of recent campaigns targeting developers through fake repositories, breaching air-gapped systems, and using fake Zoom update scams.

Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127)

Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127)

Feb 25, 2026
Vulnerability / SD-WAN / Critical

An analysis of the critical CVSS 10.0 authentication bypass affecting Cisco Catalyst SD-WAN, its active exploitation in the wild, and remediation guidance.

How a Global Espionage Group Hid Malware Inside Google Sheets

How a Global Espionage Group Hid Malware Inside Google Sheets

Feb 25, 2026
Insights / Strategic / Threat Intelligence

An analysis of UNC2814's campaign using Google Sheets as a C2 channel for the GRIDTIDE backdoor, highlighting modern stealth and cloud service abuse.

The 2026 Threat Landscape in One Sentence: Attacks Are Faster, Quieter, and Increasingly AI-Aware

The 2026 Threat Landscape in One Sentence: Attacks Are Faster, Quieter, and Increasingly AI-Aware

Feb 25, 2026
Insights / Strategic / Threat Intelligence

A practical breakdown of the CrowdStrike 2026 Global Threat Report, focusing on 29-minute breakout times, malware-free intrusions, and AI-enabled adversary activity.

VMware Aria Operations security update (VMSA-2026-0001)

VMware Aria Operations security update (VMSA-2026-0001)

Feb 24, 2026
Vulnerability / Infrastructure Management

An analysis of VMSA-2026-0001, covering critical vulnerabilities in VMware Aria Operations including command injection, stored XSS, and privilege escalation.

Understanding the Honeywell CCTV Authentication Bypass CVE-2026-1670

Understanding the Honeywell CCTV Authentication Bypass CVE-2026-1670

Feb 24, 2026
Vulnerability / IoT Security

An analysis of CVE-2026-1670, a critical authentication bypass vulnerability in Honeywell CCTV cameras that allows unauthenticated password resets.

APT Campaigns Increasingly Exploiting CVE-2026-21509

APT Campaigns Increasingly Exploiting CVE-2026-21509

Feb 24, 2026
Insights / Vulnerability Management

An analysis of the increasing use of CVE-2026-21509 in targeted phishing campaigns by advanced threat actors, and the resulting risks for enterprise environments.

The Cyber Threat Landscape in 2025: What We Learned and What 2026 May Bring

The Cyber Threat Landscape in 2025: What We Learned and What 2026 May Bring

Feb 23, 2026
Insights / Strategic

A retrospective on the 2025 cyber threat landscape and projections for 2026, focusing on identity, zero-days, and the blending of cyber and information operations.

The Booking.com Phishing Campaign: What Hotels and Travellers Need to Know

The Booking.com Phishing Campaign: What Hotels and Travellers Need to Know

Feb 23, 2026
Insights / Phishing

An analysis of a sophisticated multi-stage phishing campaign impersonating Booking.com to target both hotel partners and their guests.

When Open Source Turns Against You: Inside the npm Supply Chain Worm

When Open Source Turns Against You: Inside the npm Supply Chain Worm

Feb 23, 2026
Insights / Supply Chain

An analysis of an active npm supply chain worm that targets developers and AI coding assistants using typosquatting and sophisticated evasion techniques.

What Happened at UMMC: A Clear Look at the Ransomware Attack

What Happened at UMMC: A Clear Look at the Ransomware Attack

Feb 22, 2026
Data Breach / Ransomware / Healthcare

A structured analysis of the UMMC ransomware attack using the seven-level framework, exploring the operational impact and systemic risks in healthcare.