1CPanel CVE-2026-41940 Exploitation from a Honeypot Perspective (opens in new tab)(defusedcyber.com)2waihtis8d ago0
3Tracking Citrix Netscaler CVE-2026-3055 Across 13 Days of Honeypot Telemetry (opens in new tab)(defusedcyber.com)2waihtis1mo ago0
4Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM (opens in new tab)(defusedcyber.com)149waihtis3mo ago52
5React2Shell Exploitation: A Short Summary of Honeypot Activity (opens in new tab)(defusedcyber.com)3waihtis5mo ago0
7Tracking Ransomware-Exploited Vulnerabilities by Likelihood of Exploitation (opens in new tab)(ransomvulns.defusedcyber.com)1waihtis0y ago0