Threat Intelligence Report Archives | SECaaS Platform AIONCLOUD

[2026.03] Web Attack Trend Report

[March 2026 Web Attack Trend Analysis] 1. Weekly Web Attack Trend Analysis By analyzing weekly web attack trends, it is possible to identify specific periods when attacks are most concentrated. These insights can be used to establish proactive prevention and response strategies in anticipation of high-risk periods. The graph below visualizes the number of web Read more about [2026.03] Web Attack Trend Report[…]

[2026.03 Vulnerability Report] Microsoft WSUS Remote Code Execution

This vulnerability is the Insecure Deserialization vulnerability in Microsoft’s Windows Server Update Services (WSUS), which allows an attacker to execute malicious commands by sending a SOAP request containing a serialized and encrypted malicious payload to /ClientWebService/Client.asmx. A security patch for this vulnerability was released in October 2025, and AIWAF products are scheduled to address this Read more about [2026.03 Vulnerability Report] Microsoft WSUS Remote Code Execution[…]

[2026.03 Vulnerability Report] PlainJWT Verification Bypass in pac4j-jwt JWE (CVE-2026-29000)

This report provides a technical analysis and mitigation strategies for CVE-2026-29000, a signature verification bypass vulnerability identified in the JWT (JSON Web Token) module, pac4j-jwt, of the Java-based open-source security engine pac4j. The vulnerability affects versions prior to 4.5.9, 5.7.9, and 6.3.3 of pac4j-jwt, and originates from a flaw in the JwtAuthenticator logic when processing Read more about [2026.03 Vulnerability Report] PlainJWT Verification Bypass in pac4j-jwt JWE (CVE-2026-29000)[…]

[2026.02] Web Attack Trend Report

[February 2026 Web Attack Trend Analysis] 1. Weekly Web Attack Trend Analysis Through weekly web attack trend analysis, it is possible to identify periods during which web attacks were highly concentrated. These insights can be used to establish proactive prevention and response strategies in preparation for periods of increased attack activity. The graph below visualizes Read more about [2026.02] Web Attack Trend Report[…]

[2026.02 Vulnerability Report] Oracle Fusion Middleware: Authentication Bypass (CVE-2026-21962)

The CVE-2026-21962 vulnerability stems from an improper access control flaw (CWE-284) in Oracle HTTP Server and the WebLogic Server Proxy Plug-in components. It allows a remote attacker to bypass authentication controls by sending specially crafted HTTP requests, thereby granting unauthorized access to protected administrative functions and internal system resources. Given its severity and the foundational Read more about [2026.02 Vulnerability Report] Oracle Fusion Middleware: Authentication Bypass (CVE-2026-21962)[…]

[2026.02 Vulnerability Report] MS Office Zero-day (CVE-2026-21509)

Microsoft Office is a critical business asset that handles core documents and data. CVE-2026-21509 is a critical zero-day vulnerability that allows attackers to gain complete control of a system by simply opening a manipulated document, directly bypassing built-in security measures. With confirmed cases of in-the-wild attacks by APT groups already underway, and detailed analysis and Read more about [2026.02 Vulnerability Report] MS Office Zero-day (CVE-2026-21509)[…]

[2026.02 Vulnerability Report] Ivanti EPM Absolute Path Traversal

This vulnerability is a credential coercion vulnerability in Ivanti Endpoint Manager. An attacker can attempt to obtain credentials and ultimately take over a domain by sending SOAP XML data containing a remote UNC address accessible to the attacker’s server to /WSVulnerabilityCore/VulCore.asmx. A security patch for this vulnerability was released in January 2025, and AIWAF products Read more about [2026.02 Vulnerability Report] Ivanti EPM Absolute Path Traversal[…]

[2026.01] Web Attack Trend Report

[January 2026 Web Attack Trend Analysis] 1. Weekly Web Attack Trend Analysis By analyzing weekly web attack trends, it is possible to identify specific periods during which web attacks were heavily concentrated. These insights can be used to establish proactive prevention and response strategies in preparation for periods of increased attack activity. The graph below Read more about [2026.01] Web Attack Trend Report[…]

[2026.01 Vulnerability Report] n8n Vulnerability Analysis

A critical vulnerability identified as CVE-2026-21858 (Ni8mare) has been discovered in the open-source workflow automation platform n8n. Assigned a maximum CVSS score of 10.0, this flaw permits unauthenticated remote code execution (RCE), enabling attackers to fully compromise affected servers. Although n8n is a popular tool for automation, its footprint is relatively niche compared to ubiquitous Read more about [2026.01 Vulnerability Report] n8n Vulnerability Analysis[…]

[2026.01 Vulnerability Report] Fortra GoAnywhere MFT Auth Bypass & Insecure Deserialization

This vulnerability is an authentication bypass and insecure deserialization vulnerability in Fortra GoAnywhere MFT. An attacker can first obtain the authentication token value through the authentication bypass vulnerability and then execute serialized malicious code by sending it to a specific endpoint. A patch for this vulnerability was released in September 2025, and AIWAF products will Read more about [2026.01 Vulnerability Report] Fortra GoAnywhere MFT Auth Bypass & Insecure Deserialization[…]

Scroll Up