CyberLeveling Logo

We're leveling your security

Through a cybersecurity intelligence and learning platform delivering in-depth coverage of data breaches, cyberattacks, vulnerabilities, and offensive/defensive security insights.

Latest Updates

The ManoMano Data Breach: What Happened and What It Actually Means

The ManoMano Data Breach: What Happened and What It Actually Means

Mar 01, 2026
Data Breach / DIY Marketplace / Supply Chain

An analysis of the ManoMano data breach affecting 38 million users, exploring the supply chain exposure and the impact of third-party support platform compromises.

CVE-2026-1241: Authentication Bypass in Pelco Sarix Professional 3 Series Cameras

CVE-2026-1241: Authentication Bypass in Pelco Sarix Professional 3 Series Cameras

Mar 01, 2026
Vulnerability / IoT Security

An analysis of CVE-2026-1241, a critical authentication bypass in Pelco Sarix cameras that allows unauthorized access to live video feeds and operational data.

LLMNR Poisoning: Attacker and Defender Perspective

LLMNR Poisoning: Attacker and Defender Perspective

Mar 01, 2026
Guides / Networking

An analysis of LLMNR poisoning, explaining how attackers abuse legacy Windows protocols to steal credentials and how defenders can mitigate the risk using hardening and threat hunting.

Sunday Reflections on AI Agents: From “Who Would Attack Me?” to Machine-Speed Conflict

Sunday Reflections on AI Agents: From “Who Would Attack Me?” to Machine-Speed Conflict

Mar 01, 2026
Reflections / AI Security

A reflection on the shift from opportunistic human-speed attacks to autonomous machine-speed operations, and why survival in the AI era depends on updating our structural assumptions.

CVE-2026-21902 Detail: Root Code Execution Risk in Junos OS Evolved (PTX Series)

CVE-2026-21902 Detail: Root Code Execution Risk in Junos OS Evolved (PTX Series)

Feb 28, 2026
Vulnerability / Network Infrastructure / Critical

An analysis of CVE-2026-21902, a critical vulnerability in Juniper's Junos OS Evolved allowing unauthenticated remote root code execution on PTX Series routers.

Understanding the Risks in Johnson Controls Frick Controls Quantum HD

Understanding the Risks in Johnson Controls Frick Controls Quantum HD

Feb 28, 2026
Vulnerability / Industrial Control Systems / OT

An analysis of four high-severity vulnerabilities (CVE-2026-21659, 21657, 21656, 21654) affecting Johnson Controls Frick Controls Quantum HD, including unauthenticated RCE and code injection.

RDP Exposure Across the EU: A Snapshot from Shodan Data

RDP Exposure Across the EU: A Snapshot from Shodan Data

Feb 28, 2026
Insights / OSINT

An analysis of RDP exposure on port 3389 across the 27 EU member states using Shodan data, highlighting risks and providing a hardening checklist.

SMB Exposure Across the EU: A Service That Should Never Be Public

SMB Exposure Across the EU: A Service That Should Never Be Public

Feb 28, 2026
Insights / OSINT

An analysis of SMB exposure on port 445 across the EU using Shodan data, highlighting the critical risks associated with exposing this internal protocol to the public internet.

Telnet Exposure Across the EU: A Legacy Protocol That Refuses to Die

Telnet Exposure Across the EU: A Legacy Protocol That Refuses to Die

Feb 28, 2026
Insights / OSINT

An analysis of Telnet exposure across the 27 EU member states using Shodan data, highlighting the risks of this unencrypted command-line protocol.

FTP Exposure Across the EU: A Snapshot from Shodan Data

FTP Exposure Across the EU: A Snapshot from Shodan Data

Feb 28, 2026
Insights / OSINT

An analysis of FTP exposure across all 27 EU member states using Shodan data, highlighting anonymous login rates and affected device types.

What Is AI Poisoning? A Practical Look From the Attacker and Defender Side

What Is AI Poisoning? A Practical Look From the Attacker and Defender Side

Feb 27, 2026
Insights / AI Security

An analysis of AI poisoning (data poisoning), exploring how attackers manipulate training data and how defenders can protect the integrity of machine learning models.

Over 12 Million Users Impacted: What Happened in the CarGurus Data Breach

Over 12 Million Users Impacted: What Happened in the CarGurus Data Breach

Feb 26, 2026
Data Breach / Automotive / Fintech

An analysis of the CarGurus data breach using the seven-level framework, exploring identity-based entry points and the impact of exposed finance pre-qualification data.

Understanding the Recent OpenEMR Vulnerabilities (CVE-2026-25127, CVE-2026-25131, CVE-2026-25135, CVE-2026-25124)

Understanding the Recent OpenEMR Vulnerabilities (CVE-2026-25127, CVE-2026-25131, CVE-2026-25135, CVE-2026-25124)

Feb 26, 2026
Vulnerability / Healthcare / Access Control

An analysis of several access control vulnerabilities in OpenEMR prior to version 8.0.0, highlighting the risks of broken authorization logic in healthcare software.

Developers, Air-Gapped Systems, and Zoom Meetings

Developers, Air-Gapped Systems, and Zoom Meetings

Feb 26, 2026
Insights / Threat Intelligence

An analysis of recent campaigns targeting developers through fake repositories, breaching air-gapped systems, and using fake Zoom update scams.

Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127)

Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127)

Feb 25, 2026
Vulnerability / SD-WAN / Critical

An analysis of the critical CVSS 10.0 authentication bypass affecting Cisco Catalyst SD-WAN, its active exploitation in the wild, and remediation guidance.

How a Global Espionage Group Hid Malware Inside Google Sheets

How a Global Espionage Group Hid Malware Inside Google Sheets

Feb 25, 2026
Insights / Strategic / Threat Intelligence

An analysis of UNC2814's campaign using Google Sheets as a C2 channel for the GRIDTIDE backdoor, highlighting modern stealth and cloud service abuse.

The 2026 Threat Landscape in One Sentence: Attacks Are Faster, Quieter, and Increasingly AI-Aware

The 2026 Threat Landscape in One Sentence: Attacks Are Faster, Quieter, and Increasingly AI-Aware

Feb 25, 2026
Insights / Strategic / Threat Intelligence

A practical breakdown of the CrowdStrike 2026 Global Threat Report, focusing on 29-minute breakout times, malware-free intrusions, and AI-enabled adversary activity.

VMware Aria Operations security update (VMSA-2026-0001)

VMware Aria Operations security update (VMSA-2026-0001)

Feb 24, 2026
Vulnerability / Infrastructure Management

An analysis of VMSA-2026-0001, covering critical vulnerabilities in VMware Aria Operations including command injection, stored XSS, and privilege escalation.

Understanding the Honeywell CCTV Authentication Bypass CVE-2026-1670

Understanding the Honeywell CCTV Authentication Bypass CVE-2026-1670

Feb 24, 2026
Vulnerability / IoT Security

An analysis of CVE-2026-1670, a critical authentication bypass vulnerability in Honeywell CCTV cameras that allows unauthenticated password resets.

APT Campaigns Increasingly Exploiting CVE-2026-21509

APT Campaigns Increasingly Exploiting CVE-2026-21509

Feb 24, 2026
Insights / Vulnerability Management

An analysis of the increasing use of CVE-2026-21509 in targeted phishing campaigns by advanced threat actors, and the resulting risks for enterprise environments.