IoC Extractor

This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.

CISA Warns of Three Actively Exploited Security Vulnerabilities in IoT, Backup, and Enterprise Systems

DATE : 2025-03-21T07:16:02
SOURCE : securityonline.info

CVE:
cve-2025-1316
cve-2024-48248
cve-2017-12637