IoC Extractor
This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.
CISA Warns of Three Actively Exploited Security Vulnerabilities in IoT, Backup, and Enterprise Systems
DATE :
2025-03-21T07:16:02
SOURCE :
securityonline.info
CVE:
cve-2025-1316
cve-2024-48248
cve-2017-12637