Piotr Kijewski
@piotrkijewski.bsky.social
📤 73
📥 3
📝 1
@shadowserver.bsky
.social
reposted by
Piotr Kijewski
The Shadowserver Foundation
1 day ago
We are now scanning daily for CVE-2026-34197 (Apache ActiveMQ Improper Input Validation Vulnerability) which has recently been added to US CISA KEV. 6364 IPs seen vulnerable on 2026-04-19 based on a version check. Dashboard Tree Map view:
dashboard.shadowserver.org/statistics/c...
1
7
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
1 day ago
We added CVE-2026-35616 scans based on the vulnerability detector developed by Bishop Fox
bishopfox.com/blog/api-aut...
. Over 60 IPs still assessed as vulnerable:
dashboard.shadowserver.org/statistics/c...
Data shared daily in our Vulnerable HTTP reporting:
shadowserver.org/what-we-do/n...
add a skeleton here at some point
0
6
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 days ago
We’re excited to announce that the Canadian Centre for Cyber Security (CCCS) has increased its annual Shadowserver Alliance Partnership tier from Gold to Diamond! Thank you CCCS for your generous support and for being a valuable and trusted partner in making the Internet more secure.
1
9
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
15 days ago
We have also added CVE-2026-2699 tagging to our scans, which now detect unpatched Progress ShareFile instances. 120 seen 2026-04-06
dashboard.shadowserver.org/statistics/c...
Tree Map view:
dashboard.shadowserver.org/statistics/c...
IP data in Vulnerable HTTP:
www.shadowserver.org/what-we-do/n...
add a skeleton here at some point
0
6
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
17 days ago
Heads up FortiClient EMS users! CVE-2026-35616 (new) & CVE-2026-21643 - both unauthenticated RCE observed to be exploited in the wild! We fingerprint about 2000 instances globally, see public Dashboard:
dashboard.shadowserver.org/statistics/i...
Top affected: US & Germany
1
7
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
19 days ago
We added Progress ShareFile fingerprinting to our scans & reports with 784 unique IPs seen exposed on 2026-04-02. watchTowr recently disclosed details behind an RCE CVE-2026-2699 & CVE-2026-2701 exploit chain affecting ShareFile. Make sure to apply the latest patch!
2
8
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
21 days ago
F5 BIG-IP APM CVE-2025-53521 impact has recently been updated from a DoS to RCE (see:
my.f5.com/manage/s/art...
) & added to CISA KEV. We are fingerprinting & sharing F5 BIG-IP APM instances - over 17.1K IPs seen on 2026-03-31 globally. This is just a population assessment.
1
9
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
22 days ago
We’re excited to welcome KPN to the Shadowserver Alliance as a bronze tier partner! KPN is a leading telecommunications and IT provider in the Netherlands.
www.kpn.com/algemeen/eng...
Together we will raise the bar on cybersecurity to make the Internet more secure.
1
6
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
29 days ago
IIS EOL tracker:
dashboard.shadowserver.org/statistics/c...
add a skeleton here at some point
0
2
1
reposted by
Piotr Kijewski
The Shadowserver Foundation
30 days ago
Over 511 000 End-of-Life Microsoft IIS instances seen in our daily scans, out of those over 227 000 instances that are beyond the official Microsoft Extended Security Updates (ESU) period. We now tag those 'eol-iis' and 'eos-iis' respectively in our Vulnerable HTTP reports.
1
13
7
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 1 month ago
We added a feed of IPs/websites with ClickFix/ClearFake injected code in our Compromised Website reporting, tagged as 'clickfix'. Visitors of the website get tricked to install malware when injected JavaScript executes. If you receive an alert review for root cause of compromise!
1
7
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 2 months ago
Great to support our international LE and private sector partners in Tycoon 2FA phishing-as-a-service
#cybercrime
disruption:
shadowserver.org/news/tycoon-...
New nCSIRT-only Tycoon 2FA Domains Special Report run 2026-03-04 (historical C2/panel/infra domains)
www.shadowserver.org/what-we-do/n...
1
3
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 2 months ago
Another Iran Internet blackout, this time due to the war, visualized on our Public Dashboard - drop to near zero on 2026-03-01:
dashboard.shadowserver.org/statistics/c...
add a skeleton here at some point
0
7
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 2 months ago
We are continuing to expand our n8n RCE vulnerability scanning - most recently adding CVE-2026-27495 (CVSS 9.4) tagging as well. You can track our various n8n scan results here for the most well known critical vulns:
dashboard.shadowserver.org/statistics/c...
Top affected: US, Germany & France.
1
6
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
2 months ago
Massive increase in sources attempting Ivanti EPMM CVE-2026-1281 exploitation, with over 28.3K source IPs seen on 2026-02-09. IP data on attackers shared in our
www.shadowserver.org/what-we-do/n...
(with vulnerability_id set to CVE-2026-1281). 20.4K IPs seen from US networks.
add a skeleton here at some point
1
7
6
reposted by
Piotr Kijewski
The Shadowserver Foundation
2 months ago
We have started to report webshells (or other artifacts) found on Ivanti EPMM devices, likely compromised via CVE-2026-1281. 56 IPs found on 2026-02-06 Data in
shadowserver.org/what-we-do/n...
Tree Map view:
dashboard.shadowserver.org/statistics/c...
Thank you to the KSA NCA for the heads up!
2
27
9
reposted by
Piotr Kijewski
Craig Newmark
3 months ago
These reports help people defend the country against cyber attacks and also helps people fight scammer networks
#CyberCivilDefense
#take9
add a skeleton here at some point
0
14
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
Spike in Ivanti EPMM CVE-2026-1281 RCE exploitation attempts seen by our sensors last 24 hours from at least 13 source IPs. In our scans, we see ~1600 exposed instances worldwide (no vulnerability assessment). Top exposed: Germany (516) Ivanti hotfix guidance:
forums.ivanti.com/s/article/Se...
1
6
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
CVE-2026-24858, a Fortinet authentication bypass vulnerability affecting multiple Fortinet products with FortiCloud SSO enabled, has been added by CISA to the KEV catalog. We share exposed Fortinet instances with FortiCloud SSO enabled daily in our feeds (~10 000 seen)
add a skeleton here at some point
1
4
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
We added SmarterTools SmarterMail CVE-2026-23760 RCE to our daily Vulnerable HTTP scans. Around 6000 IPs globally found likely vulnerable based on our version check. We also see exploitation attempts in the wild. CVE-2026-23760 Geo Treemap View:
dashboard.shadowserver.org/statistics/c...
1
1
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
Regarding CVE-2026-24061 in GNU InetUtils telnetd: while we are not scanning for it explicitly (due to current lack of ability to check in a safe way, we do share - and have for years - data on exposed instances in our Accessible Telnet Report:
www.shadowserver.org/what-we-do/n...
~800K exposed
0
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
We are scanning & reporting out SmarterMail hosts vulnerable to CVE-2025-52691 RCE (CVSS 10). 8001 unique IPs likely vulnerable on 2026-01-12 (18783 exposed). Note Exploit PoCs are public. Tree Map:
dashboard.shadowserver.org/statistics/c...
Raw IP data:
www.shadowserver.org/what-we-do/n...
1
2
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
We have identified 120 Cisco Secure Email Gateway/ Cisco Secure Email and Web Manager likely vulnerable to CVE-2025-20393 (over 650 fingerprinted exposed). CVE-2025-20393 is exploited in the wild, with no patch available. Follow Cisco recommendations at
sec.cloudapps.cisco.com/security/cen...
1
8
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
Using ELK & interested in automating ingestion of our threat intel for your network/constituency via our API? We have introduced an ECS logging script for our intelligence reports. This script uses Redis to queue events for Logstash. Check it out at
github.com/The-Shadowse...
0
7
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
We added fingerprinting of Fortinet devices with FortiCloud SSO enabled to our Device Identification reporting (at least 25K IPs seen globally). While not necessarily vulnerable to CVE-2025-59718/CVE-2025-59719 if you get a report from us regarding exposure, please verify/patch!
2
16
8
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
React Server Components (CVE-2025-55182) RCE findings so far on 2025-12-05. 77664 IPs found vulnerable (based on Assetnote methodology). IP data is being shared in Vulnerable HTTP reports:
www.shadowserver.org/what-we-do/n...
Dashboard geo breakdown:
dashboard.shadowserver.org/statistics/c...
1
7
9
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
Excited that our collaboration with VulnCheck (
vulncheck.com
) continues to grow as we welcome them as a new Shadowserver Alliance Partner -Silver tier! We look forward to enhancing our joint efforts to help network defenders globally with vulnerability management.
loading . . .
VulnCheck - Outpace Adversaries
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
https://vulncheck.com
1
5
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
Operation Endgame Season 3 Episode 2: Interlude released in time for Thanksgiving, recapping some of the
#cybercrime
disruption successes achieved so far, by partners working together internationally. Happy holidays - looking forward to future episodes!
1
5
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
We shared out 10,449 entries (e-mails) affected by the JSONFormatter and CodeBeautifier leak discovered by @watchTowr (see
labs.watchtowr.com/stop-putting...
). Data shared in a our Compromised Account Report
www.shadowserver.org/what-we-do/n...
(search for 2025-11-26 & compromised_account prefix)
1
3
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
We have been sharing Monsta FTP CVE-2025-34299 (pre-auth RCE) vulnerable instances for the last few weeks. We still see over 780 IPs vulnerable (version based check) instances daily. Most affected: US & Slovakia:
dashboard.shadowserver.org/statistics/c...
dashboard.shadowserver.org/statistics/c...
1
3
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
Proud to once again support our LE partners in Operation Endgame Season 3 86M stolen data items from 525K victim IPs across 226 countries included in our new Rhadamanthys Historic Bot Victims Special Report, run overnight 2025-11-12 More details:
shadowserver.org/news/rhadama...
1
12
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
"Don’t take BADCANDY from strangers ..." The Australian Signals Directorate (ASD) recently published an advisory on the BadCandy implant still present in many Cisco IOS XE devices:
www.cyber.gov.au/about-us/vie...
We still see around 15 000 Cisco IOS XE devices with the implant
1
8
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
We added CVE-2025-40778 BIND9 tagging (potential susceptibility to cache poisoning) to our DNS scans:
www.shadowserver.org/what-we-do/n...
We found nearly 8898 unpatched DNS open resolvers on 2025-10-30, down to 6653 on 2025-11-01:
dashboard.shadowserver.org/statistics/c...
1
7
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
Attention - Microsoft WSUS CVE-2025-59287 incidents! We are observing exploitation attempts based on a published POC. We have also began fingerprinting exposed WSUS instances (ports 8530/8531) with at least 2800 seen on 2025-10-25 (not necessarily vulnerable).
1
9
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
We are now sharing daily IP data on WatchGuard Fireware OS IKEv2 Out-of-Bounds Write CVE-2025-9242 vulnerable instances, with over 71 000 seen on 2025-10-18. Data shared in our Vulnerable ISAKMP reportings -
www.shadowserver.org/what-we-do/n...
Top affected: US with 23.2K instances
1
11
6
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
Proud to support our Law Enforcement partners in another successful cybercrime disruption: Operation SIMCARTEL Great work everyone involved 👏
europol.europa.eu/media-press/...
0
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
Regarding F5 network compromise (see
my.f5.com/manage/s/art...
): We are sharing daily IP data on F5 exposures in our Device ID
www.shadowserver.org/what-we-do/n...
(device_vendor set to F5). ~269K IPs seen daily, nearly half in US. Geo breakdown:
dashboard.shadowserver.org/statistics/i...
1
7
10
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
Oracle E-Business Suite incidents: We have added CVE-2025-61882 scanning & reporting with 576 potential vulnerable IPs found on 2025-10-06. Top affected: USA IP data in
www.shadowserver.org/what-we-do/n...
World map view of likely vulnerable instances:
dashboard.shadowserver.org/statistics/c...
1
6
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
You can track CVE-2025-20333 & CVE-2025-20362 vulnerable (unpatched) Cisco ASA/FTD instances here -
dashboard.shadowserver.org/statistics/c...
Around ~45K vulnerable seen on 2025-10-04
add a skeleton here at some point
1
6
1
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
Last week we released a new daily report type, "Badsecrets Report":
www.shadowserver.org/what-we-do/n...
(default severity: HIGH) It identifies the use of known or very weak cryptographic secrets across a variety of web frameworks/platforms. 12168 IPs seen (2025-09-14) using "bad" secrets!
1
4
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
FreePBX CVE-2025-57819 (CVSS 10.0) incidents: 6620 unpatched instances seen 2025-08-29, at least 386 compromised. Dashboard links: Vulnerable (unpatched):
dashboard.shadowserver.org/statistics/c...
Compromised:
dashboard.shadowserver.org/statistics/c...
1
11
5
Running unpatched Citrix NetScalers or seeing them in your constituency? Now is the time to get those checked for compromise and patched ...
add a skeleton here at some point
8 months ago
0
1
0
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
We added a new daily scan report type, Accessible GPRS Tunneling Protocol (GTP) services listing IPs with publicly exposed GTP-C (Core) on port 2123/UDP & GTP-U (User) 2152/UDP. Report format:
www.shadowserver.org/what-we-do/n...
Dashboard World map:
dashboard.shadowserver.org/statistics/c...
1
3
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
Since July 30th we are seeing an increase in scans coming from ~2200 compromised Cisco Small Business RV series routers, Linksys LRT series & Araknis Networks (AN-300-RT-4L2W). Top affected: US but also many others. IP data on these scans shared in
www.shadowserver.org/what-we-do/n...
1
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
We added version based N-able N-central RMM CVE-2025-8875 & CVE-2025-8876 detection to our daily scans. 1077 IPs unpatched IPs seen on 2025-08-15. Both CVEs recently added to US CISA KEV. Top affected: US, Canada, Netherlands, UK Dashboard map view:
dashboard.shadowserver.org/statistics/c...
1
4
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
We added VMware ESXi CVE-2025-41236 (CVSS 9.3) version based detection to our daily scans. First added 2025-07-19 with 17,238 IPs found. Latest scan (2025-08-10) detects 16,330 unpatched IPs, which is a slow patch rate. Top affected: France, China, US, Germany
1
9
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
9 months ago
We added Microsoft Exchange CVE-2025-53786 detection to our daily scans (version based). See US CISA Emergency Directive 25-02:
www.cisa.gov/news-events/...
Over 28K IPs unpatched (2025-08-07). Top affected: US, Germany, Russia Dashboard world map:
dashboard.shadowserver.org/statistics/c...
1
6
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
9 months ago
We added version based SonicWall SMA100 CVE-2025-40596 detection to our daily scans - at least 3200 IPs seen still unpatched! Top affected: US, Japan, Germany Dashboard map:
dashboard.shadowserver.org/statistics/c...
NVD entry:
nvd.nist.gov/vuln/detail/...
1
13
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
9 months ago
PaperCut CVE-2023-2533 was recently added to the CISA KEV catalog. We added version based detection of unpatched IPs with 129 seen (2025-08-03).
dashboard.shadowserver.org/statistics/c...
We also scan for CVE-2023-39143 & CVE-2023-27350. Data in Vulnerable HTTP:
shadowserver.org/what-we-do/n...
1
5
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
9 months ago
We’re excited to welcome SURFcert to the Shadowserver Alliance as a Bronze Tier Partner! Together with SURFcert and fellow Alliance Partners, we’re making the Internet more secure for all. Read more about SURFcert:
www.surf.nl/en
1
3
2
Load more
feeds!
log in