❌

Normal view

[Tool] I built a CVE visualization tool for fun (VulnPath) -- would love and appreciate any feedback from this community!

Not sure if I'm the only one but I've always thought looking up CVEs felt archaic and outdated. I'm also a visual learner so I always wished there was some kind of visual graph that explains the E2E attack chain for me.

So rather than complaining, I built VulnPath as a fun side project. It's a CVE visualization tool where it will not only give you the full CVE data, but also a node graph visualizing the attack chain. I also added a "Simple" toggle for situations where you may need to explain the vulnerability to a less technical audience.

I honestly just want to know if this is something other people would find useful, or if I'm solving a problem that only bothers me. Please feel free to check it out; any feedback/suggestions are welcome (including if you think this is a terrible idea lol).

Note: the webapp isn't really mobile friendly (for now), so apologies in advance!

submitted by /u/yongsanghoon
[link] [comments]

~72% of companies report incomplete recovery after incidents - insights from 80 SEC disclosures

I analyzed 80 cybersecurity incident disclosures from SEC filings (primarily 8-K) and tagged them using a structured taxonomy of threat types (ransomware, data theft, insider, supply chain, etc.).

The goal was to see whether consistent patterns emerge from public incident reporting.

Key observations:

  • ~72% of companies report significant operational disruption or incomplete recovery
  • 50% of incidents involve data theft or data exposure
  • Financial services is the most represented sector in disclosed incidents
  • Only ~18% explicitly mention cyber insurance

Full dataset and breakdown:
[https://www.dukesecurity.ai/incidents]()

Feel free to browse and explore additional incidents in the dataset.

submitted by /u/LordKittyPanther
[link] [comments]

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

18 March 2026 at 14:00
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites.

CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit

A phishing technique to obtain NetNTLM hash from archive extraction in windows.

Seems like Microsoft patched it rather poorly, so it might be still viable.

Was presented at BsidesLjubljana March 2026.

submitted by /u/Jaded_Unit_1223
[link] [comments]
❌