<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🔵 THREAT INTELLIGENCE]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f535.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--large_blue_circle" style="height:23px;width:auto;vertical-align:middle" title="🔵" alt="🔵" /> THREAT INTELLIGENCE</p><p>Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access</p><p>Vulnerability | CRITICAL<br />CVEs: CVE-2026-6973</p><p>Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day...</p><p>Full analysis:<br /><a href="https://www.yazoul.net/news/article/ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-acces" rel="nofollow noopener"><span>https://www.</span><span>yazoul.net/news/article/ivanti</span><span>-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-acces</span></a></p><p><a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Ransomware" rel="tag">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" rel="tag">#<span>IncidentResponse</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/80bc4e8c-a793-4f09-9395-143255470c77/threat-intelligence</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 07:51:30 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/80bc4e8c-a793-4f09-9395-143255470c77.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 11:17:31 GMT</pubDate><ttl>60</ttl></channel></rss>