🎁 Here’s a little end-of-year gift backed with Sightings from Vulnerability-Lookup ! A small step into 2026.
The year is almost over, so we’ve wrapped up a fresh Sightings Forecast — looking at how sightings evolve across social platforms, code repositories, and structured feeds. All monitored through our tools[1] and enriched by our fantastic community[2].
👉 Read the full report:
https://www.vulnerability-lookup.org/2025/12/02/end-of-year-threat-intelligence-sightings-forecast/
The goal: track how sightings evolve over time and provide an adaptive short-term forecast for several key sources monitored by Vulnerability-Lookup.
Our methodology combines weekly historical trends with daily adaptive models. Depending on the underlying slope, we apply either a Logistic Growth model (for rising trends) or an Exponential Decay model (for declining activity).
🔍 Key takeaways
Social platforms like the Fediverse and Bluesky show highly event-driven, volatile patterns, reflecting real-time community discussions.
Structured sources such as MISP Projec, The Shadowserver Foundation, and Nuclei offer more stable and reliable signals, ideal for validated intelligence.
Early detection: Social sources provide fast but noisy signals. Not to ignore.
Reliability: Structured intelligence confirms and contextualizes threats.
Better planning: Adaptive forecasting enables informed prioritization and workload management.
Balanced visibility: Combining heterogeneous sources gives stronger situational awareness.
📚 References
- [1] Automation tools: https://www.vulnerability-lookup.org/user-manual/sightings/#automation-tools
- [2] Be part of the community: https://vulnerability.circl.lu/user/signup
- Daily dumps: https://vulnerability.circl.lu/dumps/
- Forecasting project: https://github.com/vulnerability-lookup/TARDISsight
💶🇪🇺 Funding
This work is part of the EU-funded FETTA initiative, strengthening cross-European collaboration on threat intelligence.
cybersecurity
5299 readers
9 users here now
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
founded 2 years ago
MODERATORS
26
27
28
29
30
31
32
33
3
Cato CTRL™ Threat Research: HashJack - Novel Indirect Prompt Injection Against AI Browser Assistants
(www.catonetworks.com)
34
35
192
Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials
(cybersecuritynews.com)
36
37
38
39
40
50
We Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)
(www.youtube.com)
41
12
SilentButDeadly – Network Communication Blocker Tool That Neutralizes EDR/AV
(cybersecuritynews.com)
42
43
44
4
Privilege Escalation from lightdm Service User to root in KAuth Helper Service (CVE-2025-62876)
(security.opensuse.org)
45
46
47
48
49
50





