{"version":"https://jsonfeed.org/version/1.1","title":"Dragon Security Threat Intelligence Feed","home_page_url":"https://dstif.io","feed_url":"https://dstif.pages.dev/json/","description":"<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href=\"https://github.com/DragonSecurity/dstif\" rel=\"noopener noreferrer\" target=\"_blank\">https://github.com/DragonSecurity/dstif</a></p>","icon":"https://cdn.dstif.io\t/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png","favicon":"https://dstif.pages.dev/assets/default/favicon.png","authors":[{"name":"Dragon Security"}],"language":"en-us","items":[{"id":"JrjWCk8_qgJ","title":"📢 CVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., \"^(a|a)*$\") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69873?utm_source=dstif.io","content_html":"Date: 2026-02-28T09:39:45<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69873?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69873?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-02-28T09:39:45\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69873?utm_source=dstif.io\n","date_published":"2026-02-28T09:39:45.000Z","_microfeed":{"web_url":"https://dstif.pages.dev/i/cve-2025-69873-ajv-another-json-schema-validat-JrjWCk8_qgJ/","json_url":"https://dstif.pages.dev/i/JrjWCk8_qgJ/json/","rss_url":"https://dstif.pages.dev/i/JrjWCk8_qgJ/rss/","guid":"JrjWCk8_qgJ","status":"published","date_published_short":"Sat Feb 28 2026","date_published_ms":1772271585000}}],"_microfeed":{"microfeed_version":"0.1.5","base_url":"https://dstif.pages.dev","categories":[{"name":"Business"},{"name":"Technology"}],"subscribe_methods":[{"name":"RSS","type":"rss","url":"https://dstif.pages.dev/rss/","image":"https://dstif.pages.dev/assets/brands/subscribe/rss.png","enabled":true,"editable":false,"id":"NtQvlJdq8M0"},{"name":"JSON","type":"json","url":"https://dstif.pages.dev/json/","image":"https://dstif.pages.dev/assets/brands/subscribe/json.png","enabled":true,"editable":false,"id":"N1TIyFiPgia"}],"description_text":"The Dragon Security Threat Intelligence Feed project compiles a diverse set of\nRSS feeds from reputable sources in cybersecurity, threat intelligence,\ntechnology news, and other institutions. These feeds are intended for security\nprofessionals, researchers, and enthusiasts to stay informed on the latest\nsecurity threats, vulnerabilities, industry trends, economic indicators, and\npolicy changes.\n\n\n\n\nWe provide this service free of charge to promote the common knowledge of cyber\nand security.\n\n\n\n\nPlease be aware that the feed aggregator is an automated bot, and sometimes\nduplication happens. We apologise for it in advance. Should you wish to report\nany issues, such as duplication, or wish to request additional feeds be added to\nthe aggregator, please let us know by opening an issue on\nhttps://github.com/DragonSecurity/dstif","copyright":"©2024 Dragon Security","itunes:type":"episodic","items_sort_order":"newest_first"}}