<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/rss/stylesheet/" type="text/xsl"?>
<rss xmlns:content='http://purl.org/rss/1.0/modules/content/' xmlns:taxo='http://purl.org/rss/1.0/modules/taxonomy/' xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#' xmlns:itunes='http://www.itunes.com/dtds/podcast-1.0.dtd' xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:atom='http://www.w3.org/2005/Atom' xmlns:podbridge='http://www.podbridge.com/podbridge-ad.dtd' version='2.0'>
<channel>
  <title>Dragon Security Threat Intelligence Feed</title>
  <language>en-us</language>
  <generator>microfeed.org</generator>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <atom:link rel="self" href="https://dstif.pages.dev/rss/" type="application/rss+xml"/>
  <link>https://dstif.io</link>
  <description>
    <![CDATA[<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href="https://github.com/DragonSecurity/dstif" rel="noopener noreferrer" target="_blank">https://github.com/DragonSecurity/dstif</a></p>]]>
  </description>
  <itunes:author>Dragon Security</itunes:author>
  <itunes:image href="https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png"/>
  <image>
    <title>Dragon Security Threat Intelligence Feed</title>
    <url>https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png</url>
    <link>https://dstif.io</link>
  </image>
  <copyright>©2024 Dragon Security</copyright>
  <itunes:category text="Business"/>
  <itunes:category text="Technology"/>
  <item>
    <title>📢 CVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., &quot;^(a|a)*$&quot;) combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.</title>
    <guid>JrjWCk8_qgJ</guid>
    <pubDate>Sat, 28 Feb 2026 09:39:45 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-02-28T09:39:45<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69873?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69873?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69873?utm_source=dstif.io</link>
  </item>
</channel>
</rss>