Five Practical Use Cases on How AI Is Transforming SOCs for Threat Mitigation AI is reshaping cybersecurity on both sides of the battlefield. While attackers use it to scale threats, defenders are using AI to reduce noise, accelerate investigations and improve response. This blog provides five real-world SOC use cases for mitigating threats.
Expect Fallout After Remote Access Trojan Added to Popular JavaScript NPM Package A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software packages, to distribute a cross-platform, remote access Trojan. Identifying the full fallout from the attack could take some time, experts warned.
A vulnerability, which was classified as problematic, was found in Free5GC 4.2.0. The affected element is an unknown function of the component aper. Such manipulation leads to type confusion.
This vulnerability is traded as CVE-2026-5360. The attack may be launched remotely. Furthermore, there is an exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability, which was classified as critical, has been found in DedeCMS 5.7.118. Impacted is an unknown function of the component Module Handler. This manipulation of the argument setup tag causes unrestricted upload.
This vulnerability appears as CVE-2026-30643. The attack may be initiated remotely. There is no available exploit.
A vulnerability classified as problematic was found in streetwriters notesnook up to 3.3.16. This issue affects some unknown processing. The manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-33978. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Sinaptik AI pandas-ai 3.0.0. This vulnerability affects the function pandasai.agent.base._execute_sql_query. The manipulation leads to sql injection.
This vulnerability is documented as CVE-2026-30273. The attack can be initiated remotely. There is not any exploit available.