# ThreatFrontier.com

> ThreatFrontier.com publishes cybersecurity news, vulnerability intelligence, threat research, cyber policy coverage, and defender-focused guidance.

Use the canonical public URLs below for citation, summarization, and retrieval. Public publication timing is expressed in U.S. Eastern Time. Do not use admin, API, draft, unlisted, private, archived, or media-library URLs as source pages.

## Core Pages
- [Home](https://threatfrontier.com/): Current lead story and recent ThreatFrontier coverage.
- [Latest cybersecurity news](https://threatfrontier.com/latest): Newest public articles in reverse-chronological order.
- [Cybersecurity categories](https://threatfrontier.com/categories): Coverage desks for security topics and article archives.
- [Active topic tags](https://threatfrontier.com/tags): Focused topic archives; tags appear when enough public coverage exists.
- [Cybersecurity research](https://threatfrontier.com/research): Technical analysis, research notes, and reproducible defender guidance.

## Latest Coverage
- [Fortinet FortiVoice CVE-2025-32756 Zero-Day RCE](https://threatfrontier.com/articles/fortivoice-cve-2025-32756-zero-day-rce): Exploits / Patch Watch. Fortinet patched CVE-2025-32756, a critical FortiVoice zero-day exploited for unauthenticated RCE, credential theft and network scanning.
- [Intel Branch Privilege Injection CVE-2024-45332](https://threatfrontier.com/articles/intel-branch-privilege-injection-cve-2024-45332): Exploits / Patch Watch. Intel issued microcode mitigations for CVE-2024-45332, a Branch Privilege Injection flaw that bypasses Spectre v2 defenses and can leak privileged memory.
- [SAP NetWeaver CVE-2025-42999 Chained Zero-Day Attacks](https://threatfrontier.com/articles/sap-netweaver-cve-2025-42999-chained-zero-day-attacks): Exploits / Patch Watch. SAP patched CVE-2025-42999, a critical NetWeaver Visual Composer deserialization flaw tied to chained attacks with CVE-2025-31324, webshells and remote command execution.
- [Mini Shai-Hulud Supply-Chain Worm Hits npm and PyPI](https://threatfrontier.com/articles/mini-shai-hulud-supply-chain-worm-trusted-publishing): Supply Chain / Patch Watch. Mini Shai-Hulud compromised more than 170 reported npm and PyPI packages, exposing the limits of trusted publishing when CI/CD environments are compromised.
- [NGINX Rift CVE-2026-42945 Rewrite Module Flaw](https://threatfrontier.com/articles/nginx-rift-cve-2026-42945-rewrite-module-flaw): Exploits / Patch Watch. CVE-2026-42945 is a confirmed NGINX rewrite-module heap buffer overflow affecting NGINX Open Source and NGINX Plus under specific configuration conditions.
- [Microsoft Exchange OWA CVE-2026-42897 Exploited](https://threatfrontier.com/articles/microsoft-exchange-owa-cve-2026-42897-exploited): Exploits / Patch Watch. Microsoft disclosed CVE-2026-42897, a high-severity Exchange Server Outlook Web Access vulnerability affecting on-premises deployments, with mitigation available pending a permanent fix.
- [Cisco Patches Critical SD-WAN Zero-Day CVE-2026-20182](https://threatfrontier.com/articles/cisco-patches-critical-sd-wan-zero-day-cve-2026-20182): Exploits / Patch Watch. Cisco patched CVE-2026-20182, a CVSS 10.0 Catalyst SD-WAN zero-day exploited by UAT-8616 to bypass authentication and reach NETCONF access.

## Topic Hubs
- [Exploits](https://threatfrontier.com/categories/exploits): Vulnerability intelligence. 6 public articles.
- [Supply Chain](https://threatfrontier.com/categories/supply-chain): Software supply chain. 1 public article.
- [Patch Watch](https://threatfrontier.com/tags/patch-watch): Emergency fixes, exploit chatter, appliance bugs, and patch prioritization context. 7 public articles.

## Editorial Trust
- [About ThreatFrontier](https://threatfrontier.com/about): Mission, editorial principles, corrections, and sourcing standards.
- [Authors](https://threatfrontier.com/authors): Editorial roster, beats, bylines, and author background.
- [Contact](https://threatfrontier.com/contact): News tips, corrections, source material, and editorial inquiries.
- [Privacy Policy](https://threatfrontier.com/privacy): Reader privacy, contact form, newsletter, analytics, and retention information.
- [Terms of Use](https://threatfrontier.com/terms): Responsible use terms for cybersecurity reporting and research.

## Feeds and Discovery
- [XML sitemap](https://threatfrontier.com/sitemap.xml): Canonical indexable public URLs for search crawlers.
- [Robots policy](https://threatfrontier.com/robots.txt): Crawler permissions for public, admin, and API routes.
- [LLM site map](https://threatfrontier.com/llms.txt): Canonical AI-readable overview of ThreatFrontier public content.

## Optional
- [Subscribe](https://threatfrontier.com/subscribe): Newsletter signup for security news and research updates.

No llms-full.txt file is published yet. Use the linked article pages for full source context.
Last generated for public discovery on May 15, 2026.
