SECURITY BULLETIN

Critical Vulnerabilities

Patch Tuesday - December 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: Windows Cloud Files Mini Filter Driver...

About: CVE-2025-62221 is a use-after-free vulnerability in the Windows Cloud Files Mini Filter Driver (cldflt.sys) that...

Read More

Emergency Security Bulletin: Improper Verification of Cryptographic...

About: CVE-2025-10573 is a critical stored cross-site scripting (XSS) vulnerability in Ivanti Endpoint Manager (EPM)...

Read More

Emergency Security Bulletin: Stored Cross-Site Scripting (XSS) in...

About: CVE-2025-10573 is a critical stored cross-site scripting (XSS) vulnerability in Ivanti Endpoint Manager (EPM)...

Read More

Emergency Security Bulletin: Unauthenticated Remote Code Execution in...

About: CVE-2025-55182 is a critical unauthenticated remote code execution vulnerability affecting React Server...

Read More

Emergency Security Bulletin: Authentication Bypass in Oracle Identity...

About: CVE-2025-61757 is a critical authentication bypass vulnerability in Oracle Identity Manager’s REST WebServices...

Read More

Emergency Security Bulletin: OS Command Injection in Fortinet...

About: CVE-2025-58034 is a high-severity OS command injection vulnerability in Fortinet FortiWeb appliances that allows...

Read More

Emergency Security Bulletin: Relative Path Traversal Allowing Remote...

About: CVE-2025-12480 is a critical improper access control vulnerability in Gladinet Triofox that allows...

Read More

Emergency Security Bulletin: Gladinet Triofox Improper Access Control...

About: CVE-2025-12480 is a critical improper access control vulnerability in Gladinet Triofox that allows...

Read More

Tabletop Exercises: The Missing Piece in Business...

A documented incident response (IR) plan is often treated like a security milestone. It's the sign...

What SOC 2 Doesn’t Tell You About Third‑Party Risk

Does a clean SOC 2 report mean your vendor is secure? While SOC 2 is an important compliance...

Social Engineering Prevention: What Still Works (and What...

How Social Engineering Is Evolving in 2025 Social engineering has always been a moving target. In...

How to Run a Ransomware Tabletop Exercise That Actually...

What If Your Team Were Hit by Ransomware Today? The screens are dark. File names are encrypted....

Inside the First Week of an Internal Penetration Test: What...

What happens if an attacker bypasses your security defenses and compromises your internal network?...

Essential Cybersecurity KPIs for Measuring Security...

Every CISO wants to know: Are we actually reducing risk, or just reporting faster? Measuring...

The Role of Retesting in Vulnerability Remediation...

Summary: Post-remediation validation represents an important component of comprehensive security...

How to Build an IAM Adoption Strategy Rooted in People, Not...

“One technical mentor to show me how things work, and one cultural mentor to show me how things...

Transition Trap: Why WPA3 Isn’t Bulletproof Against an Evil...

WPA3 was designed to improve wireless security, but when misconfigured, it can still leave networks...

Tales of the Unexpected: When Physical Security Fails

“No, ma’am. I can’t beep you in right now, I...

Sample PHI HIPAA Risk Technology Assessment for a...

Engagement Objectives Our goal wasn’t just to provide a checklist of risks but to deliver real,...

Top 8 Cyber Threat Maps to Monitor Global Cyber Attacks

Improving OT Security in Food & Agriculture: A RedLegg Case...

This case study examines how RedLegg’s advisory team assessed and improved the OT security posture...

4 Essential Business Cybersecurity Testing Strategies

Vulnerability Scanning Best Practices: 6 Key Steps to...

img-decoration

REACH OUT

We're here to help. Talk to an expert

Contact Us
img-decoration