SECURITY BULLETIN

Critical Vulnerabilities

Emergency Security Bulletin: SAP NetWeaver Visual Composer Metadata...

VULNERABILITIES: SAP NetWeaver Visual Composer Metadata Uploader Unauthenticated File Upload CVSS Score: 10.0...

Read More

Emergency Security Bulletin: Commvault Command Center Unauthenticated...

VULNERABILITIES: Commvault Command Center Unauthenticated Remote Code Execution via Path Traversal CVSS Score: 9.0...

Read More

Emergency Security Bulletin: Erlang/OTP SSH Unauthenticated Remote...

VULNERABILITIES: Critical Vulnerability affecting Erlang OTP CVSS Score: 10.0 (Critical) Identifier: CVE-2025-32433...

Read More

Emergency Security Bulletin: Gladinet CentreStack Hardcoded...

VULNERABILITIES: Gladinet CentreStack Hardcoded machineKey Deserialization Vulnerability CVSS Score: 9.8 (Critical) ...

Read More

Patch Tuesday - April 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: Fortinet FortiSwitch Unverified Password...

VULNERABILITIES: Fortinet FortiSwitch Unverified Password Change Vulnerability CVSS Score: 9.3 (Critical) Identifier:

Read More

Emergency Security Bulletin: pgAdmin 4 Remote Code Execution...

VULNERABILITIES: Critical Vulnerability Affecting pgAdmin 4, An Administration & Management Tool for PostgreSQL...

Read More

Emergency Security Bulletin: Apache Parquet RCE Vulnerability

VULNERABILITIES: Apache Parquet Java Schema Parsing Remote Code Execution Vulnerability CVSS Score: 10.0 (Critical) ...

Read More

Emergency Security Bulletin: Ivanti Connect Secure, Policy Secure &...

VULNERABILITIES: Critical Vulnerability affecting Ivanti Connect Secure, Policy Secure & ZTA Gateways CVSS Score: ...

Read More

Sample PHI HIPAA Risk Technology Assessment for a...

Engagement Objectives Our goal wasn’t just to provide a checklist of risks but to deliver real,...

Top 8 Cyber Threat Maps to Monitor Global Cyber Attacks

Improving OT Security in Food & Agriculture: A RedLegg Case...

This case study examines how RedLegg’s advisory team assessed and improved the OT security posture...

4 Essential Business Cybersecurity Testing Strategies

Effective Vulnerability Scanning: 6 Essential Steps

Threat Intel: ATP27, FRP, TTNG, and More…

EXECUTIVE SUMMARY THREAT INTELLIGENCE AT REDLEGG This report serves as a comprehensive resource,...

9 Ways to Leverage SIEM Integration for Faster and More...

Introduction to SIEM Integration Security Information and Event Management (SIEM)technology...

THREAT PROFILE: SILK TYPHOON

THREAT TYPE(S):State-Sponsored Threat PLATFORMS EFFECTED:Windows ALIASES:Exchange Marauder,...

EDR vs. SIEM: Prioritizing Your Security...

Choosing the right security strategy is crucial to mitigating these threats effectively. Among the...

Identity and Access Management Best Practices: 5 Tips for...

The modern enterprise is rooted in data—and the security of this data is paramount.

Summoning Cyber Awareness: Exorcising the Malevolent Realm...

EXECUTIVE SUMMARY RedLegg would like to recognize the efforts instituted by the Cybersecurity &...

Nessus Scanner Best Practices For Common Issues

As our networks, systems, devices, and apps proliferate, the potential attack surfaces available for

How to Prevent Denial of Service Attacks: 3 Tools to Test...

Top 12 Mobile App Penetration Testing Tools and Services

External vs Internal Pen Tests: Why Both Are Important For...

img-decoration

REACH OUT

We're here to help. Talk to an expert

Contact Us
img-decoration