SECURITY BULLETIN

Critical Vulnerabilities

Emergency Security Bulletin: Cisco Identity Services Engine (ISE)...

About:

Read More

Emergency Security Bulletin: Authentication Bypass Vulnerability in...

About:

Read More

Emergency Security Bulletin: Fortinet TACACS+ Authentication Bypass...

About:

Read More

Emergency Security Bulletin: ConnectWise ScreenConnect ViewState Code...

About:

Read More

Emergency Security Bulletin: Multiple Vulnerabilities Affecting...

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Patch Tuesday - May 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: SAP NetWeaver Visual Composer...

VULNERABILITIES: SAP NetWeaver Visual Composer Metadata Uploader Insecure Deserialization Vulnerability CVSS Score:

Read More

Emergency Security Bulletin: Fortinet Stack-Based Buffer Overflow in...

VULNERABILITIES: Fortinet Stack-Based Buffer Overflow in Multiple Products CVSS Score: 9.6 (Critical) Identifier:...

Read More

Emergency Security Bulletin: Ivanti Neurons for ITSM Authentication...

VULNERABILITIES: Ivanti Neurons for ITSM Authentication Bypass CVSS Score: 9.8 (Critical)Identifier: CVE-2025-22462

Read More

Tales of the Unexpected: When Physical Security Fails

“No, ma’am. I can’t beep you in right now, I...

Sample PHI HIPAA Risk Technology Assessment for a...

Engagement Objectives Our goal wasn’t just to provide a checklist of risks but to deliver real,...

Top 8 Cyber Threat Maps to Monitor Global Cyber Attacks

Improving OT Security in Food & Agriculture: A RedLegg Case...

This case study examines how RedLegg’s advisory team assessed and improved the OT security posture...

4 Essential Business Cybersecurity Testing Strategies

Effective Vulnerability Scanning: 6 Essential Steps

Threat Intel: ATP27, FRP, TTNG, and More…

EXECUTIVE SUMMARY THREAT INTELLIGENCE AT REDLEGG This report serves as a comprehensive resource,...

9 Ways to Leverage SIEM Integration for Faster and More...

Introduction to SIEM Integration Security Information and Event Management (SIEM)technology...

THREAT PROFILE: SILK TYPHOON

THREAT TYPE(S):State-Sponsored Threat PLATFORMS EFFECTED:Windows ALIASES:Exchange Marauder,...

EDR vs. SIEM: Prioritizing Your Security...

Choosing the right security strategy is crucial to mitigating these threats effectively. Among the...

Identity and Access Management Best Practices: 5 Tips for...

The modern enterprise is rooted in data—and the security of this data is paramount.

Summoning Cyber Awareness: Exorcising the Malevolent Realm...

EXECUTIVE SUMMARY RedLegg would like to recognize the efforts instituted by the Cybersecurity &...

Nessus Scanner Best Practices For Common Issues

As our networks, systems, devices, and apps proliferate, the potential attack surfaces available for

How to Prevent Denial of Service Attacks: 3 Tools to Test...

Top 12 Mobile App Penetration Testing Tools and Services

img-decoration

REACH OUT

We're here to help. Talk to an expert

Contact Us
img-decoration