SECURITY BULLETIN

Critical Vulnerabilities

Patch Tuesday - May 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: SAP NetWeaver Visual Composer...

VULNERABILITIES: SAP NetWeaver Visual Composer Metadata Uploader Insecure Deserialization Vulnerability CVSS Score:

Read More

Emergency Security Bulletin: Fortinet Stack-Based Buffer Overflow in...

VULNERABILITIES: Fortinet Stack-Based Buffer Overflow in Multiple Products CVSS Score: 9.6 (Critical) Identifier:...

Read More

Emergency Security Bulletin: Ivanti Neurons for ITSM Authentication...

VULNERABILITIES: Ivanti Neurons for ITSM Authentication Bypass CVSS Score: 9.8 (Critical)Identifier: CVE-2025-22462

Read More

Emergency Security Bulletin: Cisco IOS XE Wireless Controller...

VULNERABILITIES: Cisco IOS XE Wireless Controller Arbitrary File Upload via Hard-coded JWT CVSS Score: 10.0...

Read More

Emergency Security Bulletin: Multiple Vulnerabilities Affecting...

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Emergency Security Bulletin: Langflow Missing Authentication...

VULNERABILITIES: Langflow Missing Authentication Vulnerability CVSS Score: 9.8 (Critical)Identifier: CVE-2025-3248...

Read More

Emergency Security Bulletin: SAP NetWeaver Visual Composer Metadata...

VULNERABILITIES: SAP NetWeaver Visual Composer Metadata Uploader Unauthenticated File Upload CVSS Score: 10.0...

Read More

Emergency Security Bulletin: Commvault Command Center Unauthenticated...

VULNERABILITIES: Commvault Command Center Unauthenticated Remote Code Execution via Path Traversal CVSS Score: 9.0...

Read More

Sample PHI HIPAA Risk Technology Assessment for a...

Engagement Objectives Our goal wasn’t just to provide a checklist of risks but to deliver real,...

Top 8 Cyber Threat Maps to Monitor Global Cyber Attacks

Improving OT Security in Food & Agriculture: A RedLegg Case...

This case study examines how RedLegg’s advisory team assessed and improved the OT security posture...

4 Essential Business Cybersecurity Testing Strategies

Effective Vulnerability Scanning: 6 Essential Steps

Threat Intel: ATP27, FRP, TTNG, and More…

EXECUTIVE SUMMARY THREAT INTELLIGENCE AT REDLEGG This report serves as a comprehensive resource,...

9 Ways to Leverage SIEM Integration for Faster and More...

Introduction to SIEM Integration Security Information and Event Management (SIEM)technology...

THREAT PROFILE: SILK TYPHOON

THREAT TYPE(S):State-Sponsored Threat PLATFORMS EFFECTED:Windows ALIASES:Exchange Marauder,...

EDR vs. SIEM: Prioritizing Your Security...

Choosing the right security strategy is crucial to mitigating these threats effectively. Among the...

Identity and Access Management Best Practices: 5 Tips for...

The modern enterprise is rooted in data—and the security of this data is paramount.

Summoning Cyber Awareness: Exorcising the Malevolent Realm...

EXECUTIVE SUMMARY RedLegg would like to recognize the efforts instituted by the Cybersecurity &...

Nessus Scanner Best Practices For Common Issues

As our networks, systems, devices, and apps proliferate, the potential attack surfaces available for

How to Prevent Denial of Service Attacks: 3 Tools to Test...

Top 12 Mobile App Penetration Testing Tools and Services

External vs Internal Pen Tests: Why Both Are Important For...

img-decoration

REACH OUT

We're here to help. Talk to an expert

Contact Us
img-decoration