SECURITY BULLETIN

Critical Vulnerabilities

Emergency Security Bulletin: Relative Path Traversal Allowing Remote...

About: CVE-2025-12480 is a critical improper access control vulnerability in Gladinet Triofox that allows...

Read More

Emergency Security Bulletin: Gladinet Triofox Improper Access Control...

About: CVE-2025-12480 is a critical improper access control vulnerability in Gladinet Triofox that allows...

Read More

Patch Tuesday - November 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: SQL Anywhere Monitor Vulnerable to...

About: CVE-2025-42890 is a critical SAP SQL Anywhere Monitor vulnerability caused by hard-coded credentials that allow...

Read More

Emergency Security Bulletin: Cisco Unified Contact Center Express...

About: Cisco has published a security advisory for CVE-2025-20354 and released fixed software versions for affected...

Read More

Emergency Security Bulletin: ASP.NET Core HTTP Request Smuggling...

About: CVE-2025-55315 is a critical HTTP request smuggling vulnerability in ASP.NET Core that allows attackers to...

Read More

Emergency Security Bulletin: F5 Networks Source Code and...

About: The F5 Networks incident involves unauthorized access to internal development systems, resulting in the theft of...

Read More

Emergency Security Bulletin: Cleartext Transmission of Sensitive...

About: CVE-2025-11492 is a critical flaw in ConnectWise Automate agents that transmit data over HTTP instead of HTTPS,...

Read More

Patch Tuesday - October 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Tabletop Exercises: The Missing Piece in Business...

A documented incident response (IR) plan is often treated like a security milestone. It's the sign...

What SOC 2 Doesn’t Tell You About Third‑Party Risk

Does a clean SOC 2 report mean your vendor is secure? While SOC 2 is an important compliance...

Social Engineering Prevention: What Still Works (and What...

How Social Engineering Is Evolving in 2025 Social engineering has always been a moving target. In...

How to Run a Ransomware Tabletop Exercise That Actually...

What If Your Team Were Hit by Ransomware Today? The screens are dark. File names are encrypted....

Inside the First Week of an Internal Penetration Test: What...

What happens if an attacker bypasses your security defenses and compromises your internal network?...

Essential Cybersecurity KPIs for Measuring Security...

Every CISO wants to know: Are we actually reducing risk, or just reporting faster? Measuring...

The Role of Retesting in Vulnerability Remediation...

Summary: Post-remediation validation represents an important component of comprehensive security...

How to Build an IAM Adoption Strategy Rooted in People, Not...

“One technical mentor to show me how things work, and one cultural mentor to show me how things...

Transition Trap: Why WPA3 Isn’t Bulletproof Against an Evil...

WPA3 was designed to improve wireless security, but when misconfigured, it can still leave networks...

Tales of the Unexpected: When Physical Security Fails

“No, ma’am. I can’t beep you in right now, I...

Sample PHI HIPAA Risk Technology Assessment for a...

Engagement Objectives Our goal wasn’t just to provide a checklist of risks but to deliver real,...

Top 8 Cyber Threat Maps to Monitor Global Cyber Attacks

Improving OT Security in Food & Agriculture: A RedLegg Case...

This case study examines how RedLegg’s advisory team assessed and improved the OT security posture...

4 Essential Business Cybersecurity Testing Strategies

Vulnerability Scanning Best Practices: 6 Key Steps to...

img-decoration

REACH OUT

We're here to help. Talk to an expert

Contact Us
img-decoration