SECURITY BULLETIN

Critical Vulnerabilities

Emergency Security Bulletin: Cisco IOS and IOS XE SNMP Denial of...

About: CVE-2025-20352 is a stack-based buffer overflow in Cisco IOS and IOS XE’s SNMP subsystem, exploitable via...

Read More

Emergency Security Bulletin: SolarWinds Web Help Desk AjaxProxy...

About: CVE-2025-26399 is a critical deserialization vulnerability in SolarWinds Web Help Desk’s AjaxProxy component,...

Read More

Emergency Security Bulletin: GoAnywhere MFT License Servlet...

About: CVE-2025-10035 is a critical deserialization vulnerability in GoAnywhere MFT’s License Servlet, allowing remote...

Read More

Emergency Security Bulletin: Leakage of Firewall Configuration Data...

About: The MySonicWall Cloud Backup File Incident exposed firewall configuration backups, leaking sensitive data such...

Read More

Emergency Security Bulletin: SAP NetWeaver RMI-P4 Insecure...

About: CV E-2025-42944 is a critical vulnerability i n SAP NetWeaver (AS Java), specifically within its RMI-P4 module.

Read More

Patch Tuesday - September 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: Citrix NetScaler Memory Overflow Remote...

About:

Read More

Emergency Security Bulletin: Git arbitrary file write leading to...

About:

Read More

Emergency Security Bulletin: Trend Micro Apex One Management Console...

About:

Read More

Social Engineering Prevention in 2025—What Still Works (and...

How Social Engineering Is Evolving in 2025 Social engineering has always been a moving target. In...

How to Run a Ransomware Tabletop Exercise That Actually...

What If Your Team Were Hit by Ransomware Today? The screens are dark. File names are encrypted....

Inside the First Week of an Internal Penetration Test: What...

What happens if an attacker bypasses your security defenses and compromises your internal network?...

From Numbers to Narrative: Rethinking Cyber Security KPIs...

Every CISO wants to know: Are we actually reducing risk, or just reporting faster? In 2025,...

The Role of Retesting in Vulnerability Remediation...

Summary: Post-remediation validation represents an important component of comprehensive security...

How to Build an IAM Adoption Strategy Rooted in People, Not...

“One technical mentor to show me how things work, and one cultural mentor to show me how things...

Transition Trap: Why WPA3 Isn’t Bulletproof Against an Evil...

WPA3 was designed to improve wireless security, but when misconfigured, it can still leave networks...

Tales of the Unexpected: When Physical Security Fails

“No, ma’am. I can’t beep you in right now, I...

Sample PHI HIPAA Risk Technology Assessment for a...

Engagement Objectives Our goal wasn’t just to provide a checklist of risks but to deliver real,...

Top 8 Cyber Threat Maps to Monitor Global Cyber Attacks

Improving OT Security in Food & Agriculture: A RedLegg Case...

This case study examines how RedLegg’s advisory team assessed and improved the OT security posture...

4 Essential Business Cybersecurity Testing Strategies

Vulnerability Scanning Best Practices: 6 Key Steps to...

Threat Intel: ATP27, FRP, TTNG, and More…

EXECUTIVE SUMMARY THREAT INTELLIGENCE AT REDLEGG This report serves as a comprehensive resource,...

9 Ways to Leverage SIEM Integration for Faster and More...

Introduction to SIEM Integration Security Information and Event Management (SIEM)technology...

img-decoration

REACH OUT

We're here to help. Talk to an expert

Contact Us
img-decoration