Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrushFTP auth bypass vulnerability: Disclosure mess leads to attacks

Outpost24 analysts recently discovered a critical authentication bypass vulnerability in CrushFTP, identified as CVE-2025-31161. The vulnerability has a CVSSv3.1 score of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8). We reached out to MITRE for a CVE on 13th March 2025 and were within an agreed 90-day non-disclosure period with CrushFTP. The plan was to give users plenty of time to patch before attackers were alerted to the vulnerability and able to exploit it.

How to Strengthen Your Network Security with LDAP Injection Defense

As organizations continue to rely on directories to store critical information such as user credentials, access permissions, and organizational data, the security of these directories becomes even more vital. LDAP (Lightweight Directory Access Protocol) is widely used for storing and managing this information. However, this reliance also makes LDAP directories a prime target for malicious attacks, with one of the most dangerous being LDAP injection attacks.

Top 5 Cyber Threats CultureAI Detected in Q1 2025

Cyber security threats continue to evolve, but one factor remains consistent: human error is still the greatest risk to modern businesses worldwide. Employees make mistakes, bypass security measures, and fall victim to sophisticated social engineering attacks, leading to devastating data breaches. Despite extensive security awareness training, the reality is that investing more time and money in training isn’t solving the problem.

Insight beyond annual risk using attack chain mapping

Thriving organizations maximally allocate resources. With seemingly infinite cybersecurity threats and finite resources, everyone needs to know the size of the threat to determine priority, and where to invest to maximize ROI. Elastic takes a quantified approach to cybersecurity risk management using FAIR to break threat scenarios into (A) likelihood and (B) losses to calculate risk per year, AKA annualized loss expectancy, or in FAIR terms, simply “risk”.

What are Zero-Day Attacks?

A Zero-Day Attack occurs when hackers exploit a previously unknown vulnerability in software or hardware before the developer has a chance to fix it. These attacks are particularly dangerous because there is no defense in place when they occur. In this video, we explain how Zero-Day attacks work and how you can protect your systems from these hidden threats.

Supply Chain Attacks: What You Should Know

Supply-chain attacks may not grab the headlines in the same way as ransomware or data breaches, but these horrific, sneaky cyberattacks are just as dangerous for your business. Here are five things you need to know about supply chain attacks, including what they are, why they happen, and how to prevent them.

Github Actions Supply Chain Attacks

This week, we discuss a recent cascading supply chain attack involving multiple Github actions workflows that nearly succeeded in compromising a popular Coinbase application. Before that, we discuss a novel way to download malware onto an endpoint by abusing a web browser's caching feature. Additionally, we cover an FBI alert on file converter malware scams.

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks

Organizations must develop robust programs to manage supply chain risks, both known and unknown, while prioritizing their most critical assets. Often referred to as the "crown jewels", these assets are the most valuable and vital to business success. Supply chain attacks exploit vulnerabilities in the network of suppliers, distributors, and other third-party partners to gain unauthorized access to sensitive data and systems.

Cloudflare DDoS Web Protection Demo

Cloudflare DDoS Web Protection provides automatic, intelligent DDoS mitigation from the edge of Cloudflare's global network — mitigating most attacks in three seconds. Advanced Adaptive DDoS Protection learns your unique traffic patterns and adapts to them to provide better protection against sophisticated DDoS attacks. Learn more.

What is DNS Poisoning & DNS Spoofing? Mitigation Tactics for 2026

When you type a familiar website address in your web browser, you expect to land on a particular webpage, but what if you are redirected to a fake website designed to steal your sensitive data? Cyber attackers trick your internet settings into sending you to fake websites instead of the real ones. This is called a DNS spoofing or poisoning attack which exploits vulnerabilities in the Domain Name System (DNS) to compromise the entire network.