Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-25256: PoC Available for FortiSIEM Remote Unauthenticated Command Injection Vulnerability

On August 12, 2025, Fortinet released fixes for a critical-severity vulnerability in FortiSIEM, tracked as CVE-2025-25256. The flaw arises from improper neutralization of special elements used in an OS command within the phMonitor service (TCP/7900). Successful exploitation could allow a remote, unauthenticated threat actor to execute unauthorized code or commands via crafted CLI requests.

Ransomware Evolution: The Changing Landscape of Cyber Extortion

Cybercriminals are shifting tactics. Rather than relying solely on ransomware’s tried-and-true method of using encryption to lock files and demand payment to decrypt, many are now instead embracing exfiltration and extortion, with encryption as a secondary tactic. This marks a significant evolution in ransom-based attack methods, one where encryption is optional, but leverage is mandatory.

CVE-2025-53786: U.S. CISA Issues Emergency Directive for Post-Authentication Vulnerability in Microsoft Exchange Hybrid Configurations

On August 6, 2025, Microsoft disclosed a high-severity post-authentication vulnerability affecting on-premises Microsoft Exchange servers configured for hybrid-joined environments, tracked as CVE-2025-53786. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-02, requiring federal agencies to patch the vulnerability by Monday, August 11.

The Role of AI in Cybersecurity

Artificial intelligence (AI) is not a new concept or technology in the world of cybersecurity. It’s been iterated and utilized by security professionals for decades. But as both cybersecurity technology and cyber threats continue to advance, AI is being adopted by organizations at a rapid pace, all of whom seek to harness AI’s power to automate, advance, and empower their security.

CVE-2025-54948 & CVE-2025-54987: Trend Micro Releases Mitigation Tool for Actively Exploited Apex One Vulnerabilities

On August 5, 2025, Trend Micro released a short-term mitigation tool addressing two critical command injection vulnerabilities (CVE-2025-54948 and CVE-2025-54987) in Apex One. These flaws affect the on-premise Apex One Management Console and have been exploited in the wild. Both stem from a command injection issue that allows unauthenticated, remote threat actors to execute arbitrary code on vulnerable systems. While the vulnerabilities are similar, they differ based on the targeted CPU architectures.

Embracing "Coopetition": It's Time to Build a Security Industry That Works Together

The cybersecurity industry is intensely competitive. Thousands of vendors are locked in a daily battle for market share, deploying technologies that can become outdated almost as quickly as they’re released. But unlike most industries, we’re not just competing with each other. We’re also up against a shared adversary. So, here’s the uncomfortable question: if our real fight is against attackers, why aren’t we doing more to work together?

Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN

In late July 2025, Arctic Wolf observed an increase in ransomware activity targeting SonicWall firewall devices for initial access. In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through SonicWall SSL VPNs. While credential access through brute force, dictionary attacks, and credential stuffing have not yet been definitively ruled out in all cases, available evidence points to the existence of a zero-day vulnerability.

Scaling Vector Databases With Novel Partitioning Methodologies

Imagine: A newly acquired dataset is being prepared for use as a vector database to retrieve information, create recommendation systems, be used for threat detection or similarity-based alert triage. During integration, however, operational challenges surface. Platform constraints prevent full-scale ingestion, prompting an arbitrary reduction in the size of the dataset. As a result, performance degrades significantly.

What Is PCI DSS and How Can Organizations Best Maintain Compliance?

The world is going cashless. The Federal Reserve reported that cash was used in just 16% of all U.S. transactions in 2024. And that number is expected to continue to decline. The widespread use of credit and debit cards, plus the rise of digital wallets and contactless payments, have reshaped the financial landscape, increasing flexibility as well as financial protection. However, it’s also increased the levels of fraud.

Incident Response, Reinvented: Arctic Wolf's Incident360 Retainer

Cyber attacks aren’t a question of if, but when. Yet for many midmarket and small enterprises, the tools and models to prepare for these threats have long been out of reach — often too complex, expensive, or ineffective. Traditional incident response (IR) retainers, designed for a different era, have only added to this challenge by creating financial and operational uncertainty when organizations need clarity the most.