Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE202547813: Wing FTP Server vulnerability flagged by CISA

CVE-2025-47813 is an information disclosure vulnerability in Wing FTP Server that reveals the application's full installation path when attackers send an oversized UID cookie value. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog in March 2026, indicating active exploitation in the wild.

Why our AI world demands a remediation-first approach to exposure management

Editor's note: This guest article by Tanium Senior Sirector, Product Management, Julia Grunewald was originally published in SC Media Exposure management has emerged as a powerful alternative to traditional vulnerability management for good reason. A proactive, always‑on security discipline that continuously identifies an organization’s exposures and prioritizes them based on risk helps us know where to best focus our limited resources.

Why EDR isn't enough on its own

Editor's note: The following guest contribution is by Tanium Domain Acrchitect, Jim Kelly Think about your last security event. Was your team confident nothing was missed? Were there questions about where else this could have left persistence? Most often we are left with uncertainty. That uncertainty can show up in every serious incident. An alert fires, the SOC responds. The immediate threat looks like it is contained.

What is threat and vulnerability management? Essential cybersecurity guide

Threat and vulnerability management (TVM) is a continuous, risk-based cybersecurity discipline that combines vulnerability assessment with threat intelligence to identify, prioritize, and remediate security weaknesses before attackers can exploit them. Rather than treating vulnerability scanning and threat detection as separate activities, TVM integrates both into a unified lifecycle that connects visibility, context, action, and validation.