Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE202554236: Critical Adobe Commerce and Magento Open Source Flaw Allows Customer Account Takeover and RCE

On September 9, 2025, Adobe released an out-of-band security update to address a critical vulnerability in Adobe Commerce and Magento Open Source. The vulnerability, tracked as CVE-2025-54236 and referred to in open-source reporting as “SessionReaper,” allows a remote unauthenticated threat actor to take over customer accounts through the Commerce REST API.

Not All Cyberattacks Begin with a Phishing Attack, Hack or Exploited Vulnerability

In a day and age when cyber threats are top of mind, it may be difficult for an organization to shift gears and take its physical security precautions into consideration. This is to protect not only a firm’s physical assets but direct access to networks and information that an attacker could use at a later date for a cyberattack.

Report: Shadow AI Poses an Increasing Risk to Organizations

The use of “shadow AI” is an increasing security risk within organizations, according to a new report from Netskope. Shadow AI is a newer variant of shadow IT, in which employees use unauthorized technology without the knowledge of the IT department. This is generally driven by a desire for increased productivity rather than malicious motives, but employees are often unaware of the risks introduced by unauthorized tools.

"Yep, I got pwned. Sorry everyone, very embarrassing."

In essence, that is the disclosure and notification message that the open-source developer "qix" sent to the world when he was social engineered to give up access credentials to his GitHub account. Using his account, the attackers inserted malware in a series of popular NPM packages to direct cryptocurrency payments to their own wallets.

How To Build a HIPAA-Compliant Backup & Disaster Recovery Strategy

Backup solutions are key to security and data protection. For healthcare organizations, a reliable backup strategy not only enables rapid recovery after a disaster but also ensures operational resilience and helps maintain compliance with strict regulatory requirements like the Health Insurance Portability and Accountability Act (HIPAA).

Disaster Recovery Plan Checklist: Building an Effective Strategy for 2026

Businesses around the world face unexpected disruptions ranging from cyberattacks to natural disasters. Data breaches have also become a pressing concern for companies worldwide, with the average cost of a breach reaching an all-time high of USD 4.45 million in 2023. Such events can cause catastrophic data loss and operational downtime. This is where a robust disaster recovery plan becomes more than a safety net, it’s a crucial element of business resilience.

From CISO to SOC Managers: Why Leadership Continuity Matters in Cybersecurity

In today's digital-first world, cybersecurity is no longer just a technical concern - it's a business-critical priority. As threats evolve and become more sophisticated, organizations rely on skilled leaders to manage governance, strategy, and daily operations. While many companies invest heavily in tools and technology, fewer focus on ensuring continuity among their security leadership teams. From Chief Information Security Officers (CISOs) to Security Operations Center (SOC) managers, leadership continuity is an often-overlooked element that can make the difference between resilience and vulnerability.

Smart Chairs, Safer Spaces: Preventing Cyber Threats in AI-Connected Restaurant Furniture

In restaurants across the world, chairs are no longer just places to sit. Many are becoming smart, equipped with sensors and AI features that adjust posture, monitor temperature, or even personalize the dining experience. This innovation brings comfort and efficiency to dining spaces, but it also introduces new risks that many business owners overlook.

Free anti-detect browser: How it can actually be useful for you

When people hear the term antidetect browser it sometimes sounds like something straight out of a hacker forum. In reality, these tools are increasingly accessible, and some of them even offer free versions. Take WADE X, for example: it lets you create a limited number of browser profiles at no cost. Sure, the features are restricted compared to the paid editions, but for someone who just wants to stay private online or run a couple of separate accounts, that's often more than enough.