Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2026-21643: Pre-Authentication SQL Injection in Endpoint Management Server Leading to Remote Code Execution

CVE-2026-21643 is a critical SQL injection vulnerability in the administrative web interface of FortiClient Endpoint Management Server version 7.4.4. It allows unauthenticated remote attackers to execute arbitrary SQL commands through specially crafted HTTP requests, primarily by injecting malicious payloads via the Site HTTP header.

Introducing PCI ASV Scanning: Continuous attack surface compliance in partnership with Clone Systems

Maintaining a secure external attack surface is no longer just about finding vulnerabilities; it’s about proving your resilience to partners, auditors, and regulatory bodies. Today, we are excited to announce Detectify’s PCI ASV Scanning, delivered in partnership with Clone Systems.

Optical Character Recognition (OCR) Explained

Most corporate work still revolves around documents. Invoices, contracts, onboarding forms, compliance records, and reports are used across teams every day. But a large portion of this information still exists as scanned files, PDFs, or even physical paper. And that creates a problem. You can store documents, but you cannot easily search, analyze, or automate them when the data is locked inside images or scanned files. That is where Optical Character Recognition (OCR) can help.

The Hidden Costs of Atlassian Cloud Migration: User Bloat, Sensitive Data, and How to Address Both

The single most common mistake in Atlassian cloud migration projects is treating migration as a straightforward technical exercise, exporting configurations, importing data, and switching environments. In practice, an unprepared migration transfers not just your data, but years of accumulated debt: inactive accounts, overstated license needs, and sensitive information that was never designed to exist in a shared cloud environment.

5 Themes From a Candid Discussion

The Eskenzi IT Security Analyst & CISO Forum wasn’t a typical security event. This forum was a gathering of CISOs, analysts, and security leaders speaking candidly under Chatham House Rule about what’s actually breaking, what’s working, and where things are heading. Here are 5 key themes that came through loud and clear. None of them were surprising. But together, they paint a pretty stark picture of where security and AI are right now.

Secure by Design: Building cybersecurity into the foundation

Secure by Design: Building cybersecurity into the foundation An explainer of why this philosophy matters and how it reduces attack surface from the inside Secure by Design is a software development philosophy that treats security as a foundational requirement rather than an afterthought.

You proved the value, finance is backing the growth: bringing Story copilot into the AI credit framework

It was a bold move, but our finance team was fully on board. They both approved and championed the approach. They wanted to see exactly how much value we could unlock for our customers. They didn't look at the resulting bill and ask us to slow down.