Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SAP Zero-Day CVE-2025-31324: Unauthenticated RCE in NetWeaver VCFRAMEWORK

SAP disclosed a critical RCE vulnerability(CVE-2025-31324) on April 24, 2025, impacting the Visual Composer Framework in NetWeaver Application Server Java, version 7.50. This flaw poses a serious risk to enterprises relying on SAP NetWeaver for their mission-critical operations. Unauthenticated attackers can exploit this vulnerability to upload and run arbitrary files on SAP servers, potentially resulting in complete system compromise.

SWIFT Security Controls:Best Practices for Financial Institutions

SWIFT, the global backbone for secure financial messaging, plays a critical role in enabling fast and reliable cross-border transactions. But as cyber threats grow more advanced, financial institutions must implement robust SWIFT security controls to safeguard their systems and prevent fraud. The SWIFT Customer Security Programme (CSP) was established to enhance cybersecurity hygiene across its network, helping institutions protect against fraud and cyberattacks.

EP 7- Resilience in Identity Management: Avoiding Single Points of Failure

In this episode of Security Matters, host David Puner sits down with Eric Olden, co-founder and CEO of Strata Identity, and a pioneer in modern identity management. Eric shares his career journey, from founding Simplified to leading Oracle’s global identity division, and discusses the critical importance of resilience in identity systems.

Beyond Attachments: How Email Becomes Your Biggest Data Exfiltration Vector

Your Microsoft 365 and Google Workspace security dashboards show green across all metrics. You've implemented data loss prevention policies, enabled advanced threat protection, and your team regularly audits security logs. Yet sensitive data continues to leave your organization through email channels. Why? Because attackers and even non-malicious insiders aren't using the obvious exfiltration techniques your tools were built to detect.

Stop Chasing Payments: Why Freelancers Need Automated Invoicing

Freelancing offers freedom, flexibility, and full control over your time - but when it comes to getting paid, that independence can come at a cost. If you've ever found yourself chasing down late payments or wondering which invoices are still outstanding, you're not alone. For growing creative businesses and solo professionals alike, payment delays aren't just inconvenient - they affect cash flow, strain client relationships, and take time away from doing real, billable work.

How Cyber Security Maturity Assessments Help Strengthen Business Defenses

In today's digitally-driven world, where data is currency and cyber threats evolve faster than ever, businesses of all sizes face increasing pressure to fortify their cybersecurity strategies. From ransomware to phishing attacks, the threat landscape is both complex and unforgiving. Organizations can no longer afford to be reactive about their security posture. Instead, they must take a proactive and strategic approach-and that's exactly where a cyber security maturity assessment becomes essential.

Ransomware Response Plan: What Steps Schools and Libraries Should Take After an Attack

In Part 1 of this blog series The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks, we discussed creating a pre-incident plan that includes a backup process, asset management, identity and access management, risk-based vulnerability management, and security awareness training to minimize the risk of ransomware attacks.

Get Ready for the 2025 Trustwave Risk Radar Report - Hospitality Sector

Trustwave SpiderLabs’ upcoming report, the 2025 Trustwave Risk Radar Report: Hospitality Sector, will be released on May 21 and will delve into the latest threat landscape, highlighting critical vulnerabilities and offering actionable insights to help hospitality businesses stay secure. The report notes that the hospitality industry has become a prime target for cybercriminals, with threats growing in volume and sophistication.

Cloud SIEM and Flex Logs: Enhanced security insights for the cloud

One of the primary challenges with developing in the cloud is knowing which areas of your environment are vulnerable to risks. In order to efficiently identify and respond to legitimate risks, you need real-time visibility into security events. But traditional security platforms are costly and often standalone, which means they may create gaps in visibility.