Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enumerating Users and Mailboxes in Microsoft Outlook 365 Web

During our research into Microsoft 365 security, we discovered a flaw in Outlook on the web (OWA) that exposed information about users and their mailboxes. By manipulating certain request headers against the “/owa/service.svc” endpoint, an attacker could not only confirm whether a user account existed, but also determine if that account had a mailbox associated with it.

CVE-2025-10573: Critical Unauthenticated Stored XSS in Ivanti Endpoint Manager

A newly disclosed vulnerability in Ivanti Endpoint Manager (EPM) tracked as CVE-2025-10573 allows unauthenticated attackers to inject persistent JavaScript into the EPM administrative dashboard. Assigned a CVSS score of 9.6, this vulnerability presents a critical security risk because it enables attackers to hijack administrator sessions and gain full control over managed endpoints.

Data Leakage: AI's Plumbing Problem

Sensitive information disclosure ranks on the OWASP Top 10 for LLM Applications, and for good reason. When AI-powered applications inadvertently expose private data like personally identifiable information (PII), financial records, health information, API keys, or proprietary business intelligence, the consequences cascade quickly: regulatory violations, competitive disadvantage, and shattered user trust.

GRC Engineering for Revenue Acceleration | TrustCloud

How to build a Customer Assurance and Continuous Control Monitoring Program that earns customer trust. Join us for a practical and insightful conversation on how transparent security and compliance posture sharing , high-confidence AI-assisted security questionnaire completion, and continuous control monitoring (CCM) translate directly into customer assurance, revenue acceleration, faster sales cycles, and higher buyer confidence.

Is CTEM a framework or a solution?

CTEM, introduced by Gartner, was designed to address a critical gap in traditional vulnerability management: the broken flow between detection and remediation. While reports and alerts pile up, exposures often remain unresolved, leaving organizations at risk. CTEM organizes this process into five stages—Scoping, Discovery, Prioritization, Validation, and Mobilization—bringing structure to chaos. Technically, it’s a framework because Gartner never mandated a single solution to deliver all stages. Most vendors only cover one or two.

A Mental Health Community For Cyber Professionals

The Mental Health in Cyber Security Foundation is a home for support, shared best practice and real stories about mental health in cybersecurity. The long-term vision is an organisation where people in the industry know they can go for advice, guidance and practical help with the pressures of their work.