Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Blind Spots to Resilience: Why Visibility Is the Foundation of OT Security

In today’s industrial environments, the single biggest barrier to securing operations is not technology, not budget, not even talent–it’s visibility. You cannot protect what you cannot see. In Operational Technology (OT), visibility has two dimensions: Without this combined view, organizations are left guessing where their crown jewels sit, how traffic flows across the environment and where vulnerabilities or attack paths may hide.

November 10, 2025 Cyber Threat Intelligence Briefing

Microsoft’s DART team identified a new backdoor named SESAMEOP in July 2025 that uses the OpenAI Assistants API as its command and control (C2) channel. Proofpoint has detailed a campaign targeting freight and trucking companies using remote monitoring and management (RMM) tools to steal cargo. Security researchers at Catchify identified a critical unauthenticated remote code execution vulnerability in the UniFi Access backup/export workflow, tracked as CVE-2025-52665, with a CVSS score of 10.0 (critical).

November 03, 2025 Cyber Threat Intelligence Briefing

A critical remote code execution vulnerability in the Windows Server Update Services (WSUS) server role tracked as CVE 2025 59287 (CVSS: 9.8) addressed in the October patch cycle is under active exploitation. Researchers at RandoriSec produced a report on the current state of Microsoft Teams Access Token theft, a tactic that has been used by many threat actor groups to move laterally within environments and assist in internal phishing attacks.

Kroll Conversations: Meet the DFIR Experts

A cyberattack is one of the most devastating experiences a company can go through. Yet for Jaycee Roth and Justin Harvey, being there for organizations when the worst happens is business-as-usual. As part of the Digital Forensics and Incident Response (DFIR) team within Kroll’s Cyber and Data Resilience business, their guidance and support ensures companies can recover fully from the disruption caused by a security incident.

Widespread Installation of Calendaromatic Adware Includes Homoglyph Channel

Kroll has recently seen a widespread installation of an application called Calendaromatic, that Kroll Threat Intelligence (TI) is currently classifying as a potentially unwanted program (adware) but displays some functionality that gives it the potential to conduct more malicious behaviors.