Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Faster Fixes: Solving the Security Testing Trade-off

Pen testers use active testing technologies to probe and analyze systems dynamically, just as an attacker does. Active testing confirms whether a vulnerability is actually exploitable, which security teams use to determine which vulnerabilities to prioritize for remediation. Active security testing delivers confidence, sorely needed in today’s IT security world where noise and false positives have become a major part of an analyst’s day.

Exploited! Ivanti EPMM Authentication Bypass & Remote Code Execution (CVE-2025-4427 & CVE-2025-4428)

Ivanti’s Endpoint Manager Mobile (EPMM, formerly MobileIron Core) just delivered an unpleasant one-two punch to defenders. Two fresh vulnerabilities—an authentication bypass (CVE-2025-4427) and an API-level remote-code-execution flaw (CVE-2025-4428)—can be chained to grant unauthenticated attackers full command execution on affected servers. Both issues are already being exploited in the wild, making rapid remediation essential. In this article.

PCI DSS 4.0 Compliance Guide: From Confusion to Confidence

PCI DSS 4.0 introduces critical new payment security requirements that impact every business accepting card payments. With enforcement deadlines, organizations must now implement comprehensive monitoring of payment page code—something IONIX has specialized in for years. In this article.

A practitioner's guide to classifying every asset in your attack surface

“You can’t secure what you don’t know exists.” It’s a common refrain in cybersecurity (and for good reason!). But the reality is a bit more complex: it’s not enough to just know that something exists. To effectively secure your assets, you need to understand what each of them is. Without proper classification, applying the right security processes or tools becomes a guessing game.

External Attack Surface Management Promised Visibility - But Did It Deliver?

External Attack Surface Management (EASM) emerged with a bold promise: to illuminate the dark corners of an organization’s internet-facing infrastructure. It was sold as a panacea for “you don’t know what you don’t know,” offering security leaders the ability to see everything attackers could see. The expectation was straightforward—feed the EASM solution a few IP ranges or domains, and it would map your exposed assets, vulnerabilities, and risks.

Top Attack Surface Management (ASM) Software Solutions to Watch in 2025

Organizations are increasingly recognizing that threats can emerge from various external-facing assets, including web applications, cloud infrastructure, APIs, and even shadow IT. This necessitates a robust Attack Surface Management (ASM) strategy, supported by specialized software solutions.

Exploited! SysAid On-Prem XML External Entity Vulnerability (CVE-2025-2775)

SysAid has patched a critical XML External Entity (XXE) flaw that lets unauthenticated attackers turn a routine /mdm check-in request into full administrator compromise—and, when chained with a newly disclosed command-injection bug, into remote code execution (RCE). The vulnerability, tracked as CVE-2025-2775, affects all SysAid On-Prem deployments up to 23.3.40 and is now fixed in 24.4.60.

Beyond the Perimeter: How NYDFS 23 NYCRR 500 Principles Apply to the Expanding API Attack Surface

For financial institutions in New York, the NYDFS Cybersecurity Regulation (23 NYCRR 500) is a vital mandate that requires a strong and comprehensive cybersecurity framework. This regulation outlines numerous requirements aimed at safeguarding customer data and maintaining the integrity of financial systems.

And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets

We admit it – we’ve had our heads in the clouds recently. Since we started working with Wiz as one of their integration partners, we’ve been spending even more time thinking about cloud assets. And these assets are everywhere! Gartner predicts double digit growth across all cloud segments in 2025.

Asset Discovery: A Starting Point, Not a Security Strategy

One of the foundational security practitioners’ mantra “you can’t protect what you can’t see” has become a security gospel. As enterprises expanded from hundreds of physical assets to thousands of devices including ephemeral workloads, a troubling reality has emerged: visibility alone does not equal security. In this article.