Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-68613: Critical RCE in n8n via expression injection

In the current AI gold rush, teams are rapidly standing up automation, AI orchestration, and integration platforms to move faster. In many cases, speed comes at the expense of visibility and security. This is where external attack surface management becomes critical. IONIX can identify and continuously monitor a wide range of AI-related and automation assets exposed to the internet, helping organizations understand what they are running, where it is exposed, and what risks it introduces.

Emerging Threat: CVE-2025-55182 (React2Shell) - React Server Components RCE Vulnerability

On December 3 2025, the React team released patched versions of the affected React Server Components packages. Framework vendors, including Next.js, provided updated builds on the same day. Any environment using React Server Components or frameworks that embed the RSC pipeline should.

Attack Surface Monitoring Guide for Security Teams

The rising threat of cybercrime, projected to reach an astonishing $13.82 trillion by 2028, is largely attributed to the expanding attack surface. This signals that organizations are more vulnerable than ever. Assuming your organization is safe, without ongoing visibility is dangerous. That’s because every digital asset poses a threat, whether a new tool or forgotten assets. Security and Operations Center (SOC) teams require real-time insight, which is why attack surface monitoring is crucial.

Attack Surface Management vs. Exposure Management: What Wins?

When Attack Surface Management (ASM) stops at discovery, teams drown in alerts, CVE lists, and noise. What’s exposed isn’t the same as what’s actively being weaponized—and without prioritization or built-in remediation, risk piles up fast. Exposure Management (EM) closes that gap. It merges threat intelligence, vulnerability context, and safe-by-design remediation into one continuous loop. Instead of “scan → report → wait,” EM delivers.

CVE-2025-61757: Critical Pre-Auth RCE in Oracle Identity Manager

A newly disclosed vulnerability, CVE-2025-61757, exposes Oracle Identity Manager (OIM) to unauthenticated remote code execution (RCE). The flaw affects OIM versions 12.2.1.4.0 and 14.1.2.1.0 and carries a CVSS 9.8 Critical rating. CISA has added it to the Known Exploited Vulnerabilities (KEV) catalog — meaning active exploitation is confirmed.

Emerging Threat: CVE-2025-41115 - Critical SCIM Privilege Escalation in Grafana Enterprise

CVE-2025-41115 is a critical privilege escalation and user-impersonation vulnerability in Grafana Enterprise. The issue occurs within the SCIM (System for Cross-domain Identity Management) provisioning feature. When SCIM is enabled, Grafana incorrectly maps the externalId field supplied by a SCIM client to an internal user.uid.

What's New in CyCognito: October 2025 Platform Enhancements

Security teams need clear signals, fast investigations and automation that fits into existing workflows. The latest CyCognito updates focus on streamlining asset operations, speeding up review of context and expanding what you can manage through the API. Recent enhancements include new asset management permissions, Asset List productivity improvements and additional API capabilities for realm freshness and issue lifecycle control.

CVE-2025-9501: Identifying High-Risk WordPress Instances Using W3 Total Cache

CVE-2025-9501 is a critical remote code-execution vulnerability affecting W3 Total Cache versions prior to 2.8.13, a plugin used by more than a million WordPress sites to improve performance and caching. The issue lies in the plugin’s _parse_dynamic_mfunc handler, which can process user-controlled inputs inside dynamic fragments.

Emerging Threat: Django SQL Injection Vulnerability (CVE-2025-64459)

CVE-2025-64459 is a critical SQL injection vulnerability in the Django web framework’s ORM. It affects Django 5.1 versions earlier than 5.1.14, Django 4.2 versions earlier than 4.2.26, and Django 5.2 versions earlier than 5.2.8. Earlier, unsupported series such as 5.0.x, 4.1.x, and 3.2.x were not evaluated and may also be affected, which makes legacy deployments especially risky.

Why External Exposure Management Must Be at the Core of Your Security Operations

Part of our two-part series on the evolution from EASM to EEM. This post explains how External Exposure Management becomes an operational muscle that empowers continuous defense, real-time remediation, and proactive protection. External exposure is now the frontline of cyber defense. These are the assets attackers can reach without authentication, without privilege escalation, and without internal access. That means speed and agility are not luxuries they are non-negotiable.