For several years now, adversaries and red teams have increasingly leveraged Living-off-the-Land Binaries (LOLBins) techniques to compromise targeted systems. By exploiting pre-installed, legitimate software, these attackers are able to evade detection tools, seamlessly blending malicious activities with normal system processes. This approach presents a significant challenge for traditional security measures, which often struggle to differentiate between legitimate use and malicious intent.
This week’s briefing covers: POC Exploit Released for Erlang CVSS 10 Vulnerability The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication. NTLM Hash Leaking Vulnerability Actively Exploited Checkpoint researchers report that they have detected active exploitation of CVE-2025-24054, a hash disclosure via spoofing vulnerability that was patched as part of Microsoft’s March patching cycle.
Abraham’s got years of field experience, and he knows why customers hesitate: promises that never deliver. But once they see Cato in action, their perspective shifts completely. Watch below as Abraham shares a memorable moment when Cato made a customer's phone system work for the first time, all while delivering simplicity, power, and results. Ready to see a true SASE platform in action? Book a demo today.
Organizations face increasingly complex security challenges driven by the convergence of on-premises environments, cloud deployments, and edge computing nodes. The implementation of a hybrid data fabric has emerged as a powerful approach for managing and integrating data across distributed architectures while ensuring robust, integrated security. This article provides a deep dive into the technical and strategic aspects of constructing such a fabric.
In this video, I’ll be putting Google’s Gemini 2.5 AI to the test — challenging it to generate 100% secure and safe code for a note taking application. The catch? My job is on the line... and the code has to pass all security checks to avoid critical vulnerabilities. I’ll be diving into how Gemini 2.5 performs under pressure and examining whether AI can truly be trusted with secure coding. Resources.
Zero-day vulnerabilities are the new normal in cybersecurity. In 2023 alone, more than 100 high-profile zero-day incidents were reported. Despite the early warning signs, major corporations and government agencies, from giants like Google and Cisco to the U.S. Government, continue to be blindsided by zero-day threats into 2025. In December 2024, for example, the U.S.
Neglecting regulatory compliance obligations, whether intentional or not, is not just a procedural error but a direct invitation for significant financial penalties, operational disruption, and, in the case of a healthcare organization, creating a potentially life-threatening situation. These consequences were recently illustrated by the US Department of Health and Human Services (HHS), Office for Civil Rights (OCR).