Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-20286: PoC Available for Critical Cisco Identity Services Engine Static Credential Vulnerability

On June 4, 2025, Cisco released fixes for multiple vulnerabilities, several of which were noted to have publicly available proof-of-concept (PoC) exploit code. The most severe issue, CVE-2025-20286, affects cloud deployments of Cisco Identity Services Engine (ISE) on Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI).

The Journey to SASE: a CxO Perspective | SASEfy 2025

True transformation happens when networking and security move at the speed of business. That’s what SASE makes possible. In his session at, Cato’s Chief Strategy Officer Yishay Yovel, shares how SASE aligns infrastructure and business transformation — creating a platform that’s simple, agile, and future-ready.

API Security Issues

How to Fix the Challenges with Web App Firewalls A10 expert Jamison Utter discusses with Gary Wang why API security is a challenge to manage, as these APIs are headless and cannot be accessed through a login. There is no authentication mechanism, such as completing a CAPTCHA. APIs are also vulnerable to bots, which complicates matters. Watch the full video to learn more about multi-layered approaches, threat intelligence, behavioral analysis, and protection against modern threats like bots and APIs.

What Are Non-Human Identities, and Why Should Security Teams Care?

Security breaches are increasingly expensive and harder to spot, extending beyond common attacks like phishing. Attackers are now targeting the least visible parts of your infrastructure: non-human identities (NHIs). NHIs outnumber human identities by 45:1 in cloud environments—these include service accounts, APIs, applications, and bots that interact with systems and access sensitive data.

Using Password 123456 is Bad, but No Password is Worse

An independent cybersecurity researcher claims to have uncovered a breach of an unnamed database containing 184 million records, with exposed information including emails, passwords, and login links. The kicker is that the database was all in plain text and required no password to access. Let’s count how many basic account hygiene rules this breaks—all of them. Yes, more snarkiness, but this type of ineptitude must be called out.

Bridging network identity and endpoint intelligence: DDI Central now integrates with Endpoint Central

In today’s hybrid networks, an IP address is more than a connection point—it’s a digital identity. But for most admins, that identity is still surface-deep. Traditionally, IPAM tools show you which IP addresses are in use, who’s using them, and what vendor the device belongs to. But they don’t tell you whether that device is secure. That changes now. What if every IP handed out by your DHCP server revealed not just what the device is—but how vulnerable it might be?

Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software

Today marks a significant milestone for Snyk and, more importantly, for the security posture of the U.S. government. I'm thrilled to introduce Snyk for Government, our FedRAMP Moderate authorized solution for the public sector. This authorization underscores our unwavering commitment to providing secure development solutions that meet the rigorous standards of the Federal Risk and Authorization Management Program (FedRAMP). It means that U.S.