Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Arctic Wolf Observes Social Engineering Campaign Targeting IT Staff of Healthcare Providers to Reset User Credentials

Arctic Wolf has identified a social engineering campaign targeting health care providers in the United States. Throughout multiple incidents, hospital help desks have received suspicious phone calls from unidentified individuals claiming to be doctors who had forgotten their password. When the callers were confronted with a request to verify their identities, including first name and department affiliation, the suspicious callers disconnected.

Pre-Authenticated RCE Chain Disclosed in Sitecore XP

On June 17, 2025, watchTowr disclosed technical details for a pre-authenticated remote code execution (RCE) exploit chain in Sitecore Experience Platform (XP), an enterprise content management system. Although Sitecore released a fix for these vulnerabilities in May 2025, no official CVE identifiers have been assigned at this time. The three vulnerabilities are currently tracked as WT-2025-0024, WT-2025-0025, and WT-2025-0032 by watchTowr and impact Sitecore XP versions 10.1 through 10.4.

Cost Insights. Enhanced Alerts. Smarter Security. And More. Meet CurrentWare v11.0.1.

Modern workplaces need monitoring software that goes beyond activity reports - tools that optimize tech spend, strengthen security posture, and drive smarter outcomes. CurrentWare v11.0.1 is built to do exactly that. Whether you’re trying to cut costs, prove compliance, or prevent internal threats before they escalate, this update arms you with the tools to act faster and smarter. Ready to see how? Let's dive in. Unused software isn't just sitting idle; it's silently draining your budget.

CrowdStrike Researchers Investigate the Threat of Patchless AMSI Bypass Attacks

Microsoft introduced AMSI (Antimalware Scan Interface) with Windows 10 in 2015. This interface standard allows third-party security products to be integrated with applications running on a Windows PC to improve detections for fileless and script-based attacks. Naturally, adversaries immediately began efforts to defeat AMSI.

3 Important Ways Attack Surface Management Must Evolve

For the second time in a row, Bitsight has been named an Overall Leader in the KuppingerCole Leadership Compass for Attack Surface Management (ASM)—and it’s not just a title. The report offers a deep dive into how organizations are using ASM to get ahead of cyber threats by proactively managing their digital risk.

The Endpoint Dilemma: Why Your Critical Systems Are More Vulnerable Than You Think

In today’s connected OT, ICS and CPS world, critical infrastructure organizations have a need to extend remote access to employees, 3rd party contractors, and OEMs. But in the rush to support remote operations, many critical infrastructure operators have exposed their critical systems to a silent but severe risk: the user endpoint.

6 Key capabilities needed for managing Active Directory that reduce risk and offer IT teams an edge

Identity and access management (IAM) is about enabling secure, scalable and efficient operations across increasingly complex environments. The right IAM solution doesn’t just support IT, it actively reduces friction, tightens security and adapts to an organization’s environment. Better outcomes happen with solutions that align with organizational needs and don’t demand numerous workarounds.

Why we moved our ECS services from Fargate to EC2

At Tines, we rely heavily on AWS Elastic Container Service (ECS) to power our workflow automation platform. For a couple of years, we used Fargate as our default compute layer – offering simplicity and removing the need to manage underlying hosts. However, as we scaled, we started hitting the edges of what Fargate could reliably offer. This is the story of why we migrated our backend services to an EC2-backed ECS Capacity Provider and what we learned along the way.