Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The researcher's desk: FortiWeb Authentication Bypass (CVE-2025-64446)

Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, complex, or persistent. For this issue, we look at CVE-2025-64446, a critical authentication bypass that has been actively exploited in the wild, targeting Fortinet’s Web Application Firewall (WAF) product, FortiWeb.

Intel Chat: LLM in malware, LandFall, Windows kernel zero-day & Ex-L3Harris exec sells secrets [268]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

The best security questionnaire automation software for 2025

Security questionnaires are now a standard part of doing business. Whether you’re closing enterprise deals or expanding into regulated markets, every buyer expects proof of your security posture—often in the form of long, repetitive questionnaires. The challenge isn’t finding the answers; it’s answering fast and consistently across formats, languages, and requirements. ‍ That’s where security questionnaire automation software comes in.

Email Bombing Followed by Teams IT Impersonation Attacks Continue

BlueVoyant’s Threat Fusion Cell and SOC have been tracking a significant and persistent social engineering campaign that cleverly exploits trusted communication channels to gain initial access to target networks. Since at least mid-October 2025, BlueVoyant has observed a consistent playbook where threat actors employ inbox sabotage as a pretext for highly convincing IT support impersonation over Microsoft Teams.

Endpoint Protection Blindspot: The Rise of Ransomware in the VM Layer

Learn about the shift from physical to virtual data centers in the 2000s and the rise of ransomware attacks that take advantage of security blind spots (e.g. lack of endpoint protection) to target hypervisors and breach your data. Learn why you need to shift from prevention only to cyber resilience for stronger defenses against modern adversaries (Scattered Spider, UNC5112, and others). Rubrik can help.

Invisible Instructions: Multimodal AI is Already Being Tricked

Invisible Instructions: Multimodal AI is Already Being Tricked In this clip from "Securing AI Part 4: The Rising Threat of Hidden Attacks in Multimodal AI," Diptanshu Purwar and Madhav Aggarwal respond to Jamison Utter's example of a new, well-known form of multimodal attack: abusing AI resume screeners by exploiting both text and visual processing. The Resume Attack: White-on-White Text.

Brivo Access: How to Enable the Dormakaba Integration in Brivo Access

Unlock seamless security! This video shows you how to integrate your Brivo Access platform with dormakaba locks. Get ready to manage your dormakaba locks from a single cloud dashboard! Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments. Don't forget to like, share, and subscribe to stay updated on the latest trends in access control and smart space management.

Brivo Access: How to Set up the Bosch + Brivo Integration

The Bosch Intrusion Panel integration in Brivo Security Suite empowers customers to manage doors and alarms from a single platform, and automatically links security events to rapid responses. Learn how to set up the integration in this video. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

Avast Scam Guardian for Mobile: Advanced AI Scam Protection

Introducing Avast Scam Guardian and Scam Guardian Pro for mobile devices—bringing powerful AI-driven scam protection to your smartphone and tablet. Experience complete peace of mind with advanced AI tools that proactively block scam calls before they ring, detect even the most convincing phishing emails and texts, and offer instant expert guidance whenever something seems suspicious—giving you round-the-clock protection against evolving scams. Avast Scam Guardian is now available with Avast Mobile Security in France and Germany, with worldwide availability coming soon.

To protect Canada's financial system, new anti-fraud measures must evolve faster than their foes

The Government of Canada’s launch of an Anti-Fraud Strategy and Financial Crimes Agency acknowledges a reality that banks, fintechs and payment processors already know: the scale, sophistication and speed of digital fraud are outpacing traditional defences. These are vital national commitments, to be sure, but they also underscore the need for companies, institutions and governments to evolve faster than the attacks they face. Fraud has become one of the defining challenges of our time.