Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild

A devastating new remote code execution (RCE) vulnerability, CVE-2025-24813, is now actively exploited in the wild. Attackers need just one PUT API request to take over vulnerable Apache Tomcat servers. The exploit, originally published by a Chinese forum user iSee857, is already available online: CVE-2025-24813 PoC by iSee857.

INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats

As Artificial Intelligence (AI)-powered cyber threats surge, INE Security, a global leader in cybersecurity training and certification, is launching a new initiative to help organizations rethink cybersecurity training and workforce development. The company warns that AI is reshaping both the threat landscape and the skills required for cybersecurity professionals. While AI offers significant advantages in cyber defense, organizations must ensure their teams are properly trained to leverage it effectively without becoming overly reliant on automation.

The Cost Conundrum of Cloud Computing

For most businesses, change is driven by the need to reduce risk and innovate, while optimising cost and return on investment. In the case of cloud adoption, the powerful functionality offered by these platforms enable businesses to streamline, optimise, and make their workflows more efficient which, in turn, helps reduce costs. Organisations are always looking for the best solutions for optimising efficiency and reducing costs, particularly in uncertain economic times.

Protect Your iOS Devices: Must-Have MDM Features for Businesses

Managing corporate iOS devices can be tricky. Your employees rely on them to access company data, communicate with clients, and handle sensitive business operations. But with this convenience comes risk—unauthorized access, data leaks, and cyber threats. A Mobile Device Management (MDM) solution helps businesses protect devices, enforce security policies, and prevent unauthorized access.

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

Secure Your AI: Protecting Agentic AI in an API-Driven World

As enterprises embrace agentic AI for transformative business opportunities, they face a critical challenge: ensuring these intelligent systems operate securely. Wallarm, the leader in API-first security, invites you to an exclusive webinar to explore how to safeguard AI agents, APIs, and sensitive data from emerging threats. Learn how to protect your AI ecosystem and ensure business continuity with actionable insights from Wallarm Security Lab. Discover why 90% of agentic AI deployments are vulnerable and how to defend them.

AI Security = API Security: 10x Surge in AI-Related CVEs #AIExploits #APIAttacks #SecureAI

AI-driven applications rely on APIs, making them a prime target for attackers. In 2024, AI-related CVEs increased 10x, with 98.6% of vulnerabilities linked to APIs. As AI agents interact with systems via APIs, security risks grow. Learn why securing AI means securing APIs.