Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing Seal OS: Vulnerability Remediation for Any Linux

We are excited to announce the launch of Seal OS, the first holistic solution designed to automatically fix vulnerabilities in both Linux operating systems and application code. Seal OS delivers long-term support for a wide range of Linux distributions, encompassing Red Hat Enterprise Linux, CentOS, Oracle Linux, Debian, Ubuntu, Alpine, and more. This support extends to various deployment models, including containers, virtual machines, and bare metal installations.

It's Time to Break Up with Spreadsheets for Managing Vulnerabilities

Let’s be real—spreadsheets have been the go-to tool for vulnerability management for years. They’re easy to set up, familiar, and flexible. But here’s the hard truth: they’re costing you time, accuracy, and security. Imagine trying to track thousands of vulnerabilities across an ever-changing attack surface using a tool designed for budgeting, not security.

3 ways orchestration and automation enhance vulnerability management

When it comes to vulnerability management, time is critical - the longer a vulnerability goes unaddressed, the greater the risk. Security teams need efficient, reliable processes that don’t drain resources. For most teams, relying on human effort alone isn’t sustainable or scalable. This is why so many teams turn to workflow orchestration and automation.

PoC Exploit Available for Critical Information Disclosure Vulnerabilities in Ivanti EPM

On February 19, 2025, Horizon3.ai published proof-of-concept (PoC) exploit code and technical details for critical Ivanti Endpoint Manager (EPM) vulnerabilities disclosed in January. The vulnerabilities are tracked as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159, allowing a remote unauthenticated attacker to leak sensitive information via a path traversal. They share the same underlying issue, which results from an unauthenticated endpoint failing to validate input.

Security Bulletin: PAN-OS Authentication Bypass Vulnerability

CVE-2025-0108 is a high-severity authentication bypass vulnerability affecting Palo Alto’s PAN-OS, the operating system for their next-generation firewalls. This flaw allows an unauthenticated attacker with network access to the PAN-OS management web interface to bypass authentication controls and execute restricted PHP scripts.

Latest GitLab Vulnerabilities: A Gateway for FOG Ransomware Attacks?

The future cyber threat is not static and appears to exploit vulnerabilities with fresh ransomware gangs and devastate businesses all over the world. One of such infamous gangs, Fog Ransomware, is currently dumping sensitive data of several businesses, recent attacks including GitLab deep. Foresiet security researchers believe that Fogs recently exploited Gitlab Cve perhaps they employed a fresh or unfixed zero-day vulnerability in GitLab.to launch its attacks.