Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Hats to Heartfelt Advice: Takeaways from a Fireside Chat with CISO @ Crocs

The fireside chat with Crocs CISO Lena Taylor at our Denver event brought together cybersecurity professionals, allies, and leaders for an evening of honest insight and community. From redefining work-life balance to knowing when to pursue new opportunities, Lena shared grounded, real-world wisdom that resonated far beyond career advice. Here’s a look at the biggest takeaways from the discussion and why the night left such a lasting impression.

The Missing Link in OWASP is Found: Business Logic Abuse#owasp #owasptop10 #businesslogic

For years, security lists focused on technology (Cloud , Mobile , Serverless ). We desperately needed a list that focused on the core problem: flawed application logic, regardless of the stack. The OWASP Top 10 Business Logic Abuse (BLA) list fills that critical, architectural gap. Why? Because exploitation often happens between technologies, not within them. We must be able to categorize and talk about these intricate logic threats in a technology-agnostic way.

SHA1-Hulud, npm supply chain incident

On November 24th, 2025, we identified a new supply chain attack in the npm ecosystem, referred to as SHA1-Hulud. We believe this is a second wave of the Shai-Hulud attack, which occurred in September 2025. Snyk will continue monitoring this active incident until it is resolved. Updates on this incident will be on our trust center.

Emerging Threat: CVE-2025-41115 - Critical SCIM Privilege Escalation in Grafana Enterprise

CVE-2025-41115 is a critical privilege escalation and user-impersonation vulnerability in Grafana Enterprise. The issue occurs within the SCIM (System for Cross-domain Identity Management) provisioning feature. When SCIM is enabled, Grafana incorrectly maps the externalId field supplied by a SCIM client to an internal user.uid.

More Security, Speed, and Compliance: New Features from Seal Security

We are excited to announce a new wave of updates designed to streamline your development process, enhance security auditability, and dramatically improve platform performance. At Seal Security, our focus remains on giving you the easiest and most effective way to manage and remediate open source vulnerabilities. Your feedback drives our innovation, and we're thrilled to introduce capabilities that make the platform faster, cleaner, and more compliant.

OWASP Top 10 2025 Edition - The 443 Podcast - Episode 350

This week on the podcast, we cover OWASP’s update to the top 10 web application security weaknesses and its changes from the 2021 list. We also cover a recently uncovered adversary-in-the-middle campaign that’s pushing malicious software updates to targeted systems. We conclude with our opinions on Microsoft’s latest AI features, which are coming to Windows.

CVE-2025-9501: Identifying High-Risk WordPress Instances Using W3 Total Cache

CVE-2025-9501 is a critical remote code-execution vulnerability affecting W3 Total Cache versions prior to 2.8.13, a plugin used by more than a million WordPress sites to improve performance and caching. The issue lies in the plugin’s _parse_dynamic_mfunc handler, which can process user-controlled inputs inside dynamic fragments.

Remediation Agent: Step-By-Step Guidance for Faster Fixes

Remediation shouldn’t require research. Seemplicity’s Remediation Agent embeds clear, asset-specific, step-by-step guidance directly into every finding – eliminating ambiguity, reducing rework, and accelerating time-to-resolution. Learn how it standardizes fixes, supports all skill levels, and removes one of the biggest bottlenecks in exposure management.