Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is PCI DSS and How Can Organizations Best Maintain Compliance?

The world is going cashless. The Federal Reserve reported that cash was used in just 16% of all U.S. transactions in 2024. And that number is expected to continue to decline. The widespread use of credit and debit cards, plus the rise of digital wallets and contactless payments, have reshaped the financial landscape, increasing flexibility as well as financial protection. However, it’s also increased the levels of fraud.

Lionishackers: Analyzing a corporate database seller

Outpost24’s threat intelligence researchers have been analyzing a corporate database seller known as “Lionishackers”. They’re a financially motivated threat actor focused on exfiltrating and selling corporate databases. This post explores how they operate, where their attacks are taking place, and the current level of threat they pose.

Fixing 4,000 Vulnerabilities? Quick Ways to Eliminate Security Issues! #podcast #infosec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

What We Found with OpenAI's Codex CLI Tool

In this video, I explore OpenAI’s Codex CLI tool to see how powerful it really is for coding with AI. But things quickly go off the rails… what started as a simple test ended with a surprise identity verification request. Apparently, to continue using the tool, I need to submit a government-issued ID and a photo of myself—something I didn’t expect at all. I talk through the process, show the error I ran into, and share my honest thoughts on this level of access and how invasive it feels for a developer tool.

Speeding Up Vulnerability Remediation Through Threat Correlation in XDR

In cybersecurity, speed matters. But so does clarity. When your organization is facing hundreds or thousands of known vulnerabilities, not every one deserves immediate attention. The real challenge is knowing which ones do and acting fast. That’s where the integration of threat correlation and extended detection and response (XDR) comes in. Vulnerability remediation isn’t just about patching; it’s about remediation with context.

ToolShell: Remote Code Execution in Microsoft SharePoint (CVE-2025-53770)

On July 19, 2025, a critical remote code execution (RCE) vulnerability (CVE-2025-53770, also referred to as ToolShell) was publicly disclosed, impacting on-premises Microsoft SharePoint Server installations. This vulnerability allows unauthenticated attackers to execute arbitrary code remotely by leveraging insecure deserialization techniques.

Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence

The cybersecurity landscape witnessed a perfect storm in July 2025 when multiple critical SharePoint vulnerabilities collided with sophisticated IIS module-based persistence techniques, creating a nightmare scenario for enterprise defenders. CVE-2025-53770, CVE-2025-53771, CVE-2025-49704, and CVE-2025-49706 are being actively exploited by sophisticated threat actors, but the real danger extends far beyond the initial exploitation phase.

Cato CTRL Threat Brief: "ToolShell" Exploit Targeting Microsoft SharePoint Vulnerabilities

On July 22, 2025, Microsoft published an overview of a series of critical vulnerabilities affecting Microsoft SharePoint Server (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771). These vulnerabilities opened a dangerous window for threat actors to gain access to internal resources, execute code remotely, and take over SharePoint deployments.

SharePoint "ToolShell" zero day

Hats off to the great work the community and industry has done regarding the “ToolShell” attack against Microsoft’s On-Premise SharePoint servers. The goal of this article is to build on that great work and help Sumo Logic customers with on-prem SharePoint servers investigate and identify evidence within their environments.