Category: Security

Cybersecurity Threat Advisory: Critical zero-day SAP vulnerability
SAP published a critical vulnerability, CVE-2025-31324 with a CVSSv3 score of 10.0. The flaw is actively exploited in the wild. Successful exploitation can lead to arbitrary file uploads, leading to remote code execution (RCE) and full system compromise. Review this...

Cybersecurity Threat Advisory: Craft CMS exploited
Threat actors have been actively exploiting two Craft CMS vulnerabilities, CVE-2025-32432 and CVE-2024-58136, to breach web servers and gain unauthorized access. Review the details in this Cybersecurity Threat Advisory to safeguard your devices. What is the threat? Threat actors are...

Security audits play a vital role in defense
Security audits are a crucial component of an organization’s cybersecurity strategy. However, despite their importance, they are not as commonly conducted as you might think. Shift from a reactive to a proactive mindset According to a study, only 52 percent...

Cybersecurity Threat Advisory: ScreenConnect vulnerability
Researchers have discovered a vulnerability in the ScreenConnect remote support software that upon a successful exploitation, can allow for remote execution on a targeted server. Continue reading this Cybersecurity Threat Advisory to learn how to keep your environment safe. What...

Cybersecurity Threat Advisory: Critical SSL.com vulnerability
A significant flaw has been identified in SSL.com’s Domain Control Validation (DCV) process, which poses a risk of issuing unauthorized SSL/TLS certificates. This vulnerability could expose trusted domains to impersonation, man-in-the-middle (MITM) attacks, and the interception of encrypted traffic. We recommend...

Cybersecurity 2025 trends: Key emerging threats
Welcome to part two of our deep dive into 2025’s cybersecurity landscape. As highlighted in part one of this blog, generative artificial intelligence (GenAI) and supply chain vulnerabilities are at the forefront of cyberthreats. We consulted with other industry experts...

MSPs: AI is your answer to the $12 trillion cyberthreat
One of the most challenging aspects of cybersecurity readiness is establishing robust threat detection capabilities. Cyberattacks are constantly evolving, and criminals are now leveraging tools such as artificial intelligence (AI), third-party attack development tools, and in-depth research on their targets...

Cybersecurity Threat Advisory: Critical CentreStack and Triofox vulnerability
A critical security vulnerability, tracked as CVE-2025-30406, has been disclosed in Gladinet’s CentreStack and Triofox file-sharing platforms. According to reports, this flaw arises from the presence of hardcoded administrative credentials embedded in default software builds. Attackers can use these credentials...