Blog

Blog

Fortra Patch Priority Index for September 2025

Fortra's September 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft, Adobe and Google. Up first on the list are Chromium and Microsoft Edge (Chromium-based) patches that resolve five issues, including use after free, inappropriate implementation, and security feature bypass vulnerabilities. Next are patches for Microsoft Office, Word, Excel, PowerPoint, and...
Blog

Summary of the Investigation Related to CVE-2025-10035

We have completed our investigation of suspicious activity related to our Fortra GoAnywhere MFT solution that resulted in CVE-2025-10035. This post summarizes our findings. What HappenedOn Sept. 11, 2025, we began investigating a potential vulnerability reported by a customer. After identifying the issue, Fortra developed and released hotfixes for supported versions and updated the product to...
Blog

AI Is Shaping Cyber Threats: How Organizations Can Stay Ahead

Security alerts never stop; they flood in, one after another. AI runs quietly in the background, sorting through a plethora of data, making snap decisions, and raising red flags when it finds anomalies. Unfortunately, somewhere else, bad actors are running similar algorithms, monitoring, probing, and learning. Efficiency (speed and scale) isn’t the danger, nor is the way security teams use these...
Blog

Salesforce Data Breach: What You Need to Know

What's happened?The Scattered LAPSUS$ Hunters hacking group claims to have accessed data from around 40 customers of Salesforce, the cloud-based customer relationship management service, stealing almost one billion records.Ouch! What organisations have been affected?On its dark web leak site, the hackers list numerous organisations whose Salesforce instances it claims to have breached via social...
Blog

2025 CISO Benchmark Report Highlights: 81% Would Lose Brand Trust Post Retail Breach & More

New research reveals that 81% of consumers would lose trust in a brand if their personal data was breached — even once. The 2025 CISO Benchmark Report, published by the Retail and Hospitality ISAC (RH-ISAC), examines the effects of digital transformation on cybersecurity initiatives within these sectors. Notably, the report emphasizes the need to secure the digital core, champion cybersecurity...
Blog

Cybersecurity Regulatory Landscape in Mexico: A Primer for Business

Cyber threats never wait for regulatory certainty. They exploit ambiguity, move through supply chains, and turn compliance gaps into points for entry. In Mexico, the regulatory picture is still forming, defined more by what it implies than what it demands. Mexico also ranks among the hardest-hit countries in Latin America when it comes to cyber threats. By 2024, the country accounted for more than...
Blog

What National Cybersecurity Awareness Month Means in 2025

“Stay Safe Online” is the call of this year’s National Cybersecurity Awareness Month (NCSAM). For most of us in the security industry, that’s a no-brainer. But do our online security obligations extend only to ourselves? Here’s how a broader view might make us think differently about “entry-level security awareness” this year, and how improving even the most basic cyber skillsets could be a genius...
Blog

Two Years of the PATCH Act: Protecting Patients from Outdated Medical Devices

We have all dealt with outdated technology. An old phone that no longer gets updates. A laptop that takes minutes to boot. The stubborn printer that jams every second page. You have probably seen a payment kiosk crash, revealing an ancient Windows XP desktop beneath. Glitches are particularly annoying when they happen to an ATM. But hospitals have similar problems. And here, it is no laughing...
Blog

Your Favourite Phone Apps Might be Leaking Your Company's Secrets

Think about the apps on your phone right now. Your banking app, your working email, the food delivery app: each one is talking to a server somewhere - sending and receiving data through messages sent through APIs, the underlying infrastructure that allows apps to communicate.And here's the problem - hackers have determined that the APIs of mobile apps, when left visible and exploitable, can be a...
Blog

43% Put Sensitive Work Data into AI — Highlights from the Oh, Behave! Report

In its fifth year, the annual Oh, Behave! report is back to give us another temperature check on the security attitudes of the masses. The findings provide a window into what people know about cybersecurity, what they think they know, and what they’re doing about it. Or not. 57% Always Connected to the Internet Does it look like people are always on their phones? Because they just might be....
Blog

Cybersecurity Regulatory Landscape in Italy: A Primer for Business

As digital systems form the backbone of Italy’s public services and private industries, the regulatory landscape has had to intensify its focus on risk, resilience, and accountability. For global firms working in Italy or with Italians, knowing the rules keeps business running, guards their reputation, and keeps them out of trouble. Core Cybersecurity Regulations in Italy Italy’s regulatory...
Blog

INC ransomware: what you need to know

What is INC Ransomware?INC is the name of a ransomware-as-a-service (RaaS) operation that first appeared in late summer 2023. Like many other cybercriminal groups, the administrators of INC provide the malware and infrastructure for the attacks. Affiliates of the INC ransomware group carry out the actual attacks themselves, sharing profits they make from blackmailing companies with the core team...
Blog

Cyber Defense vs. Cybersecurity: What’s the Difference, and Why Does It Matter?

Cyber defense. Cybersecurity. They sound the same, even interchangeable.But there’s a difference, and understanding that difference can make all the difference in how you structure your security approach. Cyber Defense vs. Cybersecurity: The Key DifferencesCyber defense is what we think of when we think “cybersecurity,” ironically: the art of actively protecting your data against cyber threats...
Blog

VPN Replacement: Why You Need It and How to Find the Right One

When the industry outgrew the perimeter, it also outgrew VPNs. Now, VPN replacements are in high demand as organizations look for scalable, lightweight ways to secure distributed data in a distributed workforce.Understanding VPN and Its LimitationsVPNs were built for a bygone era, but fail to secure remote work, private data, or private applications today.VPN Security ChallengesSecuring VPNs is a...
Blog

Your 8-Step Roadmap to Fintech Compliance

What Is Fintech Regulatory Compliance?Regulatory compliance in the fintech sector refers to the policies put in place governing the safe collection, storage, and use of sensitive customer data within fintech applications, online platforms, and digital services.These organizations are constantly evolving, pushing the envelope where digital progress is concerned. While banks offer the benefit of in...
Blog

From Mischief to Malware: ICO Warns Schools about Student Hackers

Curiosity killed the cat and in today's classrooms it seems it is also crashing the school server, pinching teachers' passwords, and rewriting the lunch menu for a laugh.Recent data released by the UK's Information Commissioner's Office (ICO), highlights that the same curiosity for technology that can lead a young person into a career in cybersecurity can also lead them into trouble.According to...