Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Management
CVE-2025-59432: Timing Attack Vulnerability in SCRAM Authentication

November 6, 2025

Vulnerability Management
CVE-2025-59475: Missing Permission Check in Jenkins Authenticated User Profile Menu

November 4, 2025

Vulnerability Management
CVE-2025-59340: Sandbox Bypass via JavaType Deserialization in Jinjava What Developers Need to Know

November 3, 2025

Vulnerability Management
CVE-2025-59822: HTTP Request Smuggling in http4s, What Developers Need to Know

October 31, 2025

Threat Intelligence
Enhancing Azure Front Door with Threat Intelligence: Blocking Malicious IPs at the Edge

October 28, 2025

Vulnerability Management
The AWS Outage Lesson: Why Your Vulnerability Management Product Needs a Backup Content Provider

October 22, 2025

Vulnerability Management
CVE-2025-4760: Authenticated Stored XSS Vulnerability in WSO2 API Manager, What You Need to Know?

October 16, 2025

Vulnerability Management
CVE-2025-41248: Spring Security Authorization Bypass in Method Security Annotations on Parameterized Types

October 15, 2025

Compliance & Risk Management
Cloud Security
Information Security
Mapping TLS 1.3 Adoption Across Azure Services: What’s Ready, What’s Not

October 13, 2025

Ransomware
DragonForce Ransomware: Technical Analysis and Mitigation Strategies

September 23, 2025

Information Security
Cybersecurity in Aviation Industry

September 10, 2025

Threat Integrations
Secure, Scalable, and Codeless: Building Microsoft Sentinel Connectors for Logs and Threat Intelligence with CCF

September 5, 2025

Sign up to our Newsletter